Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5578958
Yikang Li, Ke Liu, Xiaoliu Shen, Z. Tan
In order to reduce the financial risks of Oversea Merger and Acquisition, and determine the best loan credit structure model for Overseas Merger and Acquisition project, a novel loans credit evaluation model of Overseas Merger and Acquisition project based on Analytic Hierarchy Process was proposed in this paper. During the implementation period of Overseas Merger and Acquisition, a comprehensive loans credit structure evaluation model of Overseas Merger and Acquisition project, which model has the weighted factors, has been established by both Analytic Hierarchy Process and risk indicators at all levels in this paper. Compared with the traditional methods, the evaluation model based on this method has better performance in reducing the overseas investment risk for bank.
{"title":"A novel model for credit structure of Overseas Merger and Acquisition","authors":"Yikang Li, Ke Liu, Xiaoliu Shen, Z. Tan","doi":"10.1109/ICACTE.2010.5578958","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5578958","url":null,"abstract":"In order to reduce the financial risks of Oversea Merger and Acquisition, and determine the best loan credit structure model for Overseas Merger and Acquisition project, a novel loans credit evaluation model of Overseas Merger and Acquisition project based on Analytic Hierarchy Process was proposed in this paper. During the implementation period of Overseas Merger and Acquisition, a comprehensive loans credit structure evaluation model of Overseas Merger and Acquisition project, which model has the weighted factors, has been established by both Analytic Hierarchy Process and risk indicators at all levels in this paper. Compared with the traditional methods, the evaluation model based on this method has better performance in reducing the overseas investment risk for bank.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122720040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5579711
Zhang Xiao-jun
The electronic counter could measure the frequency, period and phase difference by combining the intelligent virtual instrument technology. And expanded the measurement by using of the interpolation technology. It included hardware and software. Hardware included the MCU, PLD, signal shaping circuit. Software included man-machine interface, communications, data processing module. The frequency was up to 16MHz, and can accurately measure the signal period and phase.
{"title":"Virtual frequency meter","authors":"Zhang Xiao-jun","doi":"10.1109/ICACTE.2010.5579711","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579711","url":null,"abstract":"The electronic counter could measure the frequency, period and phase difference by combining the intelligent virtual instrument technology. And expanded the measurement by using of the interpolation technology. It included hardware and software. Hardware included the MCU, PLD, signal shaping circuit. Software included man-machine interface, communications, data processing module. The frequency was up to 16MHz, and can accurately measure the signal period and phase.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122743776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5579453
Taotao Li, Z. Zhang, Zhumin Yang, Dingfang Chen, Xiaoliang Zheng
Considering center distance and gear facewidth, establishing the optimized objective function and constraint equation of properties, while optimizing the data by utilizing the Matlab optimization tool box, it is discovered that, through analysis of the outcomes compared with the original design data, the optimized objective value has reduced by 24.77%, and the centre distance by 15%, in contrast to the initially set.
{"title":"Optimal design of single-stage cylindrical spur gear reduction gearbox based on Matlab","authors":"Taotao Li, Z. Zhang, Zhumin Yang, Dingfang Chen, Xiaoliang Zheng","doi":"10.1109/ICACTE.2010.5579453","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579453","url":null,"abstract":"Considering center distance and gear facewidth, establishing the optimized objective function and constraint equation of properties, while optimizing the data by utilizing the Matlab optimization tool box, it is discovered that, through analysis of the outcomes compared with the original design data, the optimized objective value has reduced by 24.77%, and the centre distance by 15%, in contrast to the initially set.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122897763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5579138
Jian Zhang, Daming Zhu
The gene-duplication problem is to infer a species tree from a collection of gene trees. As we know, this problem is NP-hard and thus requires efficient heuristics. Existing heuristics for this problem performs a stepwise search of the tree space which consists of all potential species trees. Each step in heuristics is guided by an exact solution to an instance of local search problem. The local search problem is to find an optimal species tree in the tree space. Computing the mapping for gene trees and a species tree is a necessary step in the local search problem. In this paper, we give an improved algorithm to determine the mapping between gene trees and a species tree in the gene-duplication problem based on the rooted subtree pruning and regrafting (rSPR) operation. This algorithm eliminates some redundant calculations and is faster than former algorithms.
{"title":"A faster algorithm for gene-duplication problem based on rSPR local search","authors":"Jian Zhang, Daming Zhu","doi":"10.1109/ICACTE.2010.5579138","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579138","url":null,"abstract":"The gene-duplication problem is to infer a species tree from a collection of gene trees. As we know, this problem is NP-hard and thus requires efficient heuristics. Existing heuristics for this problem performs a stepwise search of the tree space which consists of all potential species trees. Each step in heuristics is guided by an exact solution to an instance of local search problem. The local search problem is to find an optimal species tree in the tree space. Computing the mapping for gene trees and a species tree is a necessary step in the local search problem. In this paper, we give an improved algorithm to determine the mapping between gene trees and a species tree in the gene-duplication problem based on the rooted subtree pruning and regrafting (rSPR) operation. This algorithm eliminates some redundant calculations and is faster than former algorithms.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114377434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a mosaic algorithm based on SIFT(Scale Invariant Feature Trasform). Keypoints and their descriptors are exacted by SIFT, which ensures the algorithm robust to translation, rotation, noise and scalling. Then proposed matching algorithm is used to match the keypoints. First, rough match pairs are obtained by Nearest Neighbor algorithm. Second, match rate information of the neighbor keypoints and the global information are calculated to update the match precision, so each keypoint matching rate spreads to its neighborhood, which eliminates a large number of mismatches to achieve the exact match. Third, RANSAC is applied to obtain the transformation matrix. Finally, two images are stitched by linear weighted fusion algorithm. The experiment results confirm the feasibility and improvement of our model.
{"title":"A sift-based method for image mosaic","authors":"Meiqun Jiang, Jingxin Hong, Q. Liao, Shengluan Huang","doi":"10.1109/ICACTE.2010.5579170","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579170","url":null,"abstract":"This paper proposes a mosaic algorithm based on SIFT(Scale Invariant Feature Trasform). Keypoints and their descriptors are exacted by SIFT, which ensures the algorithm robust to translation, rotation, noise and scalling. Then proposed matching algorithm is used to match the keypoints. First, rough match pairs are obtained by Nearest Neighbor algorithm. Second, match rate information of the neighbor keypoints and the global information are calculated to update the match precision, so each keypoint matching rate spreads to its neighborhood, which eliminates a large number of mismatches to achieve the exact match. Third, RANSAC is applied to obtain the transformation matrix. Finally, two images are stitched by linear weighted fusion algorithm. The experiment results confirm the feasibility and improvement of our model.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114381188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5579286
Sun Xiaoying, Zhang Qiuhong, Xu Yanqun
The quality of human silhouettes has a direct effect on gait recognition performance. This paper proposes a robust gait representation scheme to suppress the influence of silhouette incompleteness. By means of dividing human body area in a video sequence into several sub-areas, representing each sub-area through an ellipse whose parameters can be calculated from the corresponding motion information extracted from optical flow field, a new body structure model called multi-linked ellipse model is established. In the recognition stage, the parameters of model are finally used to achieve gait recognition based on dynamic time warping technology. Experimental results prove the higher performance of the method.
{"title":"Application of segmentation based on optical flow for gait recognition","authors":"Sun Xiaoying, Zhang Qiuhong, Xu Yanqun","doi":"10.1109/ICACTE.2010.5579286","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579286","url":null,"abstract":"The quality of human silhouettes has a direct effect on gait recognition performance. This paper proposes a robust gait representation scheme to suppress the influence of silhouette incompleteness. By means of dividing human body area in a video sequence into several sub-areas, representing each sub-area through an ellipse whose parameters can be calculated from the corresponding motion information extracted from optical flow field, a new body structure model called multi-linked ellipse model is established. In the recognition stage, the parameters of model are finally used to achieve gait recognition based on dynamic time warping technology. Experimental results prove the higher performance of the method.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"17 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114560362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5579384
Ge Kaikai, Zhao Wenbin, Zhang Xintong
As a new form of software, the technique and standard of web services are grown to perfection day by day. However, application of web services is restricted by complex factors such as lack of user interface and effective QoS guarantee. As a result, it hasn't been used widely, which makes it necessary to provide an excellent platform to share web services resource the common people. Furthermore, since many available web services provide overlapping or identical function, considering different Quality of Service (QoS), an effective evaluation algorithm is urgently needed to screen out the desirable one. This paper describes implementation of a service-oriented portal platform. It aims at making the public able to set up a personalized portal page, which is composed of a set of web services application. And all the services are published in the form of portlet. Furthermore, our platform is supported by an autonomously developed service coordination bus. It is equipped with an effective and objective QoS evaluation model based on Bayesian network, and enables system to coordinate the dynamical execution of services.
{"title":"Service-oriented personalized potal platform with QoS guarantee","authors":"Ge Kaikai, Zhao Wenbin, Zhang Xintong","doi":"10.1109/ICACTE.2010.5579384","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579384","url":null,"abstract":"As a new form of software, the technique and standard of web services are grown to perfection day by day. However, application of web services is restricted by complex factors such as lack of user interface and effective QoS guarantee. As a result, it hasn't been used widely, which makes it necessary to provide an excellent platform to share web services resource the common people. Furthermore, since many available web services provide overlapping or identical function, considering different Quality of Service (QoS), an effective evaluation algorithm is urgently needed to screen out the desirable one. This paper describes implementation of a service-oriented portal platform. It aims at making the public able to set up a personalized portal page, which is composed of a set of web services application. And all the services are published in the form of portlet. Furthermore, our platform is supported by an autonomously developed service coordination bus. It is equipped with an effective and objective QoS evaluation model based on Bayesian network, and enables system to coordinate the dynamical execution of services.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114593202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5579227
Zhixin Chen, Chenglin Wang, Z. Hu, Shikun Xie
Aiming to miss-detection of internal tiny flaw of workpiece for cross wedge rolling, it is proposed a new ultrasonic signal testing method based on dual-tree complex wavelet transform (DT-CWT). By constructing new dual-tree complex wavelet bases, and by taking advantage of near shift-invariance of DT-CWT, it can improve common wavelet analysis methods for ultrasonic signal testing based on real orthogonal discrete wavelet transform. Experiments indicate that the method can extract weak defect feature and its results demonstrate the validity of the proposed method.
{"title":"Dual-tree complex wavelet analysis and its application in defect detection of workpiece for cross wedge rolling","authors":"Zhixin Chen, Chenglin Wang, Z. Hu, Shikun Xie","doi":"10.1109/ICACTE.2010.5579227","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579227","url":null,"abstract":"Aiming to miss-detection of internal tiny flaw of workpiece for cross wedge rolling, it is proposed a new ultrasonic signal testing method based on dual-tree complex wavelet transform (DT-CWT). By constructing new dual-tree complex wavelet bases, and by taking advantage of near shift-invariance of DT-CWT, it can improve common wavelet analysis methods for ultrasonic signal testing based on real orthogonal discrete wavelet transform. Experiments indicate that the method can extract weak defect feature and its results demonstrate the validity of the proposed method.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122173719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5579675
Yuan Zhen
Under the network environment, security of library information system(LISS) is an important topic for all managers. This paper analyzes main categories of security of library information system and puts forward efficient means of protecting this system. The paper finally points out the significance of security of library information system.
{"title":"Security of library information system under the network environment","authors":"Yuan Zhen","doi":"10.1109/ICACTE.2010.5579675","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579675","url":null,"abstract":"Under the network environment, security of library information system(LISS) is an important topic for all managers. This paper analyzes main categories of security of library information system and puts forward efficient means of protecting this system. The paper finally points out the significance of security of library information system.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116834431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5579094
Pan Qun, Wang Lin, Zhuang Yan-bin
The Support Vector Regression method have complete statistical learning theory basis and excellent performance on small samples. Based on the introduction of support vector regression method, the paper introduced Support Vector Machine (SVM) into wireless communication network reliability prediction. Using support vector regression method, the reliability prediction model of wireless communication network was established. Verification of actual data and comparison with BP neural network method shows that the model has feasibility and superiority in the reliability prediction of wireless communication network.
{"title":"Wireless communication reliability prediction based on Support Vector Regression","authors":"Pan Qun, Wang Lin, Zhuang Yan-bin","doi":"10.1109/ICACTE.2010.5579094","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579094","url":null,"abstract":"The Support Vector Regression method have complete statistical learning theory basis and excellent performance on small samples. Based on the introduction of support vector regression method, the paper introduced Support Vector Machine (SVM) into wireless communication network reliability prediction. Using support vector regression method, the reliability prediction model of wireless communication network was established. Verification of actual data and comparison with BP neural network method shows that the model has feasibility and superiority in the reliability prediction of wireless communication network.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129722535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}