Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533267
Min Li, Xiangmin Xu, Min Qian, Zhuocai Wang
Considering the characteristic that the nucleus and the nucleolus have no obvious boundary, this paper presents a fast level set method which is based on the overall information of an image to extract the nucleolus from the prostate nucleus. We pre-process the three-dimensional colorful prostate image at first, making the nucleolus (target) distinct to the surrounding environment (background) at the maximum extent. Secondly, we use the level set method to separate out nucleolus from the nucleus. The proposed method combines the edges information and regional information of the image, and it only considers the information of pixels which are around the zero-level set function in each iteration. Thus we not only have no need to re-initialize the level set function, but also have certain segmentation ability to the edge blurred images. Meanwhile, the method can improve the computation speed, too.
{"title":"A Fast Level Set Segmentation Method Based on the Overall Information of Image","authors":"Min Li, Xiangmin Xu, Min Qian, Zhuocai Wang","doi":"10.1109/IEEC.2010.5533267","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533267","url":null,"abstract":"Considering the characteristic that the nucleus and the nucleolus have no obvious boundary, this paper presents a fast level set method which is based on the overall information of an image to extract the nucleolus from the prostate nucleus. We pre-process the three-dimensional colorful prostate image at first, making the nucleolus (target) distinct to the surrounding environment (background) at the maximum extent. Secondly, we use the level set method to separate out nucleolus from the nucleus. The proposed method combines the edges information and regional information of the image, and it only considers the information of pixels which are around the zero-level set function in each iteration. Thus we not only have no need to re-initialize the level set function, but also have certain segmentation ability to the edge blurred images. Meanwhile, the method can improve the computation speed, too.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"32 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116343824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533189
Zixuan Yang, Shi-dong Fan, T. Xiong
This paper discusses the simulation and numerical calculation on pipeline leakage process. At first it proposes the basic equations of transient flow, and describes the solution process based on the finite difference method and characteristic line method. It illustrates the handling of friction term, a new approach of leakage point boundary constrain, the boundary conditions of the start node and the end node as well. Finally, the simulation of pipeline leakage has been carried out with an example, and the variations of pressure and flow in the start node and the end node are obtained when the leakage occurs, which provided a theoretical basis for recognizing leakage.
{"title":"Simulation and Numerical Calculation on Pipeline Leakage Process","authors":"Zixuan Yang, Shi-dong Fan, T. Xiong","doi":"10.1109/IEEC.2010.5533189","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533189","url":null,"abstract":"This paper discusses the simulation and numerical calculation on pipeline leakage process. At first it proposes the basic equations of transient flow, and describes the solution process based on the finite difference method and characteristic line method. It illustrates the handling of friction term, a new approach of leakage point boundary constrain, the boundary conditions of the start node and the end node as well. Finally, the simulation of pipeline leakage has been carried out with an example, and the variations of pressure and flow in the start node and the end node are obtained when the leakage occurs, which provided a theoretical basis for recognizing leakage.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"86 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132237983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533223
Ze Sun, G. Lu, Xingfu Song, Shu-ying Sun, Jianguo Yu
In modern times, computer technology is used in various fields in the world. In this paper, CFD(computational fluid dynamics) was applied to build mathematical model to simulate continuous and dispersed multiphase flow in the experimental systems and an industrial electrolyzer. The Volume of Fluid model was used in the mathematical model for multi-phases. Cold model system of complex multiphase behavior of argon gas, water and silicon oil system in terms of dynamic similarity was established to validate the math model. Flow field was measured through PIV (particle-image velocimetry) technology. The results show that the built three dimensional mathematical model was valid for the system and suitable for the electrolyzer in electrolysis magnesium industry. The characteristics of complex multiphase in industrial electrolyzer were discussed in the paper.
{"title":"Study Flow Field of Magnesium Electrolyzer by Computer Technology","authors":"Ze Sun, G. Lu, Xingfu Song, Shu-ying Sun, Jianguo Yu","doi":"10.1109/IEEC.2010.5533223","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533223","url":null,"abstract":"In modern times, computer technology is used in various fields in the world. In this paper, CFD(computational fluid dynamics) was applied to build mathematical model to simulate continuous and dispersed multiphase flow in the experimental systems and an industrial electrolyzer. The Volume of Fluid model was used in the mathematical model for multi-phases. Cold model system of complex multiphase behavior of argon gas, water and silicon oil system in terms of dynamic similarity was established to validate the math model. Flow field was measured through PIV (particle-image velocimetry) technology. The results show that the built three dimensional mathematical model was valid for the system and suitable for the electrolyzer in electrolysis magnesium industry. The characteristics of complex multiphase in industrial electrolyzer were discussed in the paper.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121836445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533257
Lei Zhu, Jing Yang
The classical C-V algorithm has the shortage about multi-iterative operations and the computational time is too long to segment the large size image. On the base of analysis upon the relationship between the image size and the number of iterations and time to get the right result, the article proposes a fast image segmentation algorithm based on local C-V active contour model which are based on threshold segmentation and the connected component labeling. In the first step, a coarse segmentation is obtained by using the OTSU method, then label and cut the image with the fast non-recursion pixel marking algorithm of connected domains. The segmentation is used as an initial solution in the C-V model. The analysis and experimental results indicate that the improved C-V algorithm can get the right result quickly compared with classical C-V algorithm. It is fast and effective to segment the large size image which has most profound contour details.
{"title":"Fast Handwritten Chinese Characters Segmentation Algorithm Based on Active Contour Model","authors":"Lei Zhu, Jing Yang","doi":"10.1109/IEEC.2010.5533257","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533257","url":null,"abstract":"The classical C-V algorithm has the shortage about multi-iterative operations and the computational time is too long to segment the large size image. On the base of analysis upon the relationship between the image size and the number of iterations and time to get the right result, the article proposes a fast image segmentation algorithm based on local C-V active contour model which are based on threshold segmentation and the connected component labeling. In the first step, a coarse segmentation is obtained by using the OTSU method, then label and cut the image with the fast non-recursion pixel marking algorithm of connected domains. The segmentation is used as an initial solution in the C-V model. The analysis and experimental results indicate that the improved C-V algorithm can get the right result quickly compared with classical C-V algorithm. It is fast and effective to segment the large size image which has most profound contour details.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115751525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533251
Fei Xu, Jingsha He, Xu Wu, Jing Xu
Privacy is considered to be a critical issue for providing high quality ubiquitous network services to users over the Internet. User's privacy should be protected and access to privacy information must be controlled in accordance with user's privacy preferences. Existing privacy-aware access control strategies often store all the privacy access control policies on the server side and thus fail to consider the dynamic nature of privacy preferences. In this paper, we propose a user-centric privacy-enhanced access control model and show that our model takes the dynamic nature of user's privacy preferences into consideration and can thus fulfill any kind of privacy requirements. By separating access polices apart from privacy policies, which are now stored at user side and therefore fully under user's control, we demonstrate that our model can provide users with a flexible way of controlling privacy policies that are consistent with their preferences.
{"title":"A User-Centric Privacy Access Control Model","authors":"Fei Xu, Jingsha He, Xu Wu, Jing Xu","doi":"10.1109/IEEC.2010.5533251","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533251","url":null,"abstract":"Privacy is considered to be a critical issue for providing high quality ubiquitous network services to users over the Internet. User's privacy should be protected and access to privacy information must be controlled in accordance with user's privacy preferences. Existing privacy-aware access control strategies often store all the privacy access control policies on the server side and thus fail to consider the dynamic nature of privacy preferences. In this paper, we propose a user-centric privacy-enhanced access control model and show that our model takes the dynamic nature of user's privacy preferences into consideration and can thus fulfill any kind of privacy requirements. By separating access polices apart from privacy policies, which are now stored at user side and therefore fully under user's control, we demonstrate that our model can provide users with a flexible way of controlling privacy policies that are consistent with their preferences.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130939697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533249
P. Ao, Longhua Mu
Using the method of fuzzy comprehensive evaluation to evaluate objects to be selected, defects will be brought by using subjective weight method or objective method individually to determine index weights. In this paper, a method is proposed based on IOWA operator. A variety of subjective and objective weights are integrated into a new reasonable comprehensive index weight. The quality of fuzzy comprehensive evaluation is improved by using this method. Verified by an example that a 500kV substation site to be selected is evaluated, evaluation results obtained by using this method are consistent with the actual project selection.
{"title":"Fuzzy Comprehensive Evaluation Based on IOWA Operator and Application","authors":"P. Ao, Longhua Mu","doi":"10.1109/IEEC.2010.5533249","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533249","url":null,"abstract":"Using the method of fuzzy comprehensive evaluation to evaluate objects to be selected, defects will be brought by using subjective weight method or objective method individually to determine index weights. In this paper, a method is proposed based on IOWA operator. A variety of subjective and objective weights are integrated into a new reasonable comprehensive index weight. The quality of fuzzy comprehensive evaluation is improved by using this method. Verified by an example that a 500kV substation site to be selected is evaluated, evaluation results obtained by using this method are consistent with the actual project selection.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123303945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533297
Zhaofei Tian, M. Peng, K. Wang
Thermal economy on-line analysis system (TEOAS) of nuclear power unit can real-timely calculate heat economy index online and analyze thermal economy of full operating nuclear power unit, which provide decision-making basis and relevant technical data for operators and administrators in time. Therefore, the system is of practical significance for energy conservation and improving the management and operation level of nuclear power unit. In this paper, the design principals and expectant functions of TEOAS of nuclear power unit are described; the functions of every part of TEOAS of nuclear power unit are explained.
{"title":"Design of Thermal Economy On-Line Analysis System of Nuclear Power Unit","authors":"Zhaofei Tian, M. Peng, K. Wang","doi":"10.1109/IEEC.2010.5533297","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533297","url":null,"abstract":"Thermal economy on-line analysis system (TEOAS) of nuclear power unit can real-timely calculate heat economy index online and analyze thermal economy of full operating nuclear power unit, which provide decision-making basis and relevant technical data for operators and administrators in time. Therefore, the system is of practical significance for energy conservation and improving the management and operation level of nuclear power unit. In this paper, the design principals and expectant functions of TEOAS of nuclear power unit are described; the functions of every part of TEOAS of nuclear power unit are explained.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114570764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533272
Youjia Fu, Jianwei Li, Ruxi Xiang
Focused on multi-view eye localization in complex background, a new detection method based improved SVM is proposed. First, the face is located by AdaBoost detector and the eye searching range on the face is determined. Then, the crossing detection method, which uses the feature of eye and brow integrated as a whole, and the improved SVM detectors trained by large scale multi-view eye examples are adopted to find the candidate eye regions. Based on the fact that the window region with higher weight in SVM classifier is relatively closer to the eye, and the same eye tends to be repeatedly detected by near windows, the candidate eye regions are filtered to refine the eye location on the multi-view face. Experiments show that the method has very good accuracy and robustness to the eye localization with various face post and expression in the complex background.
{"title":"Robust Eye Localization on Multi-View Face in Complex Background Based on SVM Algorithm","authors":"Youjia Fu, Jianwei Li, Ruxi Xiang","doi":"10.1109/IEEC.2010.5533272","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533272","url":null,"abstract":"Focused on multi-view eye localization in complex background, a new detection method based improved SVM is proposed. First, the face is located by AdaBoost detector and the eye searching range on the face is determined. Then, the crossing detection method, which uses the feature of eye and brow integrated as a whole, and the improved SVM detectors trained by large scale multi-view eye examples are adopted to find the candidate eye regions. Based on the fact that the window region with higher weight in SVM classifier is relatively closer to the eye, and the same eye tends to be repeatedly detected by near windows, the candidate eye regions are filtered to refine the eye location on the multi-view face. Experiments show that the method has very good accuracy and robustness to the eye localization with various face post and expression in the complex background.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124003883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533300
Liu Min-hang, Tao-fang Yu
With the increasing China's total social economy, disposable income of urban residents is increasing significantly, meanwhile sports consumption is also increasing, while it clearly lags behind urban residents in other areas of consumption growth, what is the cause of this result? This study used systematic science perspective, under the help of modern information technology, focused on analysing factors of influencing Chinese urban-town residents' sports consumption, and tried to take necessary data analysis from following aspects: urban-town residents' leisure pattern, acknowledgement of healthy value, daily consumption analysis, mass sports consumption psychology, sports consumption value agreement. According to the study, it shows that, concept of urban-town residents' sports consumption has been changed currently, however, which lags behind developed countries totally. Lags of consumption concept is key factor of restricting the development of sports industry, upgrading problem of sports consumption structure is to be focused questions when we study sports consumption problems. Through this study, it will strengthen us understand the status of current urban-town residents' sports consumption behavior, so as to promote the development of China's sports industry and provide the necessary theoretical support and research base.
{"title":"Notice of RetractionThe Research for Influencing Factors of Sports Consumption Concept of Chinese Urban-Town Residents at Present","authors":"Liu Min-hang, Tao-fang Yu","doi":"10.1109/IEEC.2010.5533300","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533300","url":null,"abstract":"With the increasing China's total social economy, disposable income of urban residents is increasing significantly, meanwhile sports consumption is also increasing, while it clearly lags behind urban residents in other areas of consumption growth, what is the cause of this result? This study used systematic science perspective, under the help of modern information technology, focused on analysing factors of influencing Chinese urban-town residents' sports consumption, and tried to take necessary data analysis from following aspects: urban-town residents' leisure pattern, acknowledgement of healthy value, daily consumption analysis, mass sports consumption psychology, sports consumption value agreement. According to the study, it shows that, concept of urban-town residents' sports consumption has been changed currently, however, which lags behind developed countries totally. Lags of consumption concept is key factor of restricting the development of sports industry, upgrading problem of sports consumption structure is to be focused questions when we study sports consumption problems. Through this study, it will strengthen us understand the status of current urban-town residents' sports consumption behavior, so as to promote the development of China's sports industry and provide the necessary theoretical support and research base.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"256 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129543977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533261
Chang-bin Jiang, Li Chen
Researches on preserving private data in the application of web data mining possess practical value. Through introducing basic concepts of web log mining and private data protection, this paper analyzes the status quo of privacy preservation in web log mining, and then it puts forward privacy preserving mining model based on evolutionary algorithm of cloud model, combining with evolutionary algorithm and cloud model theory. This model utilizes digital features of cloud and transformation between its qualitative concept and quantitative value expression. Thus, this model effectively conceals sensitive data, realizes web log mining based on privacy preservation. Results of the experiment reveal the feasibility and superiority of applying evolutionary algorithm of cloud model to privacy preservation in web log mining.
{"title":"Research on Privacy Preserving Data in Web Log Mining","authors":"Chang-bin Jiang, Li Chen","doi":"10.1109/IEEC.2010.5533261","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533261","url":null,"abstract":"Researches on preserving private data in the application of web data mining possess practical value. Through introducing basic concepts of web log mining and private data protection, this paper analyzes the status quo of privacy preservation in web log mining, and then it puts forward privacy preserving mining model based on evolutionary algorithm of cloud model, combining with evolutionary algorithm and cloud model theory. This model utilizes digital features of cloud and transformation between its qualitative concept and quantitative value expression. Thus, this model effectively conceals sensitive data, realizes web log mining based on privacy preservation. Results of the experiment reveal the feasibility and superiority of applying evolutionary algorithm of cloud model to privacy preservation in web log mining.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129696775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}