首页 > 最新文献

5th International Conference on Computer Sciences and Convergence Information Technology最新文献

英文 中文
Color image transform coding based on three dimensional variable vector matrix size segmentation 基于三维可变矢量矩阵大小分割的彩色图像变换编码
A. Sang, Xin Zhao, Hexin Chen, Silin Mang
Three-dimensional vector matrix discrete cosine transform coding (3DVMDCT) deals with each component of color image in a unified model, fully eliminates the correlation between them and gets an obvious advantage. But its block-size of image segmentation is fixed and does not fully take into account that there are different statistical properties in different regions. In this paper, we take gradient as the image measure activity (IAM), propose a new method—variable matrix-size three-dimensional vector matrix image segmentation (VMS-3DVMDCT), and implement the corresponding multi-dimensional vector matrix discrete cosine transform coding, experimental results show that, compared with the fixed block partition, the proposed algorithm improves PSNR at most 1dB, and the quality of the reconstructed image is improved in subject evaluation, much better than JPEG.
三维矢量矩阵离散余弦变换编码(3DVMDCT)对彩色图像的各个分量进行统一的处理,充分消除了它们之间的相关性,具有明显的优势。但其图像分割的块大小是固定的,没有充分考虑到不同区域的统计性质不同。本文以梯度作为图像度量活动(IAM),提出了一种新的方法——变矩阵大小的三维矢量矩阵图像分割(VMS-3DVMDCT),并实现了相应的多维矢量矩阵离散余弦变换编码,实验结果表明,与固定块分割相比,所提算法的PSNR最多提高了1dB,重构图像的质量在受试者评价中得到了提高,远优于JPEG。
{"title":"Color image transform coding based on three dimensional variable vector matrix size segmentation","authors":"A. Sang, Xin Zhao, Hexin Chen, Silin Mang","doi":"10.1109/ICCIT.2010.5711048","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711048","url":null,"abstract":"Three-dimensional vector matrix discrete cosine transform coding (3DVMDCT) deals with each component of color image in a unified model, fully eliminates the correlation between them and gets an obvious advantage. But its block-size of image segmentation is fixed and does not fully take into account that there are different statistical properties in different regions. In this paper, we take gradient as the image measure activity (IAM), propose a new method—variable matrix-size three-dimensional vector matrix image segmentation (VMS-3DVMDCT), and implement the corresponding multi-dimensional vector matrix discrete cosine transform coding, experimental results show that, compared with the fixed block partition, the proposed algorithm improves PSNR at most 1dB, and the quality of the reconstructed image is improved in subject evaluation, much better than JPEG.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128778431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A meta Problem Solving Environment (PSE) 元问题解决环境(PSE)
Hiromichi Kobashi, S. Kawata, H. Usami, S. Kawata, M. Matsumoto, D. Barada
In this paper, we introduce a new framework called PSE Park for constructing a Problem Solving Environment (PSE); it enables us to construct PSEs easily. PSE Park outputs PSEs depending on user's demand/input. In this sense, PSE Park is a kind of PSE for PSE, and helps users to construct PSEs. PSE Park consists of four engines: PIPE server, core, registration engine, and console. A PSE designed and constructed in PSE Park consists of several cores, which are functions of a PSE. The PIPE server manages the cores on the basis of the core map, which expresses the flow of the cores for a specific PSE. The output of each core is retrieved and merged by the PIPE server. All outputs of the cores are saved and easily reused. The cores are independent of programming languages because each core is executed individually as a process in PSE Park. They are registered by using the registration engine, and users access the engines via the console. All data including the core itself, definitions related to the core, the core map, results, and so on are stored in a distributed key-value store on the cloud computing environment. PSE Park retrieves the data by using a key name that can identify individual data uniquely. We applied PSE Park to develop the job execution PSE and the PSE for partial differential equation (PDE)-based problems. The job execution PSE helps Finite Difference Time Domain (FDTD) simulation execution. This PSE outputs the simulation results of the electric field. PDE-based PSE supports some simulation steps. Seven cores were used to construct this example PSE. By using this PSE, users can execute a PDE-based simulation and obtain a detailed document about the simulation. We believe that the concept of PSE Park, i.e., a framework for PSE development, presents a meaningful new direction for problem solving environments.
在本文中,我们引入了一个名为PSE Park的新框架来构建问题解决环境(PSE);它使我们能够很容易地构建pse。PSE Park根据用户的需求/输入输出PSE。从这个意义上说,PSE Park是一种针对PSE的PSE,帮助用户构建PSE。PSE Park由四个引擎组成:PIPE服务器、核心、注册引擎和控制台。在PSE Park中设计和构建的PSE由几个核心组成,这些核心是PSE的功能。PIPE服务器基于内核映射管理内核,内核映射表示特定PSE的内核流。每个核心的输出由PIPE服务器检索和合并。核心的所有输出都被保存并易于重用。内核独立于编程语言,因为每个内核在PSE Park中作为一个进程单独执行。它们通过使用注册引擎进行注册,用户通过控制台访问引擎。所有数据,包括核心本身、与核心相关的定义、核心映射、结果等,都存储在云计算环境中的分布式键值存储中。PSE Park通过使用可以唯一标识单个数据的键名检索数据。我们利用PSE Park开发了作业执行PSE和基于偏微分方程(PDE)问题的PSE。作业执行PSE有助于有限差分时域(FDTD)仿真的执行。该PSE输出电场的仿真结果。基于pde的PSE支持一些仿真步骤。使用了7个内核来构建这个示例PSE。通过使用该PSE,用户可以执行基于PSE的仿真,并获得关于仿真的详细文档。我们相信,PSE公园的概念,即PSE开发的框架,为解决问题的环境提供了一个有意义的新方向。
{"title":"A meta Problem Solving Environment (PSE)","authors":"Hiromichi Kobashi, S. Kawata, H. Usami, S. Kawata, M. Matsumoto, D. Barada","doi":"10.1109/ICCIT.2010.5711067","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711067","url":null,"abstract":"In this paper, we introduce a new framework called PSE Park for constructing a Problem Solving Environment (PSE); it enables us to construct PSEs easily. PSE Park outputs PSEs depending on user's demand/input. In this sense, PSE Park is a kind of PSE for PSE, and helps users to construct PSEs. PSE Park consists of four engines: PIPE server, core, registration engine, and console. A PSE designed and constructed in PSE Park consists of several cores, which are functions of a PSE. The PIPE server manages the cores on the basis of the core map, which expresses the flow of the cores for a specific PSE. The output of each core is retrieved and merged by the PIPE server. All outputs of the cores are saved and easily reused. The cores are independent of programming languages because each core is executed individually as a process in PSE Park. They are registered by using the registration engine, and users access the engines via the console. All data including the core itself, definitions related to the core, the core map, results, and so on are stored in a distributed key-value store on the cloud computing environment. PSE Park retrieves the data by using a key name that can identify individual data uniquely. We applied PSE Park to develop the job execution PSE and the PSE for partial differential equation (PDE)-based problems. The job execution PSE helps Finite Difference Time Domain (FDTD) simulation execution. This PSE outputs the simulation results of the electric field. PDE-based PSE supports some simulation steps. Seven cores were used to construct this example PSE. By using this PSE, users can execute a PDE-based simulation and obtain a detailed document about the simulation. We believe that the concept of PSE Park, i.e., a framework for PSE development, presents a meaningful new direction for problem solving environments.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127359499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Online dental information database for dental identification system 用于牙科识别系统的在线牙科信息数据库
W. Bholsithi, Natthawadee Phichitchaiphan, C. Sinthanayothin
Dental cast models along with dental identification data have been extensively applied in cephalometric analysis and dental identification. However, the lack of database to handle both dental cast models along with dental identification data has prevent the researchers and dentists from making an access into the dental information for further dental researches. The solution is to create the online dental model database to collect both 2D and 3D dental cast images with the search function from the information of both dentists who collect the dental model images and other dentists who are database users. Furthermore, the online dental database has facilities to record the dental identification data from individual teeth and the overall dental structure in details useful for dealing with the missing persons by matching the postmortem dental artifacts with the dental records from dental model and dental identification data.
牙科铸型模型和牙科识别数据已广泛应用于头颅测量分析和牙科识别。然而,由于缺乏处理铸型模型和牙科识别数据的数据库,研究人员和牙医无法访问牙科信息,以进行进一步的牙科研究。解决方案是创建在线牙科模型数据库,收集2D和3D牙科铸型图像,并具有从收集牙科模型图像的牙医和作为数据库用户的其他牙医的信息中搜索的功能。此外,在线牙科数据库还具有通过将死后的牙齿人工制品与牙齿模型和牙齿识别数据中的牙齿记录相匹配,详细记录来自单个牙齿和整体牙齿结构的牙齿识别数据的功能,这对处理失踪人员有用。
{"title":"Online dental information database for dental identification system","authors":"W. Bholsithi, Natthawadee Phichitchaiphan, C. Sinthanayothin","doi":"10.1109/ICCIT.2010.5711071","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711071","url":null,"abstract":"Dental cast models along with dental identification data have been extensively applied in cephalometric analysis and dental identification. However, the lack of database to handle both dental cast models along with dental identification data has prevent the researchers and dentists from making an access into the dental information for further dental researches. The solution is to create the online dental model database to collect both 2D and 3D dental cast images with the search function from the information of both dentists who collect the dental model images and other dentists who are database users. Furthermore, the online dental database has facilities to record the dental identification data from individual teeth and the overall dental structure in details useful for dealing with the missing persons by matching the postmortem dental artifacts with the dental records from dental model and dental identification data.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132649435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The scheduling of steel-making and continuous casting process using branch and cut method via CPLEX optimization 用CPLEX优化方法对支切法炼钢和连铸工艺进行了调度
Liangliang Sun, W. Liu, Baoxing Xu, T. Chai
The steel-making and continuous casting process is the connection between the iron process and the rolling process; it is the bottleneck in the iron and steel production. A better scheduling of this process is the key factor to ensure the whole production in a well-organized rhythm for iron and steel production manufacturing productivity. The branch and cut method in the standard commercial solver CPLEX is introduced to solve the scheduling problem. The linearization methods for the linear conversion are highlighted. Due to the limited calculation time requirement about the scheduling results and the scale of the problem, special methods for the efficiency tuning are applied according to the characters of the problem. Numerical testing supported by Shanghai Bashan steel plant demonstrated that the computational results show significant improvement compared to the traditional manual scheduling results.
炼钢连铸工艺是炼铁工艺与轧制工艺的连接;这是钢铁生产的瓶颈。对这一过程进行更好的调度,是保证整个生产过程井然有序,提高钢铁生产生产效率的关键因素。引入标准商用求解器CPLEX中的分支切割法来求解调度问题。重点介绍了线性转换的线性化方法。由于调度结果的计算时间要求和问题的规模有限,根据问题的特点,采用了特殊的效率调优方法。上海巴山钢铁厂的数值试验表明,与传统的人工调度结果相比,计算结果有明显改善。
{"title":"The scheduling of steel-making and continuous casting process using branch and cut method via CPLEX optimization","authors":"Liangliang Sun, W. Liu, Baoxing Xu, T. Chai","doi":"10.1109/ICCIT.2010.5711147","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711147","url":null,"abstract":"The steel-making and continuous casting process is the connection between the iron process and the rolling process; it is the bottleneck in the iron and steel production. A better scheduling of this process is the key factor to ensure the whole production in a well-organized rhythm for iron and steel production manufacturing productivity. The branch and cut method in the standard commercial solver CPLEX is introduced to solve the scheduling problem. The linearization methods for the linear conversion are highlighted. Due to the limited calculation time requirement about the scheduling results and the scale of the problem, special methods for the efficiency tuning are applied according to the characters of the problem. Numerical testing supported by Shanghai Bashan steel plant demonstrated that the computational results show significant improvement compared to the traditional manual scheduling results.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116599764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An framework for team cooperation in engineering project management 工程项目管理中的团队合作框架
Zhao Shide, X. Xue
In order to achieve effective cooperation of the engineering project team, this paper constructed the cooperation model of the engineering project team and analyzed the cultural regulating, profit regulating and institution regulating in the engineering project team form the viewing angle of system theory based on existing research results. Furthermore, this paper proposed four kinds of management methods of engineering project team cooperation, such as team reliance management, team conflict management, team study management and team encouragement management.
为了实现工程项目团队的有效合作,本文在已有研究成果的基础上,构建了工程项目团队的合作模型,并以系统论的视角对工程项目团队中的文化调节、利益调节和制度调节进行了分析。在此基础上,提出了工程项目团队合作的四种管理方法:团队信赖管理、团队冲突管理、团队学习管理和团队鼓励管理。
{"title":"An framework for team cooperation in engineering project management","authors":"Zhao Shide, X. Xue","doi":"10.1109/ICCIT.2010.5711154","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711154","url":null,"abstract":"In order to achieve effective cooperation of the engineering project team, this paper constructed the cooperation model of the engineering project team and analyzed the cultural regulating, profit regulating and institution regulating in the engineering project team form the viewing angle of system theory based on existing research results. Furthermore, this paper proposed four kinds of management methods of engineering project team cooperation, such as team reliance management, team conflict management, team study management and team encouragement management.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130993675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A recoverable watermarking for authentication using Singular Value Decomposition 基于奇异值分解的可恢复认证水印
Kil-Sang Yoo
In this paper, we propose a new method for authentication, and recoverability of digital images using Singular Value Decomposition. Using this technique, we can detect any modification made to the image and indicate the specific locations where the modification was made. The new method is recoverable in the sense that, if the image is deemed authentic, the distortion on the extraction procedure can be removed to obtain the original image data. Authentication data is produced from XOR operation between watermark image and binary bits obtained from singular value of one block image. If the unmodified watermarked image is used, the extraction process will return the correct watermark signal and exact original image. The techniques provide new assurance tools for integrity protection of sensitive imagery such as medical images.
本文提出了一种新的基于奇异值分解的数字图像认证和恢复方法。使用这种技术,我们可以检测到对图像所做的任何修改,并指出修改的具体位置。新方法是可恢复的,即如果图像被认为是真实的,则可以去除提取过程中的失真,从而获得原始图像数据。认证数据是由水印图像与由单个块图像的奇异值得到的二进制位进行异或运算产生的。如果使用未经修改的水印图像,提取过程将返回正确的水印信号和准确的原始图像。该技术为医学图像等敏感图像的完整性保护提供了新的保证工具。
{"title":"A recoverable watermarking for authentication using Singular Value Decomposition","authors":"Kil-Sang Yoo","doi":"10.1109/ICCIT.2010.5711209","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711209","url":null,"abstract":"In this paper, we propose a new method for authentication, and recoverability of digital images using Singular Value Decomposition. Using this technique, we can detect any modification made to the image and indicate the specific locations where the modification was made. The new method is recoverable in the sense that, if the image is deemed authentic, the distortion on the extraction procedure can be removed to obtain the original image data. Authentication data is produced from XOR operation between watermark image and binary bits obtained from singular value of one block image. If the unmodified watermarked image is used, the extraction process will return the correct watermark signal and exact original image. The techniques provide new assurance tools for integrity protection of sensitive imagery such as medical images.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131451338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BENPro: A blinding protection method in digital right management BENPro:数字版权管理中的一种盲保护方法
Kullapat Theera-angkananon, P. Bhattarakosol
Internet is a global system of interconnected computer networks that helps users reach to all digital data, such as multimedia files. So, this leads to plagiarization, violation of copyrights and data over the Internet. Thus, the digital intellectual property becomes a big issue of the Internet sharing system. Various techniques have been proposed to protect these violations; unfortunately, they became the hackers' stimuli in breaking the protection mechanisms. Therefore, this paper proposes a protection mechanism, Byte Encoding Protection (BENPro), for preventing an audio file, such as mp3 format from copying and distributing by illegal distributors. The aim of this paper is that the protection mechanism cannot be recognized from hackers and users. The result of this experiment indicates that most users believe that the defects occur from the transfer mechanism rather than the protection mechanism. Thus, the protection of IP is maintained as expected.
因特网是一个由相互连接的计算机网络组成的全球系统,它帮助用户获取所有数字数据,如多媒体文件。因此,这导致了抄袭,侵犯版权和互联网上的数据。因此,数字知识产权成为互联网共享系统的一大问题。已经提出了各种技术来保护这些违规行为;不幸的是,它们成为黑客破坏保护机制的刺激物。为此,本文提出了一种防止mp3格式音频文件被非法发布者复制和传播的保护机制——字节编码保护(Byte Encoding protection, BENPro)。本文的研究目的在于保护机制不能被黑客和用户识别。实验结果表明,大多数用户认为缺陷是由传递机制而不是保护机制产生的。因此,知识产权保护得到了应有的维护。
{"title":"BENPro: A blinding protection method in digital right management","authors":"Kullapat Theera-angkananon, P. Bhattarakosol","doi":"10.1109/ICCIT.2010.5711113","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711113","url":null,"abstract":"Internet is a global system of interconnected computer networks that helps users reach to all digital data, such as multimedia files. So, this leads to plagiarization, violation of copyrights and data over the Internet. Thus, the digital intellectual property becomes a big issue of the Internet sharing system. Various techniques have been proposed to protect these violations; unfortunately, they became the hackers' stimuli in breaking the protection mechanisms. Therefore, this paper proposes a protection mechanism, Byte Encoding Protection (BENPro), for preventing an audio file, such as mp3 format from copying and distributing by illegal distributors. The aim of this paper is that the protection mechanism cannot be recognized from hackers and users. The result of this experiment indicates that most users believe that the defects occur from the transfer mechanism rather than the protection mechanism. Thus, the protection of IP is maintained as expected.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132364644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Key factors influencing the decision-making of lump-sum contracting project delivery methods in China 影响中国总承包工程交付方式决策的关键因素
Wang Xuetong
20 factors are selected to frame a primary factor set from 38 factors obtained through literature study. The methods of Mean Score and Ranking Agreement Factor are applied to calculate the sorting order and analyze the consistency of market survey data. The results show that 17 factors concerning owner's engineering capabilities, owner's preferences to project construction, project properties, and lump-sum contracting market conditions exert a profound influence on the decision-making of lump-sum contracting project delivery methods. Finally, countermeasures and suggestions are proposed to promote a rapid and sound development of lump-sum contracting system in Chinese construction industry.
从文献研究得到的38个因子中选取20个因子构成主因子集。采用均分法和排序一致因子法计算市场调查数据的排序顺序,分析市场调查数据的一致性。结果表明,业主的工程能力、业主对工程建设的偏好、工程性质、总承包市场条件等17个因素对总承包工程交付方式的决策产生了深远的影响。最后,提出了促进我国建筑业总承包制度快速健康发展的对策建议。
{"title":"Key factors influencing the decision-making of lump-sum contracting project delivery methods in China","authors":"Wang Xuetong","doi":"10.1109/ICCIT.2010.5711165","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711165","url":null,"abstract":"20 factors are selected to frame a primary factor set from 38 factors obtained through literature study. The methods of Mean Score and Ranking Agreement Factor are applied to calculate the sorting order and analyze the consistency of market survey data. The results show that 17 factors concerning owner's engineering capabilities, owner's preferences to project construction, project properties, and lump-sum contracting market conditions exert a profound influence on the decision-making of lump-sum contracting project delivery methods. Finally, countermeasures and suggestions are proposed to promote a rapid and sound development of lump-sum contracting system in Chinese construction industry.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128459794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on the inter-organizational tacit knowledge transfer network 组织间隐性知识转移网络研究
Z. Chen
Analyzed individual's main role in tacit knowledge transfer between organizations. Based on social network theory and method, the relationships of tacit knowledge transfer among members of different organizations were taken as a social network. Tacit knowledge transfer network of UIC as an example is analyzed from both qualitative and quantitative perspective, the network's structure and characteristics were measured and analyzed, then the effect of network's formal and informal transfer channels on tacit knowledge transfer was revealed. Obtained conclusions that inter-organizational tacit knowledge transfer network has the features of social network and obvious hierarchy, the degree of close contact within the organization is greater than that between organizations, network which has both formal and informal channels in the dependence of intermediary role is far below than the one which has only informal channel, formal transfer channel can increase network centralization and improve transfer efficiency, while informal channel reduces network intermediary and vulnerability.
分析了个体在组织间隐性知识转移中的主要作用。基于社会网络理论和方法,将不同组织成员之间的隐性知识转移关系视为一个社会网络。本文从定性和定量两方面对UIC的隐性知识转移网络进行了分析,对网络的结构和特征进行了测量和分析,揭示了网络的正式和非正式转移渠道对隐性知识转移的影响。得出结论:组织间隐性知识转移网络具有社会网络特征和明显的层次性,组织内部的密切联系程度大于组织间的密切联系程度,同时具有正式和非正式渠道的网络对中介角色的依赖程度远低于仅具有非正式渠道的网络,正式转移渠道可以增加网络集中度,提高转移效率;而非正式通道减少了网络中介和脆弱性。
{"title":"Study on the inter-organizational tacit knowledge transfer network","authors":"Z. Chen","doi":"10.1109/ICCIT.2010.5711175","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711175","url":null,"abstract":"Analyzed individual's main role in tacit knowledge transfer between organizations. Based on social network theory and method, the relationships of tacit knowledge transfer among members of different organizations were taken as a social network. Tacit knowledge transfer network of UIC as an example is analyzed from both qualitative and quantitative perspective, the network's structure and characteristics were measured and analyzed, then the effect of network's formal and informal transfer channels on tacit knowledge transfer was revealed. Obtained conclusions that inter-organizational tacit knowledge transfer network has the features of social network and obvious hierarchy, the degree of close contact within the organization is greater than that between organizations, network which has both formal and informal channels in the dependence of intermediary role is far below than the one which has only informal channel, formal transfer channel can increase network centralization and improve transfer efficiency, while informal channel reduces network intermediary and vulnerability.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"4 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114052283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gray-based news video text extraction approach 基于灰度的新闻视频文本提取方法
F. Xiaoling, Gao Hua
In the news video, As a high-level semantic features, video text play a crucial role for the semantics understanding, video analysis, quick video clips retrieval of news video. We propose a new video character extraction method that is gray-based. It makes full use of gray information of the video image and the news video text features to detect the video frame which contain text information, and uses mathematical statistical method to find the location where text appears, then do the binary processing of the candidate region image, at last uses OCR software package to recognize the text. This article also finish a simple news video retrieval system, and text extraction algorithm is applied to the system. Experiment results on Chinese CCTV news video show the encouraging performance of the proposed algorithm.
在新闻视频中,视频文本作为一种高级的语义特征,对新闻视频的语义理解、视频分析、快速视频剪辑检索起着至关重要的作用。提出了一种新的基于灰度的视频字符提取方法。它充分利用视频图像的灰度信息和新闻视频的文本特征来检测含有文本信息的视频帧,并利用数理统计的方法找到文本出现的位置,然后对候选区域图像进行二值处理,最后使用OCR软件包对文本进行识别。本文还完成了一个简单的新闻视频检索系统,并将文本提取算法应用到系统中。在中国CCTV新闻视频上的实验结果表明了该算法令人鼓舞的性能。
{"title":"Gray-based news video text extraction approach","authors":"F. Xiaoling, Gao Hua","doi":"10.1109/ICCIT.2010.5711058","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711058","url":null,"abstract":"In the news video, As a high-level semantic features, video text play a crucial role for the semantics understanding, video analysis, quick video clips retrieval of news video. We propose a new video character extraction method that is gray-based. It makes full use of gray information of the video image and the news video text features to detect the video frame which contain text information, and uses mathematical statistical method to find the location where text appears, then do the binary processing of the candidate region image, at last uses OCR software package to recognize the text. This article also finish a simple news video retrieval system, and text extraction algorithm is applied to the system. Experiment results on Chinese CCTV news video show the encouraging performance of the proposed algorithm.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122395216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
5th International Conference on Computer Sciences and Convergence Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1