By Topic

Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on

Date 23-25 March 2012

Go

Filter Results

Displaying Results 1 - 50 of 178
  • [Front cover - Volume 3]

    Publication Year: 2012, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (906 KB)
    Freely Available from IEEE
  • [Title page i - Volume 3]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (75 KB)
    Freely Available from IEEE
  • [Title page iii - Volume 3]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (125 KB)
    Freely Available from IEEE
  • [Copyright notice - Volume 3]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE
  • Table of contents - Volume 3

    Publication Year: 2012, Page(s):v - xiv
    Request permission for commercial reuse | PDF file iconPDF (167 KB)
    Freely Available from IEEE
  • Welcome message - Volume 3

    Publication Year: 2012, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (79 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committee Members - Volume 3

    Publication Year: 2012, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (89 KB)
    Freely Available from IEEE
  • List of Reviewers - Volume 3

    Publication Year: 2012, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (60 KB)
    Freely Available from IEEE
  • Research on Sensitivity of Component-Based Reliability

    Publication Year: 2012, Page(s):3 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (175 KB) | HTML iconHTML

    In complicated software system it is very important research task to improve software reliability by improving single component. This paper introduces a kind of sort method by calculating sensitivity of component-based reliability. Considering dynamic and static character of software and complexity, using frequency, dependent intensity of component, this method calculates and sorts sensitivity of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • One of Aerial Image Geometric Correction Methods Based on 3-D Projection

    Publication Year: 2012, Page(s):8 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (159 KB) | HTML iconHTML

    Visible images are always slantwise, simultaneity ground control points layout are not easy, so we must choose one method which can correct the slantwise image based on few reference points. When exterior orientation elements known, the paper can build a correction plane founded on collinearity equations, and then correct the slantwise image using gray interpolation. The corrective effect is very ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Fault Diagnosis of Mixed-Signal Circuits Based on Genetic Algorithms

    Publication Year: 2012, Page(s):12 - 15
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (175 KB) | HTML iconHTML

    As the fault modes of mixed-signal circuits growing, aiming at the features for its signal are both analog and digital amount, the paper analyzed that the fault diagnosis program of mixed-signal circuits with genetic algorithms by using SABER simulation method to inject faults and data collection based on a brief discussion of basic principles and operation of genetic algorithms, focused on consid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Researches of Test Nodes Selection of Analog Circuit

    Publication Year: 2012, Page(s):16 - 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (167 KB) | HTML iconHTML

    Test nodes selection of analog circuit has great significance on fast, accurate circuit diagnosis, reduce test cost. For the lack of the current test nodes selection method of analog circuit, a test nodes selection method of analog circuit based on chaos immune clone selection optimization algorithm is presented in this paper. This method improves the efficiency and accuracy of test node selection... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis on Analytic Arithmetic of Oriented Warhead's Contact of Missile and Target

    Publication Year: 2012, Page(s):20 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (132 KB) | HTML iconHTML

    Rather than general warhead, oriented warhead asks for more accurate explode-time and explode-angle. For this problem, this paper analyzes the error of traditional analytic model in approximate calculation. The analysis is carried separately within and without the distance between guide and warhead. In Matlab simulation, it is concluded that the distance will affect the explode-time deeply but wil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on QDFET Using for Single Photon Detection

    Publication Year: 2012, Page(s):23 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (262 KB) | HTML iconHTML

    As an new pattern single photon detector, quantum-dot based single photon detector have good performance potential. In this paper, we first introduce the mechanism of photo-conductive gain of quantum-dot field effect transistor(QDFET), which is more suitable for quantum telecommunications compared to traditional mechanism. Then, QDFET in the form of a quantum point contact is mainly discussed, inc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Remote Surveillance System Based on the Processor -- S3C2410

    Publication Year: 2012, Page(s):26 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (133 KB) | HTML iconHTML

    This thesis brings forward to a resolution of embedded remote surveillance based on the demand of reality. The system is centering on the embedded Linux and S3C2410, and basing on the Wi-Fi network to build the embedded remote surveillance, which can capture video signal from USB digital camera and transport the signal to client through Wi-Fi network. The way of remote surveillance based on Wi-Fi ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing Algorithms of Information Security

    Publication Year: 2012, Page(s):30 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB) | HTML iconHTML

    Nowadays, Network information security problem has been increasingly considered. There are a number of ways proposed to tackle this issue, such as dynamic programming algorithm, fuzzy-C means algorithm, but they still have some disadvantages, in this paper, we will use the genetic algorithm to solve the security problem efficiently. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Effective Pattern Matching Algorithm for Intrusion Detection

    Publication Year: 2012, Page(s):34 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (342 KB) | HTML iconHTML

    In this paper, an improved algorithm based on the BM algorithm: BMD is proposed. BMD algorithm can reduce the space complexity and maintain the time complexity by reducing a pretreatment function and recording the number of times that a bad char found in the pattern. Experiments indicate that the space complexity is reduced by 36% at most. Therefore, the improved algorithm can provide significant ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research for Spatial Interpolation Based on Cloud Computing

    Publication Year: 2012, Page(s):39 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (273 KB) | HTML iconHTML

    In view of shortage of traditional spatial interpolation calculation needs a lot of time, putting forward spatial interpolation calculation method based on cloud calculation. This paper builds cloud computing platform of space interpolation calculation, discusses the key technologies of the cloud computing in realization spatial interpolation calculation, emphases load balancing schedule between c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of the Data Mining Technique in Case Information Systems

    Publication Year: 2012, Page(s):43 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (149 KB) | HTML iconHTML

    This paper inquires into the application technique of the data mining in the case information systems. The related cases, the classifying characteristic regulations and the discovery models of the tendency analysis are presented. The ways of put them into practice are discussed which play a very important rule in the public security information analysis, mining and utilizing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Kalman Filter in the RoboCup 3D Positioning

    Publication Year: 2012, Page(s):47 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB) | HTML iconHTML

    In this paper, we introduced the positioning theory of robot in the RoboCup 3D simulation system, and proposed two improved orientation methods, it completed the robot walking path model, used the kalman filtering to track,and analysed the error of filter. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Method for Solving Inverse Kinematics of an Industrial Robot

    Publication Year: 2012, Page(s):53 - 56
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (195 KB) | HTML iconHTML

    The kinematics model of robot is established based on the specific structure of 6R robot. In consideration of the robot base movement and the actuators replacement, the key problem of robot inverse kinematics is separated and a new simple method for deriving inverse kinematics without complex matrix inversion is developed. Furthermore, by analyzing the procedure of solution, the author optimizes t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Optimized Path Planning Method for Off-Line Programming of a Industrial Robot

    Publication Year: 2012, Page(s):57 - 60
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB) | HTML iconHTML

    Aimed at satisfying the demand of complex path programming for industrial robot, a computer-aided programming system based on DXF file is developed. By analyzing storage information of the graphic elements in DXF file, we develop a method to extract lines, arcs and circles, and then come up with a connect algorithm, which rearranges and connects the original isolated graphic elements in drawing or... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Realization of Grain Seed Quality Testing System Based on Particle Image Processing Technology

    Publication Year: 2012, Page(s):61 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (140 KB) | HTML iconHTML

    How to quickly and accurately identify the quality of grain seed, grain type and other basic indicators and improve the efficiency of breeding quality, wheat production and quality in the work of selection or breeding have become a serious problem. The project developed the necessary software and hardware detection device platform, carried out research on the segmentation and counting algorithms o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent and Active Defense Strategy of Cloud Computing

    Publication Year: 2012, Page(s):66 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (129 KB) | HTML iconHTML

    Cloud's development has entered the practical stage, but safety issues must be resolved. How to avoid the risk on the web page, how to prevent attacks from hacker, how to protect user data in the cloud. This paper discusses some satety solution :the credit level of web page, Trace data, analyze and filter them by large-scale statistical methods, encryption protection of user data and key managemen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrated Navigation System Design Based on DSP

    Publication Year: 2012, Page(s):69 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB) | HTML iconHTML

    Integrated navigation system has wide application prospect in the military and civilian. Navigation system directly affects the performance of direct flight control accuracy in the high-altitude unmanned flight. In this paper, micro-navigation system has been studied, based on the TMS320C6713 hardware and software design, which has a broad application prospect in field of UAV. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Evaluation of Turbo Product Codes over the PPM-based Satellite Optical Channel

    Publication Year: 2012, Page(s):72 - 75
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (199 KB) | HTML iconHTML

    Atmospheric turbulence produces fluctuations in the irradiance of the transmitted optical beam, which is known as at-mospheric scintillation, severely degrading the link performance. Turbo product codes (TPC) has attracted much attention for its high coding rate and strong abilities of defeating long burst errors, which is a good choice for the highly correlated optical channel. In this paper, a s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3D FEM Calculation for the Temperature Field of the Aluminum Electrolysis Cell Using Ansys

    Publication Year: 2012, Page(s):76 - 79
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (896 KB) | HTML iconHTML

    The mathematical model of a three-dimensional temperature field in the full 300 kA aluminum electrolysis cell was calculated with ANSYS. The calculated results revealed that the thermal gradients strongly concentrated in the lateral freeze profile of the aluminum electrolysis cell, and the sharp temperature gradient in the insulating material under the cathode carbon block were also found, the tem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on the Method of Parallel Robot Mechanism Modeling in Parallel

    Publication Year: 2012, Page(s):80 - 83
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (146 KB) | HTML iconHTML

    The modeling method of parallel robot mechanism has been extensively studied based on the Single Open Chain theory (SOC) in this paper. According to the characteristics of the parallel robot mechanism's, ideas and general methods of parallel robot mechanism modeling in parallel has been proposed and typical parallel robot mechanism's modeling has been performed. Study shows that the parallel model... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Distance Property Analysis Algorithm for FTFs in DFH Systems

    Publication Year: 2012, Page(s):84 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (262 KB) | HTML iconHTML

    By considering the frequency transition as a coding process, a new state diagram based distance property analysis algorithm for frequency transition function (FTF) is derived in this paper. In this new algorithm the distance property can be quickly obtained by solving the state equations derived from the transition process of the state diagram. It is confirmed that the BER performances of DFH syst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Grid Parallel Computing in Information Retrieval Research and Application

    Publication Year: 2012, Page(s):89 - 93
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (202 KB) | HTML iconHTML

    This paper describes in detail construction of The Grid Parallel Computing of books and documents, system solves the problems and methods, as well as design to realization of MDS module. Scientific data grid software adopt SOA, through the standardization of metadata and metadata-based resource discovery to make users can be achieved uniform access to distributed heterogeneous data resources in tw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Implementation of Teaching Management Systems Integrated of Vocational College Based on SOA

    Publication Year: 2012, Page(s):94 - 97
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB) | HTML iconHTML

    Teaching Management Systems is the center work of Vocational College. The paper discuss exist some problems of the current teaching management systems, according to theoretical system based on service-oriented architecture, we propose a sort of architecture and hierarchical model SOA-based about academic management system, develop a integrated platform of teaching information system on web service... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structural Finite Element Method Based on Cloud Computing

    Publication Year: 2012, Page(s):98 - 101
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (149 KB) | HTML iconHTML

    The structural finite element method has been widely used in modern architecture high-performance computing. And a lot of finite element tools based on parallel computing model have emerged. This paper analyzes and compares the difference between MPI and Map Reduce programming model. The combination of MPI and Map Reduce has been presented for the parallel finite element analysis based on the clou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Density-Based Clustering Algorithm for Uncertain Data

    Publication Year: 2012, Page(s):102 - 105
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (159 KB) | HTML iconHTML

    As the development of the data acquisition technology, the research of the uncertain data has been the center of people's attention, and at the same time, the cluster of the uncertain data has been in use widely. In this paper, after studying the cluster of the uncertain data, considering characters of the uncertain data, we propose a improved algorithm. We called it En-DBSCAN. In order to adapt t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Screen Luminance, Subtitle, and Viewing Angle on Viewing Distance of Liquid Crystal Display High-Definition Television

    Publication Year: 2012, Page(s):106 - 109
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (163 KB) | HTML iconHTML

    This study explored the effect of screen luminance, subtitle, and viewing angle on preferred viewing distance for liquid crystal display high-definition television (LCD-HDTV). The results showed the mean preferred viewing distance was 3246 mm, about 4 times of television width. Preferred viewing distance increased as the scale of screen luminance went upward from scale 10 to scale 60, then decreas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chromaticity and Luminance on Visual Performance and Subjective Performance for Imagery on LCD

    Publication Year: 2012, Page(s):110 - 112
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB) | HTML iconHTML

    This study investigated the effects of chromaticity and luminance on legibility and subjective preference for imagery presented on LCD. The results showed that chromaticity and luminance had little effect on legibility speed. Both chromaticity and luminance significantly affected subjective preference. Chromaticity seemed to be more important than luminance for subjective preference. Participants ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of a Capture Technique to the 3D Harbor Construction

    Publication Year: 2012, Page(s):113 - 117
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (737 KB) | HTML iconHTML

    The main purpose of this paper is to design an innovative ship handling simulation program by combining the development of Quest3D software and the Google earth harbor terrain software. The paper describes the usage of the Google earth program to retrieve the latitude and longitude elevation, through GIS conversion and 3D graphical model to generate the Quest 3D harbor construction blueprint. Proj... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Crack Image Extraction Using a Radial Basis Functions Based Level Set Interpolation Technique

    Publication Year: 2012, Page(s):118 - 122
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    The extraction of crack images is an important process in the area of structural health monitoring for determining the severity of the damage induced by cracks. In this paper, a radial basis functions (RBFs) based level set interpolation technique is proposed to extract the images of cracks in structures. In the proposed method, the level set in the form of radial basis functions with an ellipse c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Interval-Valued Fuzzy Analytical Hierarchy Process Approach and Its Application

    Publication Year: 2012, Page(s):123 - 128
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (337 KB) | HTML iconHTML

    Project evaluation and selection is a complex multi-attribute decision-making problem. With the information uncertainty and inaccuracy considered, a new model for project evaluation and selection is proposed, which combines the fuzzy analytic hierarchy process (AHP) and technique for order performance by similarity to ideal solution (TOPSIS). The hybrid method is based on interval-valued triangula... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Optimization of Ethernet Access System for Receiving Frames of Ethernet Based on FPGA

    Publication Year: 2012, Page(s):129 - 133
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    The purpose of this paper is to design and develop an implementation for the underlying data reception on Field Programmable Gate Arrays (FPGA) by top-down structured design. In this paper, we optimize the receiving data function of underlying Ethernet access device, reducing the requirement of the Inter-Packet Gap (IPG) for flow control. It is shown by the test that Ethernet access device don't n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Petri Net Modeling of SIP of Traversing NAT Based on STUN

    Publication Year: 2012, Page(s):134 - 138
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB) | HTML iconHTML

    Petri net is widely used in the simulation and analysis of the discrete event systems because of the features such as intuition, simplicity and understandability. The paper used Petri net to model and analyse SIP protocol of traversing NAT. Firstly the paper proposed using STUN to implement the NAT traversal of SIP protocol and simply introduced the advantages of Petri net modeling, then introduce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Self-Rollback System for Vulnerability Attack

    Publication Year: 2012, Page(s):139 - 143
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    In the paper attacks in view of the procedure loophole, proposed when the procedure movement from restores and returns draws back the method. First knows in the method to the procedure entrance point returns as the procedure draws back the spot , next when procedure collapse distinguishes and locates the procedure loophole, finally analyzes between the loophole input and exterior input dependent r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interactive Genetic Algorithms with Grey Modeling for Individuals Fitness

    Publication Year: 2012, Page(s):144 - 147
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (155 KB) | HTML iconHTML

    In order to apply the interactive Genetic Algorithms (GA) into complicated optimization problem, an interactive Genetic Algorithms with grey prediction for fitness of evolutionary individuals is proposed, in which the uncertainty of evolutionary individuals is measured by gery modeling. By predicting the grey modeling, the reliableness which reflecting the measurement is abstracted. On this basis,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploring Speculative Procedure Level Parallelism from Multimedia Applications

    Publication Year: 2012, Page(s):148 - 151
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (165 KB) | HTML iconHTML

    Multimedia applications are fast becoming one of the dominating workloads for modern computer systems. How to make use of multicore computing resources to accelerate multimedia applications has become a common concern problem. However, potential speculative procedure level parallelism in multimedia applications has not yet been explored thoroughly. This paper proposes a procedure level speculation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hybrid Diff-SerV Pricing Scheme for Wireless Data Services

    Publication Year: 2012, Page(s):152 - 156
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB) | HTML iconHTML

    With the development of wireless mobile communication, more and more wireless data services have gradually emerged, calling for effective pricing mechanism due to the nonapplicable traditional one. In this paper, a novel hybrid Diff-SerV pricing method for wireless data services is proposed, which considers radio resources, service characteristics as well as quality of service (QoS). The kernel of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of the Platform for Mobile Service Support Based on Massive Signaling Mining

    Publication Year: 2012, Page(s):157 - 160
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    On the basis of the research of massive signaling mining, obtain user track, analyze user behavior, mine user preference, and then utilize 3G mobile communications network technology to design a platform of mobile service support, which generalizes the signaling information for all types of customers and makes statistics, and reasons customized information intelligently, extracts effective data th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Implementation of an Intelligent Information Integration System Based on Android Mobile Terminals

    Publication Year: 2012, Page(s):161 - 165
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB) | HTML iconHTML

    The development of mobile terminals, 3G and networks, has brought strong momentum and broad prospects to the development of applications based on mobile internet [1][2][3]. On the other hand, users hope to get the information they want at anytime, anywhere through mobile devices rather than relying on a PC. This paper puts forwards an e intelligent information integration system based on Android m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research and Implementation of Jacobi Algorithm Based on MPI with Checkerboard Decomposition

    Publication Year: 2012, Page(s):166 - 169
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (314 KB) | HTML iconHTML

    In order to achieve parallel algorithm ported from serial algorithm, this paper proposes a simplified model based on MPI checkerboard decomposition. The process of analysis, design and implementation of parallel program will be speed up, by emphasizing data and calculation decomposition. Jacobi algorithm is used as an example to explain this simplified model. The example results show that simplifi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • J2EE-based Online Video Retrieving System Design and Implementation

    Publication Year: 2012, Page(s):170 - 173
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (459 KB) | HTML iconHTML

    Most video contents on the Internet are regularly watched online, but it is also necessary for users to download them to local storage for further processing. Currently, many online video websites provide their own service for website specific video retrieving, it is difficult to build an integrated web retrieving system adapted for all online video website due to different protocols. This paper p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of the Digital Frame Extractor Based on OMAP-L138 Application Processor

    Publication Year: 2012, Page(s):174 - 177
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (602 KB) | HTML iconHTML

    The OMAP-L138 application processor is a dual core SOC(ARM926EJ-S and C6478VIEW DSP) chip developed by the Texas Instruments. In the paper, the performance features of the OMAP-L138 chip is introduced and a design scheme of the digital frame extractor based on the OMAP-L138 is proposed. The video input module and output module, the SATA hard disk module, the network module of the digital extractor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Two-step Discretization Algorithm Based on Rough Set

    Publication Year: 2012, Page(s):178 - 182
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (177 KB) | HTML iconHTML

    A two-step discretization algorithm by dynamic clustering based on Rough set is proposed. The algorithm first discretization for decision table using dynamic clustering algorithm, then discrete again using cut importance discretization algorithms, and obtain the final cut sets, because the dynamic clustering algorithm processing speed is quickly and it impel a lot of breakpoint be screened, thus t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.