Pub Date : 2012-09-24DOI: 10.1109/CSIP.2012.6308907
Lan He, Jun Yang, Xiang Ding, Yi-ling Hou, W. Hou
RPS5 is a component of the 40S small ribosomal subunit encoded by rpS5 gene, which is specific to eukaryotes. The cDNA and the genomic sequence of rpS5 were cloned successfully from giant panda using RT-PCR technology and Touchdown-PCR, respectively. Both sequences were analyzed preliminarily and the cDNA of the rpS5 gene was overexpressed in E. coli BL21. The cDNA of rpS5 cloned from giant panda contain open reading frame of 615 bp encoding 204 amino acids. The nucleotide sequence of the coding sequence shows a high homology to some mammals as determined by Blast analyzing, and the same with the amino acid sequence. The genomic sequence is 4331 bp in length, with five exons and four introns. Primary structure analysis revealed that the molecular weight of the putative RPS5 protein is 22.87 KD with a theoretical pI 10.30. Topology prediction showed there are five different patterns of functional sites in the RPS5 protein of giant panda. The rpS5 can be really expressed in E. coli and its protein fused with the N-terminally GST -tagged protein gave rise to the accumulation of an expected 29.5 KD polypeptide. The expression product obtained could be used for purification and study of its function further.
{"title":"CDNA and genomic sequence clonging and sequence analysis of ribosomal protein S5 gene(rpS5) from giant panda and its overexpression","authors":"Lan He, Jun Yang, Xiang Ding, Yi-ling Hou, W. Hou","doi":"10.1109/CSIP.2012.6308907","DOIUrl":"https://doi.org/10.1109/CSIP.2012.6308907","url":null,"abstract":"RPS5 is a component of the 40S small ribosomal subunit encoded by rpS5 gene, which is specific to eukaryotes. The cDNA and the genomic sequence of rpS5 were cloned successfully from giant panda using RT-PCR technology and Touchdown-PCR, respectively. Both sequences were analyzed preliminarily and the cDNA of the rpS5 gene was overexpressed in E. coli BL21. The cDNA of rpS5 cloned from giant panda contain open reading frame of 615 bp encoding 204 amino acids. The nucleotide sequence of the coding sequence shows a high homology to some mammals as determined by Blast analyzing, and the same with the amino acid sequence. The genomic sequence is 4331 bp in length, with five exons and four introns. Primary structure analysis revealed that the molecular weight of the putative RPS5 protein is 22.87 KD with a theoretical pI 10.30. Topology prediction showed there are five different patterns of functional sites in the RPS5 protein of giant panda. The rpS5 can be really expressed in E. coli and its protein fused with the N-terminally GST -tagged protein gave rise to the accumulation of an expected 29.5 KD polypeptide. The expression product obtained could be used for purification and study of its function further.","PeriodicalId":193335,"journal":{"name":"2012 International Conference on Computer Science and Information Processing (CSIP)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121043997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-09-24DOI: 10.1109/CSIP.2012.6309075
Qiang Ma
As one of the WEB2.0 technologies, wiki technology emerged in the early 21st century after Beijing Olympics. This study explores how to put such technology into application by effectively using the Olympic legacy of Beijing Olympic Games - Olympic Library. It uses literature methods, and combines with practical work experiences. Firstly, it introduces the overview of the Library of Capital Institute of Physical Education in the Olympic Library Project, and the development of Olympic Library in post-Olympic period; then, it collates the basic concepts of information commons (IC) within the industry, including the concept of IC, composing elements and the IC construction profiles in national libraries; finally, based on the existing conditions and the Olympic libraries advantages and combined with the rapid development of the digital environment, it discusses the application of wiki technology, the principles and ideas to achieve the innovative development of Olympic Library through the construction of information commons.
{"title":"Analysis on construction of information commons of Wiki-based Olympic Library","authors":"Qiang Ma","doi":"10.1109/CSIP.2012.6309075","DOIUrl":"https://doi.org/10.1109/CSIP.2012.6309075","url":null,"abstract":"As one of the WEB2.0 technologies, wiki technology emerged in the early 21st century after Beijing Olympics. This study explores how to put such technology into application by effectively using the Olympic legacy of Beijing Olympic Games - Olympic Library. It uses literature methods, and combines with practical work experiences. Firstly, it introduces the overview of the Library of Capital Institute of Physical Education in the Olympic Library Project, and the development of Olympic Library in post-Olympic period; then, it collates the basic concepts of information commons (IC) within the industry, including the concept of IC, composing elements and the IC construction profiles in national libraries; finally, based on the existing conditions and the Olympic libraries advantages and combined with the rapid development of the digital environment, it discusses the application of wiki technology, the principles and ideas to achieve the innovative development of Olympic Library through the construction of information commons.","PeriodicalId":193335,"journal":{"name":"2012 International Conference on Computer Science and Information Processing (CSIP)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122470371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-09-24DOI: 10.1109/CSIP.2012.6308801
Yulong Tian, Yuncai Liu
Graph matching is a fundamental problem in computer vision and image processing and is widely used in object detection. Recently, many methods formulate it as integer quadratic programming problem to find inexact solutions by relaxing it in continuous domain. In this paper we classify these methods in 3 categories based on the relaxed constraints, hypothesis, solving methods, and convergence properties separately. For evaluation purpose we modify these methods and add some toy modifications to compare the detail configuration of these algorithms under different situations. Finally we try to give some explanation based on experimental results.
{"title":"An evaluation of recent graph matching algorithms","authors":"Yulong Tian, Yuncai Liu","doi":"10.1109/CSIP.2012.6308801","DOIUrl":"https://doi.org/10.1109/CSIP.2012.6308801","url":null,"abstract":"Graph matching is a fundamental problem in computer vision and image processing and is widely used in object detection. Recently, many methods formulate it as integer quadratic programming problem to find inexact solutions by relaxing it in continuous domain. In this paper we classify these methods in 3 categories based on the relaxed constraints, hypothesis, solving methods, and convergence properties separately. For evaluation purpose we modify these methods and add some toy modifications to compare the detail configuration of these algorithms under different situations. Finally we try to give some explanation based on experimental results.","PeriodicalId":193335,"journal":{"name":"2012 International Conference on Computer Science and Information Processing (CSIP)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122663409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-09-24DOI: 10.1109/CSIP.2012.6309007
Z. Jing
Obtaining the core technologies and culturing the core competitiveness by speeding up the construction of the patent system and patent capacity-building in our country has become an important strategic initiatives during China's new industrialization. Now the patent application's analysis has become more and more important in domestic enterprise, and a lot of research literatures about that have been proposed. Most of the literatures remain in the study of the patents status quo, such as qualitative analysis, lacking of quantitative analysis and comparison, lacking of convincing arguments. In this paper, qualitative analysis and quantitative analysis methods combined with the actual cases were adopted to explain the current status of the new energy auto industry and to analysis on Chinese new energy auto enterprise development strategies compared with foreign countries.
{"title":"Patent analysis on new energy auto industry","authors":"Z. Jing","doi":"10.1109/CSIP.2012.6309007","DOIUrl":"https://doi.org/10.1109/CSIP.2012.6309007","url":null,"abstract":"Obtaining the core technologies and culturing the core competitiveness by speeding up the construction of the patent system and patent capacity-building in our country has become an important strategic initiatives during China's new industrialization. Now the patent application's analysis has become more and more important in domestic enterprise, and a lot of research literatures about that have been proposed. Most of the literatures remain in the study of the patents status quo, such as qualitative analysis, lacking of quantitative analysis and comparison, lacking of convincing arguments. In this paper, qualitative analysis and quantitative analysis methods combined with the actual cases were adopted to explain the current status of the new energy auto industry and to analysis on Chinese new energy auto enterprise development strategies compared with foreign countries.","PeriodicalId":193335,"journal":{"name":"2012 International Conference on Computer Science and Information Processing (CSIP)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127805007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-09-24DOI: 10.1109/CSIP.2012.6308937
Wen-ying Yang, Guowei Yang, Xu Zheng, Lubo Zhang
Vehicle-logo location is the key link in vehicle-logo recognition, and it directly impacts the effect of vehicle-logo recognition. However, because of its inherent particularity, vehicle-logo location is a very challenging. In this paper, we proposed an improved vehicle-logo location algorithm based on texture analysis. Firstly, we locate the vehicle-logo coarsely according to the prior knowledge of the position relationship between the vehicle-logo and the license plate; Secondly, we use the texture measure to detect the texture type of the scattered network; Thirdly, we use the Laws texture mask to suppress the scattered network texture. The concrete practice is to carry on the vertical edge template to filter out the horizontal texture, and carry on the transposed matrix of the vertical edge template to filter out the vertical texture; Finally, we can locate the vehicle-logo accurately by mathematical morphology processing. In this paper, the filtering method using the Laws texture template remains more texture information, and improves the algorithm robustness for the night, and at the same time, it has a good location effect for the dark vehicle-logo.
{"title":"An improved vehicle-logo localization algorithm based on texture analysis","authors":"Wen-ying Yang, Guowei Yang, Xu Zheng, Lubo Zhang","doi":"10.1109/CSIP.2012.6308937","DOIUrl":"https://doi.org/10.1109/CSIP.2012.6308937","url":null,"abstract":"Vehicle-logo location is the key link in vehicle-logo recognition, and it directly impacts the effect of vehicle-logo recognition. However, because of its inherent particularity, vehicle-logo location is a very challenging. In this paper, we proposed an improved vehicle-logo location algorithm based on texture analysis. Firstly, we locate the vehicle-logo coarsely according to the prior knowledge of the position relationship between the vehicle-logo and the license plate; Secondly, we use the texture measure to detect the texture type of the scattered network; Thirdly, we use the Laws texture mask to suppress the scattered network texture. The concrete practice is to carry on the vertical edge template to filter out the horizontal texture, and carry on the transposed matrix of the vertical edge template to filter out the vertical texture; Finally, we can locate the vehicle-logo accurately by mathematical morphology processing. In this paper, the filtering method using the Laws texture template remains more texture information, and improves the algorithm robustness for the night, and at the same time, it has a good location effect for the dark vehicle-logo.","PeriodicalId":193335,"journal":{"name":"2012 International Conference on Computer Science and Information Processing (CSIP)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128053107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-09-24DOI: 10.1109/CSIP.2012.6308818
Li Tong
For information hiding, the robustness of a watermarking scheme against various attacks is an essential importance. Many proposed robust watermarking schemes may achieve good robustness but sacrifice the good quality of the watermarked image and lack of anti-noise ability. This paper proposes a transparent robust watermarking scheme which embeds the secret information in digital image. ICA method is employed in this paper to filter the Gaussian white noises. This ICA algorithm technique can guarantee transmitting the good visual quality of a watermarked image within strong Gaussian noises. Simulating result shows that the proposed watermarking method can achieve higher robustness performance.
{"title":"A new algorithm for information hiding in digital image","authors":"Li Tong","doi":"10.1109/CSIP.2012.6308818","DOIUrl":"https://doi.org/10.1109/CSIP.2012.6308818","url":null,"abstract":"For information hiding, the robustness of a watermarking scheme against various attacks is an essential importance. Many proposed robust watermarking schemes may achieve good robustness but sacrifice the good quality of the watermarked image and lack of anti-noise ability. This paper proposes a transparent robust watermarking scheme which embeds the secret information in digital image. ICA method is employed in this paper to filter the Gaussian white noises. This ICA algorithm technique can guarantee transmitting the good visual quality of a watermarked image within strong Gaussian noises. Simulating result shows that the proposed watermarking method can achieve higher robustness performance.","PeriodicalId":193335,"journal":{"name":"2012 International Conference on Computer Science and Information Processing (CSIP)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128089511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-09-24DOI: 10.1109/CSIP.2012.6308812
Q. Hang, Hong Guo, Xiang Zou, Qiang Hou
Nowadays the mobile equipment has become an essential tool of providing access to business resources from the organization's internal network and other services. Hence the security of wireless communication becomes more and more important. This paper demonstrates how to implement a mobile access system based on multi-factor authentication for security mobile communication,at the same time, improving IKE process to make the system more efficient.
{"title":"Design and implementation of mobile access system based on multi-factor authentication","authors":"Q. Hang, Hong Guo, Xiang Zou, Qiang Hou","doi":"10.1109/CSIP.2012.6308812","DOIUrl":"https://doi.org/10.1109/CSIP.2012.6308812","url":null,"abstract":"Nowadays the mobile equipment has become an essential tool of providing access to business resources from the organization's internal network and other services. Hence the security of wireless communication becomes more and more important. This paper demonstrates how to implement a mobile access system based on multi-factor authentication for security mobile communication,at the same time, improving IKE process to make the system more efficient.","PeriodicalId":193335,"journal":{"name":"2012 International Conference on Computer Science and Information Processing (CSIP)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133196674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-09-24DOI: 10.1109/CSIP.2012.6309026
Lina Zhao, Guangming Li
Higher education resources sharing system is very important. But there are a lot of defects in constructing and using a higher education resources sharing system, such as uncertainty and variability of demand. The general system construction technique has defects for constructing a flexibility resources sharing system. This paper proposes a construction resources sharing system based on SOA and pays more attention in key issues for how to implement the framework.
{"title":"Research on higher education resources sharing system based on SOA","authors":"Lina Zhao, Guangming Li","doi":"10.1109/CSIP.2012.6309026","DOIUrl":"https://doi.org/10.1109/CSIP.2012.6309026","url":null,"abstract":"Higher education resources sharing system is very important. But there are a lot of defects in constructing and using a higher education resources sharing system, such as uncertainty and variability of demand. The general system construction technique has defects for constructing a flexibility resources sharing system. This paper proposes a construction resources sharing system based on SOA and pays more attention in key issues for how to implement the framework.","PeriodicalId":193335,"journal":{"name":"2012 International Conference on Computer Science and Information Processing (CSIP)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131996494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-09-24DOI: 10.1109/CSIP.2012.6308841
Hong Guo, Bo Jin, Ting Shang
Cloud computing presents many promising technological and economical opportunities, however, it can pose a challenge for cybercrime investigation and digital forensics. Therefore, there is an urgent need to extend the applications of investigation processes in the Cloud. In this paper, we present the definition of cloud computing and its various models. Further we compare traditional forensic investigations and forensic investigations in cloud and analyze the challenges of forensic investigations in cloud environments.
{"title":"Forensic investigations in Cloud environments","authors":"Hong Guo, Bo Jin, Ting Shang","doi":"10.1109/CSIP.2012.6308841","DOIUrl":"https://doi.org/10.1109/CSIP.2012.6308841","url":null,"abstract":"Cloud computing presents many promising technological and economical opportunities, however, it can pose a challenge for cybercrime investigation and digital forensics. Therefore, there is an urgent need to extend the applications of investigation processes in the Cloud. In this paper, we present the definition of cloud computing and its various models. Further we compare traditional forensic investigations and forensic investigations in cloud and analyze the challenges of forensic investigations in cloud environments.","PeriodicalId":193335,"journal":{"name":"2012 International Conference on Computer Science and Information Processing (CSIP)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134490649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-09-24DOI: 10.1109/CSIP.2012.6308963
Zhiping Ni, Peihe Tang, Yiyi Xi
Due to the complexity of shape and apparent differences of pavement cracks, it is difficult to characterize them with definite features. The wavelet, Gabor transform and its functions are usually predefined and cannot adapt to the characteristics of the pavement crack images. This paper proposes a novel joint maximization recognition algorithm in the resilient area, which is based on the characteristics of biologically inspired model (BIM). In view of the predefined and invariance of the basis functions in linear transformation, this algorithm uses the resilient area, such as the four regions or eight areas to segmenting image. Introducing Adaboost classifier in each area to select and retain key information, get rid of unwanted or negative information. Its eigenvectors can reflect the information in the original image comprehensively and its low computational complexity and parallelizable is helpful in real-time applications. The experimental results show that the overall recognition rate of the proposed method in pavement cracks is up to 99.23%, and its fast response time fully demonstrate the effectiveness of this method.
{"title":"A new method to pavement cracking detection based on the Biological Inspired Model","authors":"Zhiping Ni, Peihe Tang, Yiyi Xi","doi":"10.1109/CSIP.2012.6308963","DOIUrl":"https://doi.org/10.1109/CSIP.2012.6308963","url":null,"abstract":"Due to the complexity of shape and apparent differences of pavement cracks, it is difficult to characterize them with definite features. The wavelet, Gabor transform and its functions are usually predefined and cannot adapt to the characteristics of the pavement crack images. This paper proposes a novel joint maximization recognition algorithm in the resilient area, which is based on the characteristics of biologically inspired model (BIM). In view of the predefined and invariance of the basis functions in linear transformation, this algorithm uses the resilient area, such as the four regions or eight areas to segmenting image. Introducing Adaboost classifier in each area to select and retain key information, get rid of unwanted or negative information. Its eigenvectors can reflect the information in the original image comprehensively and its low computational complexity and parallelizable is helpful in real-time applications. The experimental results show that the overall recognition rate of the proposed method in pavement cracks is up to 99.23%, and its fast response time fully demonstrate the effectiveness of this method.","PeriodicalId":193335,"journal":{"name":"2012 International Conference on Computer Science and Information Processing (CSIP)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130308054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}