Pub Date : 2010-12-01DOI: 10.1109/PIC.2010.5687597
Fei Gu, L. Tao
Information extraction and three-dimensional reconstruction of blood vessel are keystones in visualization of medical images. Firstly, an improved Sobel algorithm combined with fuzzy theory is presented, which is used to extract the cerebral information of serial images and can solve the contradiction between preservation of detail information and high de-noising ability effectively. Then, an improved ray casting volume rendering algorithm based on fusion segmentations is used to improve the rendering speed with a better rendering quality. The experiments show that the presented new method can preserve more complete blood vessel 3-D information and obtain good de-noising effect. This new method can produce better rendering quality and speeds up the volume rendering.
{"title":"Study on cerebral vascular extraction and three-dimensional reconstruction based on MRI","authors":"Fei Gu, L. Tao","doi":"10.1109/PIC.2010.5687597","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687597","url":null,"abstract":"Information extraction and three-dimensional reconstruction of blood vessel are keystones in visualization of medical images. Firstly, an improved Sobel algorithm combined with fuzzy theory is presented, which is used to extract the cerebral information of serial images and can solve the contradiction between preservation of detail information and high de-noising ability effectively. Then, an improved ray casting volume rendering algorithm based on fusion segmentations is used to improve the rendering speed with a better rendering quality. The experiments show that the presented new method can preserve more complete blood vessel 3-D information and obtain good de-noising effect. This new method can produce better rendering quality and speeds up the volume rendering.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117296244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The United Nations has six official languages in its documentation. Most documents, all the resolutions in particular, are very well translated manually. They are very good texts for contrastive and translation studies. In order to make it more convenient for the language teachers and researchers to do computer processing, all the six versions of the resolutions are paragraph (clause) aligned. Problems encountered in the alignment are described and pilot investigations of the English and French preambular guide words, the head nouns of the Chinese and English document titles, and the structure of conference names in Chinese and English are reported as examples of its applications in contrastive and translation studies.
{"title":"Multilingual parallel corpus of UN documents for contrastive and translation studies","authors":"Jingxiang Cao, Xu Jin, Xueyong Gao, Jiadong Sun, Jiayang Zhou","doi":"10.1109/PIC.2010.5687463","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687463","url":null,"abstract":"The United Nations has six official languages in its documentation. Most documents, all the resolutions in particular, are very well translated manually. They are very good texts for contrastive and translation studies. In order to make it more convenient for the language teachers and researchers to do computer processing, all the six versions of the resolutions are paragraph (clause) aligned. Problems encountered in the alignment are described and pilot investigations of the English and French preambular guide words, the head nouns of the Chinese and English document titles, and the structure of conference names in Chinese and English are reported as examples of its applications in contrastive and translation studies.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115339348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-01DOI: 10.1109/PIC.2010.5687871
Yi Zhang, Jianyan Chen, Shengping Zhang
Computer assisted diagnosis has been widely used in practice with the fast development of medical imaging. As a key technique, medical image processing plays an essential role in computer assisted diagnosis. However, most pattern discovering methods focus on human structure images as CT, MRT while very little work has been done in micrograph. In this paper, we proposed a set of simple statistical operations to detect accompanying pattern in micrograph. The samples of different tissues are compared from both spatial distribution and growing direction to check if they fit in the same pattern. The main purpose of this research is to help cancer expert analyze the cause of cancer. Taken breast cancer as experimental case, our results illustrated the accompanying pattern between blood vessels and dead cells.
{"title":"Accompanying pattern detection for tumor pathological section using statistical method","authors":"Yi Zhang, Jianyan Chen, Shengping Zhang","doi":"10.1109/PIC.2010.5687871","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687871","url":null,"abstract":"Computer assisted diagnosis has been widely used in practice with the fast development of medical imaging. As a key technique, medical image processing plays an essential role in computer assisted diagnosis. However, most pattern discovering methods focus on human structure images as CT, MRT while very little work has been done in micrograph. In this paper, we proposed a set of simple statistical operations to detect accompanying pattern in micrograph. The samples of different tissues are compared from both spatial distribution and growing direction to check if they fit in the same pattern. The main purpose of this research is to help cancer expert analyze the cause of cancer. Taken breast cancer as experimental case, our results illustrated the accompanying pattern between blood vessels and dead cells.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116201801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-01DOI: 10.1109/PIC.2010.5687882
Shewei Wang, Min Song
To deal with database security of Management Information System (MIS), a database encryption solution is designed and implemented. Analyzing the relation of database openness and security in the traditional model of MIS, the paper constructs an improved security model of MIS. Based on database encryption theory, a multilevel cipher solution of application system is implemented in SQL Server 2005. Several experiments are carried out to compare the time spending of data manipulation based on some encryption algorithms in database. The result shows that the symmetric encryption increases the time cost about 1/3 while the asymmetric encryption increases much more. The solution is effective if it is applied to sensible data.
为了解决管理信息系统(MIS)数据库的安全问题,设计并实现了一种数据库加密方案。分析了传统管理信息系统模型中数据库的开放性与安全性的关系,构建了一个改进的管理信息系统安全模型。基于数据库加密理论,在SQL Server 2005中实现了应用系统的多级密码解决方案。通过实验比较了几种数据库加密算法对数据操作的耗时。结果表明,对称加密的时间开销增加约1/3,而非对称加密的时间开销增加更多。如果将该解决方案应用于敏感数据,则该解决方案是有效的。
{"title":"Improved security mechanism of Management Information System","authors":"Shewei Wang, Min Song","doi":"10.1109/PIC.2010.5687882","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687882","url":null,"abstract":"To deal with database security of Management Information System (MIS), a database encryption solution is designed and implemented. Analyzing the relation of database openness and security in the traditional model of MIS, the paper constructs an improved security model of MIS. Based on database encryption theory, a multilevel cipher solution of application system is implemented in SQL Server 2005. Several experiments are carried out to compare the time spending of data manipulation based on some encryption algorithms in database. The result shows that the symmetric encryption increases the time cost about 1/3 while the asymmetric encryption increases much more. The solution is effective if it is applied to sensible data.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116223473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-01DOI: 10.1109/PIC.2010.5687923
Binbin Li
By means of discrete processing on the small watershed, the paper defined the elements of a watershed like the source point, confluence point, outlet point, single runoff and composite runoff based on the set theory, proposed an algorithm and implemented it. Based on the hydrologic simulation, the algorithm solved the problem of identifying the watershed outlet point and loop which made the runoff traced more realistic, simple, efficient, and practical. An application system was developed based on the algorithm, and was applied to the distributed prediction modeling for the watershed hydrology and erosion of the loess hilly-gully areas, and achieved appreciable results.
{"title":"A study and implementation of the watershed runoff extraction algorithm in the loess hilly-gully area","authors":"Binbin Li","doi":"10.1109/PIC.2010.5687923","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687923","url":null,"abstract":"By means of discrete processing on the small watershed, the paper defined the elements of a watershed like the source point, confluence point, outlet point, single runoff and composite runoff based on the set theory, proposed an algorithm and implemented it. Based on the hydrologic simulation, the algorithm solved the problem of identifying the watershed outlet point and loop which made the runoff traced more realistic, simple, efficient, and practical. An application system was developed based on the algorithm, and was applied to the distributed prediction modeling for the watershed hydrology and erosion of the loess hilly-gully areas, and achieved appreciable results.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114546794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-01DOI: 10.1109/PIC.2010.5687920
Qingyun Long, Qiaoduo Hu
Recommender systems are being improved by every means to be more accurate, more robust, and faster. Collaborative filtering is the mainstream type of recommendation algorithms, and its core is calculating the similarity between users or items based on ratings. Researchers recently found that the binary similarity based solely on who-rated-what rather than actual ratings output more accurate recommendation. We, from robust perspective, evaluated the binary collaborative filtering under multiple types of profile injection attacks on large dataset. Experimental results show binary collaborative filtering is more robust than actual ratings based collaborative filtering in all situations.
{"title":"Robust evaluation of binary collaborative recommendation under profile injection attack","authors":"Qingyun Long, Qiaoduo Hu","doi":"10.1109/PIC.2010.5687920","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687920","url":null,"abstract":"Recommender systems are being improved by every means to be more accurate, more robust, and faster. Collaborative filtering is the mainstream type of recommendation algorithms, and its core is calculating the similarity between users or items based on ratings. Researchers recently found that the binary similarity based solely on who-rated-what rather than actual ratings output more accurate recommendation. We, from robust perspective, evaluated the binary collaborative filtering under multiple types of profile injection attacks on large dataset. Experimental results show binary collaborative filtering is more robust than actual ratings based collaborative filtering in all situations.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114763224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-01DOI: 10.1109/PIC.2010.5687965
F. Wang, Changle Zhou, Hugo de Garis
Based on traditional methods, according with practical application conditions, and the special structure of Quadtree, this paper gives a practical method of paths planning for the further expansion of Quadtree in the field of paths planning, except for segmentation obstacles. The experimental and simulation results demonstrate that the algorithm described in the text could be able to find all the relevant paths correctly, and make the better choice rapidly.
{"title":"A simple robot paths planning based on Quadtree","authors":"F. Wang, Changle Zhou, Hugo de Garis","doi":"10.1109/PIC.2010.5687965","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687965","url":null,"abstract":"Based on traditional methods, according with practical application conditions, and the special structure of Quadtree, this paper gives a practical method of paths planning for the further expansion of Quadtree in the field of paths planning, except for segmentation obstacles. The experimental and simulation results demonstrate that the algorithm described in the text could be able to find all the relevant paths correctly, and make the better choice rapidly.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114718396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-01DOI: 10.1109/PIC.2010.5687932
Xuejun Ding, Yong Tian
As a new business model, mobile commerce needs a process to be accepted. The user behavior of mobile commerce will be affected by many factors. Based on the technology acceptance model and multipurpose information appliances model, and taking into account the characteristics of mobile commerce, the mobile commerce model of consumer adoption behavior was constructed using perceived usefulness, perceived ease of use, perceived entertainment, perceived security, social impact, individual needs and perceived price as main factors.
{"title":"A study on adoption behavior of mobile commerce consumer based on TAM-MIA","authors":"Xuejun Ding, Yong Tian","doi":"10.1109/PIC.2010.5687932","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687932","url":null,"abstract":"As a new business model, mobile commerce needs a process to be accepted. The user behavior of mobile commerce will be affected by many factors. Based on the technology acceptance model and multipurpose information appliances model, and taking into account the characteristics of mobile commerce, the mobile commerce model of consumer adoption behavior was constructed using perceived usefulness, perceived ease of use, perceived entertainment, perceived security, social impact, individual needs and perceived price as main factors.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121025967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-01DOI: 10.1109/PIC.2010.5687957
Chunguang Chang, Yunlong Zhu, Kunyuan Hu, Yi Zhang
Grouping batch and sorting order (GBSO) for smelting charges is a key cycle in refined copper strip producing. To improve its scientific degree, optimization problem of GBSO for smelting charges in refined copper strip producing by artificial immune algorithm (AIA) is studied. The multi-objective optimization model for GBSO of smelting charges is established with the objectives which includes minimizing fluctuation in ingredient ratios between the nearest neighbor charges, meeting order priority requirement as much as possible, insuring order due date as much as possible, maximizing number of same brand charges and sorting order in continuous way for same order as much as possible. Some constraints are adequately considered, which includes order due data of each charge, sorting order limit for the charge with high quality requirement, sorting order limit for the charge with the high ratio of virtual orders, sorting order limit for the charge including multi-order, sorting order continuously for same brand charges, ingredient ratio limit for the charge which is sorted order as the first charge, ingredient ratio difference limit between each two nearest neighbor charges. To solve the model in easy way, some constraints are transformed into the objective function, and AIA is designed. The detail steps of AIA is designed in detail including antibody representation and encoding, affinity calculation, clone selection, antibody population updating. To validate the validity of above model and AIA, select practical typical GBSO problem of smelting charges as application instance. Application result shows that, the obtained optimal solution is better than that by heuristic method both on diversity and optimization degree. AIA is suitable for solving complex problem with requirement on solution diversity.
{"title":"Optimization of grouping batch and sorting order for smelting charges in refined copper strip producing by AIA","authors":"Chunguang Chang, Yunlong Zhu, Kunyuan Hu, Yi Zhang","doi":"10.1109/PIC.2010.5687957","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687957","url":null,"abstract":"Grouping batch and sorting order (GBSO) for smelting charges is a key cycle in refined copper strip producing. To improve its scientific degree, optimization problem of GBSO for smelting charges in refined copper strip producing by artificial immune algorithm (AIA) is studied. The multi-objective optimization model for GBSO of smelting charges is established with the objectives which includes minimizing fluctuation in ingredient ratios between the nearest neighbor charges, meeting order priority requirement as much as possible, insuring order due date as much as possible, maximizing number of same brand charges and sorting order in continuous way for same order as much as possible. Some constraints are adequately considered, which includes order due data of each charge, sorting order limit for the charge with high quality requirement, sorting order limit for the charge with the high ratio of virtual orders, sorting order limit for the charge including multi-order, sorting order continuously for same brand charges, ingredient ratio limit for the charge which is sorted order as the first charge, ingredient ratio difference limit between each two nearest neighbor charges. To solve the model in easy way, some constraints are transformed into the objective function, and AIA is designed. The detail steps of AIA is designed in detail including antibody representation and encoding, affinity calculation, clone selection, antibody population updating. To validate the validity of above model and AIA, select practical typical GBSO problem of smelting charges as application instance. Application result shows that, the obtained optimal solution is better than that by heuristic method both on diversity and optimization degree. AIA is suitable for solving complex problem with requirement on solution diversity.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127626909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-01DOI: 10.1109/PIC.2010.5688024
Dongwei Qiu, Shanshan Wan
Virtual reality technology is used to build the three-dimensional scenery model of the tunnel, and on this basis, the advanced safety monitoring of tunnel is implemented. The establishment method of three-dimensional scenery is introduced. First the tunnel's three-dimensional scanning control network is built and then the integrated tunnel is scanned with Trimble VX Spatial scanners. Lastly we build the tunnel's three-dimensional model using the obtained point cloud data. Based on the fitting calculation of various cross sections of the tunnel virtual scenery model, the integrated deformation of the tunnel is obtained.
{"title":"Three-dimensional virtual scenery construction of tunnel and its application in safety monitoring","authors":"Dongwei Qiu, Shanshan Wan","doi":"10.1109/PIC.2010.5688024","DOIUrl":"https://doi.org/10.1109/PIC.2010.5688024","url":null,"abstract":"Virtual reality technology is used to build the three-dimensional scenery model of the tunnel, and on this basis, the advanced safety monitoring of tunnel is implemented. The establishment method of three-dimensional scenery is introduced. First the tunnel's three-dimensional scanning control network is built and then the integrated tunnel is scanned with Trimble VX Spatial scanners. Lastly we build the tunnel's three-dimensional model using the obtained point cloud data. Based on the fitting calculation of various cross sections of the tunnel virtual scenery model, the integrated deformation of the tunnel is obtained.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125108422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}