首页 > 最新文献

Third International Conference on Information Technology and Applications (ICITA'05)最新文献

英文 中文
Rights Sensitive Information Sharing Space Based on Multi-Agent System 基于多agent系统的权限敏感信息共享空间
S. Amamiya, M. Amamiya
In the near future, people will be able to access information and resources on the public open network environment. However, few current network environments seem to have unified method for protection of information and resource. This paper proposes a unified resource protection scheme on the basis of fusion of two multi-agent systems called Kodama and VPC. Kodama has the power of constructing flexible hierarchical logical spaces, and VPC has the ability to dynamically change its behavior according to the circumstance of user. As a protection scheme, two kinds of policies called public policy and private policy are introduced into the fused multi-agent system. Combination of these policies makes it possible to realize an open and secure information sharing system. We show practical sample applications using the scheme
在不久的将来,人们将能够在公共开放的网络环境中获取信息和资源。然而,目前的网络环境似乎很少有统一的方法来保护信息和资源。在融合Kodama和VPC两个多智能体系统的基础上,提出了一种统一的资源保护方案。Kodama具有构建灵活的分层逻辑空间的能力,VPC具有根据用户的情况动态改变其行为的能力。作为一种保护方案,在融合多智能体系统中引入公共策略和私有策略两种策略。这些策略的结合可以实现一个开放、安全的信息共享系统。我们展示了使用该方案的实际示例应用程序
{"title":"Rights Sensitive Information Sharing Space Based on Multi-Agent System","authors":"S. Amamiya, M. Amamiya","doi":"10.1109/ICITA.2005.239","DOIUrl":"https://doi.org/10.1109/ICITA.2005.239","url":null,"abstract":"In the near future, people will be able to access information and resources on the public open network environment. However, few current network environments seem to have unified method for protection of information and resource. This paper proposes a unified resource protection scheme on the basis of fusion of two multi-agent systems called Kodama and VPC. Kodama has the power of constructing flexible hierarchical logical spaces, and VPC has the ability to dynamically change its behavior according to the circumstance of user. As a protection scheme, two kinds of policies called public policy and private policy are introduced into the fused multi-agent system. Combination of these policies makes it possible to realize an open and secure information sharing system. We show practical sample applications using the scheme","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123306019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic seal imprint verification system for bank check processing 自动印鉴系统,用于银行支票处理
K. Ueda, Ken'ichi Matsuo
In this paper, we propose a multi-expert seal imprint verification system. The system has been specifically designed for applications in the Japanese bank check processing. A difficult problem encountered in automatic seal imprint verification is that the system is required an extremely low error rate despite of using a small number of reference data for training. To conquer this problem, it combines two different algorithms for seal imprint verification. A seal imprint is first extracted from bank check image based on color features. The first verification algorithm is based on a method using local and global features of seal imprint. The second algorithm uses a special correlation based on a global approach. The two algorithms are combined in the multi-expert system by a voting strategy. Experimental results showed that the combination of the two algorithms improves significantly the verification performance both on "false-acceptance error rate" and "false-rejection error rate".
在本文中,我们提出了一个多专家印章印记验证系统。该系统是专门为日本银行支票处理应用而设计的。在印鉴自动验证中遇到的一个难题是,尽管使用少量的参考数据进行训练,但系统需要极低的错误率。为了解决这个问题,它结合了两种不同的印章印记验证算法。首先根据颜色特征从银行支票图像中提取印章印记。第一种验证算法是基于印鉴的局部特征和全局特征相结合的方法。第二种算法使用基于全局方法的特殊相关性。通过投票策略将两种算法结合在多专家系统中。实验结果表明,两种算法的结合在“误接受错误率”和“误拒绝错误率”两方面都显著提高了验证性能。
{"title":"Automatic seal imprint verification system for bank check processing","authors":"K. Ueda, Ken'ichi Matsuo","doi":"10.1109/ICITA.2005.81","DOIUrl":"https://doi.org/10.1109/ICITA.2005.81","url":null,"abstract":"In this paper, we propose a multi-expert seal imprint verification system. The system has been specifically designed for applications in the Japanese bank check processing. A difficult problem encountered in automatic seal imprint verification is that the system is required an extremely low error rate despite of using a small number of reference data for training. To conquer this problem, it combines two different algorithms for seal imprint verification. A seal imprint is first extracted from bank check image based on color features. The first verification algorithm is based on a method using local and global features of seal imprint. The second algorithm uses a special correlation based on a global approach. The two algorithms are combined in the multi-expert system by a voting strategy. Experimental results showed that the combination of the two algorithms improves significantly the verification performance both on \"false-acceptance error rate\" and \"false-rejection error rate\".","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121339776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Using Look-Ahead Protocol for Mobile Data Broadcast 在移动数据广播中使用前瞻协议
K. Lam, C. Wong, William Leung
In this paper, we propose an efficient approach to maintaining data consistency of broadcast data in mobile computing environments. At the server a special read-only transaction, the broadcast transaction, is scheduled to read data entities from the database for broadcasting data. Obviously, traditional concurrency control algorithms are inadequate and inefficient as the broadcast transaction creates numerous data conflicts with other update transactions, which are concurrently accessing the same set of data entities. Some algorithms for global-reading of databases, Shade Test and Color Test could be a solution. However, we observe that they have also some deficiencies. Therefore, we devise a new and efficient algorithm called Look-Ahead Protocol (LAP) to address this problem. The simulation results show that our algorithm outperforms all existing algorithms
在本文中,我们提出了一种在移动计算环境中保持广播数据一致性的有效方法。在服务器上,安排一个特殊的只读事务,即广播事务,从数据库中读取数据实体以广播数据。显然,传统的并发控制算法是不充分和低效的,因为广播事务与其他更新事务产生了大量的数据冲突,这些事务并发地访问同一组数据实体。一些算法全局读取数据库,色度测试和颜色测试可能是一个解决方案。然而,我们观察到它们也有一些不足。因此,我们设计了一种新的高效算法,称为前瞻性协议(LAP)来解决这个问题。仿真结果表明,该算法优于现有的所有算法
{"title":"Using Look-Ahead Protocol for Mobile Data Broadcast","authors":"K. Lam, C. Wong, William Leung","doi":"10.1109/ICITA.2005.299","DOIUrl":"https://doi.org/10.1109/ICITA.2005.299","url":null,"abstract":"In this paper, we propose an efficient approach to maintaining data consistency of broadcast data in mobile computing environments. At the server a special read-only transaction, the broadcast transaction, is scheduled to read data entities from the database for broadcasting data. Obviously, traditional concurrency control algorithms are inadequate and inefficient as the broadcast transaction creates numerous data conflicts with other update transactions, which are concurrently accessing the same set of data entities. Some algorithms for global-reading of databases, Shade Test and Color Test could be a solution. However, we observe that they have also some deficiencies. Therefore, we devise a new and efficient algorithm called Look-Ahead Protocol (LAP) to address this problem. The simulation results show that our algorithm outperforms all existing algorithms","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114681302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Automatic address assignment for IPv6 end-to-end multihoming sites IPv6端到端多主站点的自动地址分配
K. Ohira, Youichi Koyama, K. Fujikawa, Y. Okabe
IPv6 site multihoming discussed at the Multi6 working group is one of the hottest topics among many IPv6 related issues in the IETF. We have already proposed a variant of end-to-end multihoming (E2E-MH), where an outgoing packet from a site is routed to a site-exit router by source address dependent (SAD) routing so that it goes out to the transit provider that gives the address prefix of the source address of it. In this paper, we first show that such SAD routing can be implemented with acceptable cost when we apply SAD routing only to default route entries on each router. Next we propose a hierarchical subdivision method for automatic address prefix assignment to links in a site. Connecting the SAD routing setting up on each router with the hierarchical address assignment, all needed configuration of routers can automatically be done, without any pre-configurations about IP address or routing information.
Multi6工作组讨论的IPv6站点多宿主是IETF众多IPv6相关问题中最热门的话题之一。我们已经提出了端到端多宿主(E2E-MH)的一种变体,其中来自站点的传出数据包通过源地址依赖(SAD)路由路由到站点出口路由器,以便它发送到提供其源地址前缀的传输提供者。在本文中,我们首先证明了当我们只对每个路由器上的默认路由项应用SAD路由时,这种SAD路由可以以可接受的成本实现。接下来,我们提出了一种自动地址前缀分配到站点链接的分层细分方法。将每台路由器上的SAD路由设置与分层地址分配连接起来,无需预先配置IP地址或路由信息,即可自动完成路由器所需的所有配置。
{"title":"Automatic address assignment for IPv6 end-to-end multihoming sites","authors":"K. Ohira, Youichi Koyama, K. Fujikawa, Y. Okabe","doi":"10.1109/ICITA.2005.79","DOIUrl":"https://doi.org/10.1109/ICITA.2005.79","url":null,"abstract":"IPv6 site multihoming discussed at the Multi6 working group is one of the hottest topics among many IPv6 related issues in the IETF. We have already proposed a variant of end-to-end multihoming (E2E-MH), where an outgoing packet from a site is routed to a site-exit router by source address dependent (SAD) routing so that it goes out to the transit provider that gives the address prefix of the source address of it. In this paper, we first show that such SAD routing can be implemented with acceptable cost when we apply SAD routing only to default route entries on each router. Next we propose a hierarchical subdivision method for automatic address prefix assignment to links in a site. Connecting the SAD routing setting up on each router with the hierarchical address assignment, all needed configuration of routers can automatically be done, without any pre-configurations about IP address or routing information.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123688721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using fuzzy functions to aggregate usability study data: a novel approach 利用模糊函数聚合可用性研究数据:一种新方法
S. Ramalingam, D. Iourinski
This paper describes an attempt to develop a fuzzy data aggregation technique for analyzing data collected during a groupware usability study. We show the formal parallelism between the decision making problem and that of ranking alternatives in a usability study. This equivalence allows using a combination of decision under uncertainty and multi-criteria decision making (MCDM) techniques for ranking alternatives for developing an approach for ranking alternatives within a usability study. The effectiveness of such approach is then illustrated with experimental data gathered during a usability study conducted by the Ambient Technology Group in Middlesex University.
本文描述了开发一种模糊数据聚合技术的尝试,用于分析在群件可用性研究中收集的数据。在可用性研究中,我们展示了决策问题和备选方案排序问题之间的形式化并行性。这种等价性允许使用不确定性下的决策和多标准决策(MCDM)技术的组合来对备选方案进行排序,从而开发一种在可用性研究中对备选方案进行排序的方法。这种方法的有效性随后由米德尔塞克斯大学环境技术小组进行的可用性研究中收集的实验数据来说明。
{"title":"Using fuzzy functions to aggregate usability study data: a novel approach","authors":"S. Ramalingam, D. Iourinski","doi":"10.1109/ICITA.2005.296","DOIUrl":"https://doi.org/10.1109/ICITA.2005.296","url":null,"abstract":"This paper describes an attempt to develop a fuzzy data aggregation technique for analyzing data collected during a groupware usability study. We show the formal parallelism between the decision making problem and that of ranking alternatives in a usability study. This equivalence allows using a combination of decision under uncertainty and multi-criteria decision making (MCDM) techniques for ranking alternatives for developing an approach for ranking alternatives within a usability study. The effectiveness of such approach is then illustrated with experimental data gathered during a usability study conducted by the Ambient Technology Group in Middlesex University.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"294 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124173532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Investigation on operations of a secure communication system based on the chaotic phase shift keying scheme 基于混沌相移键控方案的保密通信系统操作研究
G. S. Sandhu, S. Berber
This paper presents the results of the investigation of a chaotic multi-user modulation method, called chaotic phase shift keying. Only one chaotic sequence generator exists in each transmitter and receiver. We present the theory behind their operations, as well as the bit error rate derivation. It was found to have better performances, confirmed by analytical and simulation results, than the chaotic shift keying (CSK) system, which requires two chaotic sequence generators in each transmitter and receiver.
本文介绍了一种称为混沌相移键控的混沌多用户调制方法的研究结果。每个发送端和接收端只存在一个混沌序列发生器。我们给出了其操作背后的理论,以及误码率的推导。分析和仿真结果表明,该方法比混沌移位键控(CSK)系统具有更好的性能,CSK系统在每个发送端和接收端都需要两个混沌序列发生器。
{"title":"Investigation on operations of a secure communication system based on the chaotic phase shift keying scheme","authors":"G. S. Sandhu, S. Berber","doi":"10.1109/ICITA.2005.164","DOIUrl":"https://doi.org/10.1109/ICITA.2005.164","url":null,"abstract":"This paper presents the results of the investigation of a chaotic multi-user modulation method, called chaotic phase shift keying. Only one chaotic sequence generator exists in each transmitter and receiver. We present the theory behind their operations, as well as the bit error rate derivation. It was found to have better performances, confirmed by analytical and simulation results, than the chaotic shift keying (CSK) system, which requires two chaotic sequence generators in each transmitter and receiver.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128999661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Using image contour recognition in GIS navigation 图像轮廓识别在GIS导航中的应用
Wei Lai, Donggang Yu, J. Tanaka, Cai Fei
This paper presents an approach of using image contour recognition in the navigation for enterprise geographic information systems (GIS). The extraction of object mark images is based on some morphological structural patterns which are described by morphological structural points, contour property, and other geometrical data in a binary image of enterprise geographic information map. Some preprocessing methods, contour smooth following, linearization and extraction patterns of structural points, are introduced. If a focus point of a map is selected, based on the extracted object mark image, a dynamic layout and navigation diagram is constructed, which consists of three underlying views: a graph navigation view, an image layout view, and an enterprise information view. In the diagram each object mark image is represented by a node, the relation information between two nodes is represented by an edge. If a node is selected, the new dynamic layout and navigation diagram is found based on the extracted object mark images around the selected node, which contains the relation with the previous diagram. Therefore a dynamic layout adjustment and navigation for enterprise GIS is determined.
提出了一种将图像轮廓识别应用于企业地理信息系统(GIS)导航的方法。目标标记图像的提取是基于企业地理信息地图二值图像中形态结构点、等高线属性等几何数据所描述的形态结构模式。介绍了结构点的轮廓平滑跟踪、线性化和提取模式等预处理方法。如果选择地图的焦点,则根据提取的对象标记图像构建动态布局导航图,该动态布局导航图包含三个底层视图:图形导航视图、图像布局视图和企业信息视图。图中每个对象标记图像用一个节点表示,两个节点之间的关系信息用一条边表示。如果选择一个节点,则根据所选节点周围提取的对象标记图像找到新的动态布局导航图,其中包含与前一个图的关系。从而确定了企业地理信息系统的动态布局调整与导航。
{"title":"Using image contour recognition in GIS navigation","authors":"Wei Lai, Donggang Yu, J. Tanaka, Cai Fei","doi":"10.1109/ICITA.2005.297","DOIUrl":"https://doi.org/10.1109/ICITA.2005.297","url":null,"abstract":"This paper presents an approach of using image contour recognition in the navigation for enterprise geographic information systems (GIS). The extraction of object mark images is based on some morphological structural patterns which are described by morphological structural points, contour property, and other geometrical data in a binary image of enterprise geographic information map. Some preprocessing methods, contour smooth following, linearization and extraction patterns of structural points, are introduced. If a focus point of a map is selected, based on the extracted object mark image, a dynamic layout and navigation diagram is constructed, which consists of three underlying views: a graph navigation view, an image layout view, and an enterprise information view. In the diagram each object mark image is represented by a node, the relation information between two nodes is represented by an edge. If a node is selected, the new dynamic layout and navigation diagram is found based on the extracted object mark images around the selected node, which contains the relation with the previous diagram. Therefore a dynamic layout adjustment and navigation for enterprise GIS is determined.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129395212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multimedia Traffic Classification Scheme for Intrusion Detection Systems 一种用于入侵检测系统的多媒体流分类方案
Oge Marques, Pierre Baillargeon
Intrusion detection systems (IDS) have become widely used tools for ensuring system and network security. Among many other challenges, contemporary IDS have to cope with increasingly higher bandwidths, which sometimes force them to let some data go by without being checked for possible malicious activity. This paper presents a novel method to improve the performance of IDS based on multimedia traffic classification. In the proposed method, the IDS has additional knowledge about common multimedia file formats and uses this knowledge to perform a more detailed analysis of packets carrying that type of data. If the structure and selected contents of the data are compliant, the corresponding stream is tagged accordingly, and the IDS is spared from further work on that stream. Otherwise, an anomaly is detected and reported. Our experiments using Snort confirm that this additional specialized knowledge results in substantial computational savings, without significant overhead for processing non-multimedia data
入侵检测系统(IDS)已成为保障系统和网络安全的广泛工具。在许多其他挑战中,现代IDS必须应对越来越高的带宽,这有时迫使它们让一些数据通过而不检查可能的恶意活动。提出了一种基于多媒体流量分类的IDS性能改进方法。在提出的方法中,IDS具有关于常见多媒体文件格式的附加知识,并使用这些知识对携带该类型数据的数据包执行更详细的分析。如果数据的结构和选择的内容是兼容的,那么相应的流就会被相应地标记,IDS就不必在该流上做进一步的工作。否则,系统将检测到异常并上报。我们使用Snort进行的实验证实,这些额外的专业知识可以节省大量的计算量,而且在处理非多媒体数据时不会产生很大的开销
{"title":"A Multimedia Traffic Classification Scheme for Intrusion Detection Systems","authors":"Oge Marques, Pierre Baillargeon","doi":"10.1109/ICITA.2005.28","DOIUrl":"https://doi.org/10.1109/ICITA.2005.28","url":null,"abstract":"Intrusion detection systems (IDS) have become widely used tools for ensuring system and network security. Among many other challenges, contemporary IDS have to cope with increasingly higher bandwidths, which sometimes force them to let some data go by without being checked for possible malicious activity. This paper presents a novel method to improve the performance of IDS based on multimedia traffic classification. In the proposed method, the IDS has additional knowledge about common multimedia file formats and uses this knowledge to perform a more detailed analysis of packets carrying that type of data. If the structure and selected contents of the data are compliant, the corresponding stream is tagged accordingly, and the IDS is spared from further work on that stream. Otherwise, an anomaly is detected and reported. Our experiments using Snort confirm that this additional specialized knowledge results in substantial computational savings, without significant overhead for processing non-multimedia data","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129589527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A 3D reconstruction algorithm based on 3D deformable atlas 一种基于三维可变形图谱的三维重建算法
Ying Zhu, S. Belkasim
Reconstructing 3D models from 2D images is an important problem in visualization, particularly in medical and biological visualization. We present a new algorithm for 3D model reconstruction from 2D-images. In our approach, a 3D atlas is deformed to fit the feature data set in the target images. Compared with existing 3D reconstruction techniques, our approach is more efficient and easier to control. The resultant model has good inherent connectivity and smoothness. The resolution of the final model is determined by the resolution of reference model rather than the dataset. The model generates highly detailed view with a limited number of images. This algorithm has been successfully applied to medical simulation.
从二维图像重建三维模型是可视化中的一个重要问题,特别是在医学和生物学可视化中。提出了一种从二维图像重建三维模型的新算法。在我们的方法中,三维地图集被变形以适应目标图像中的特征数据集。与现有的三维重建技术相比,我们的方法更有效,更容易控制。所得模型具有良好的内在连通性和平滑性。最终模型的分辨率由参考模型的分辨率决定,而不是由数据集的分辨率决定。该模型使用有限数量的图像生成非常详细的视图。该算法已成功应用于医学仿真中。
{"title":"A 3D reconstruction algorithm based on 3D deformable atlas","authors":"Ying Zhu, S. Belkasim","doi":"10.1109/ICITA.2005.3","DOIUrl":"https://doi.org/10.1109/ICITA.2005.3","url":null,"abstract":"Reconstructing 3D models from 2D images is an important problem in visualization, particularly in medical and biological visualization. We present a new algorithm for 3D model reconstruction from 2D-images. In our approach, a 3D atlas is deformed to fit the feature data set in the target images. Compared with existing 3D reconstruction techniques, our approach is more efficient and easier to control. The resultant model has good inherent connectivity and smoothness. The resolution of the final model is determined by the resolution of reference model rather than the dataset. The model generates highly detailed view with a limited number of images. This algorithm has been successfully applied to medical simulation.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128062938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Service-Cloud Model of Composed Web Services 组合Web服务的服务-云模型
Yanping Chen, Zeng-zhi Li, Li Wang, Huaizhou Yang
Dynamic composing Web services provides an efficient mechanism to offer complex large systems. Substantial progress has already been made towards composing Web services. Unfortunately, these approaches cannot build a model of the whole life cycle of composed Web services. In order to solve this problem, we designed a model named Service-Cloud model based on the forming picture of clouds in nature. Service-Cloud model can describe the whole life cycle of the composed Web services: discovery, compose, publish, and terminate. Based on Service-Cloud model, we also designed and implemented a prototype
动态组合Web服务为提供复杂的大型系统提供了一种有效的机制。在组合Web服务方面已经取得了实质性的进展。不幸的是,这些方法不能构建组合Web服务的整个生命周期的模型。为了解决这一问题,我们基于自然界中云的形成图景,设计了一个名为Service-Cloud的模型。服务-云模型可以描述组合Web服务的整个生命周期:发现、组合、发布和终止。基于Service-Cloud模型,我们还设计并实现了一个原型
{"title":"Service-Cloud Model of Composed Web Services","authors":"Yanping Chen, Zeng-zhi Li, Li Wang, Huaizhou Yang","doi":"10.1109/ICITA.2005.251","DOIUrl":"https://doi.org/10.1109/ICITA.2005.251","url":null,"abstract":"Dynamic composing Web services provides an efficient mechanism to offer complex large systems. Substantial progress has already been made towards composing Web services. Unfortunately, these approaches cannot build a model of the whole life cycle of composed Web services. In order to solve this problem, we designed a model named Service-Cloud model based on the forming picture of clouds in nature. Service-Cloud model can describe the whole life cycle of the composed Web services: discovery, compose, publish, and terminate. Based on Service-Cloud model, we also designed and implemented a prototype","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126344339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
Third International Conference on Information Technology and Applications (ICITA'05)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1