Study on the Example Validation for the Linear Approximation Optimization Method

Study on the Example Validation for the Linear Approximation Optimization Method

2010 Third International Symposium on Information Processing (ISIP 2010) Qingdao, Shandong, China 15 – 17 October 2010 IEEE Catalog Number: CFP1014E-PRT ISBN: 978-1-4244-8627-4 Third International Symposium on Information Processing ISIP 2010 Table of Contents Message from the Symposium Chairs..................................................................................................xv Organizing Committee...................................................................................................................................xvi Conference Committee................................................................................................................................xvii Reviewers..............................................................................................................................................................xix ISIP 2010 Technical Papers Study on the Example Validation for the Linear Approximation Optimization Method ...........................................................................................................................................................................3 Zhang Chunling A Measuring Approach of Portfolio’s VaR Based on APGARCH-EWMA Model .............................................................................................................................................................................6 Ping Wang A New Method of License Plate Location Based on Multi-threshold Quantization Segmentation of Color Image ............................................................................................................9 Kang Xie and Ying Wang Study on Risk Assessment of Power Network Planning Projects Based on G1 Method and F-DS Evidential Theory .....................................................................................................................14 Hui Shi and Jianqing Li The Study of Enterprise Human Resource Evaluation Research Based on Neural Network ....................................................................................................................................................19 Xinchun Wang and Yubo Jiang Research on Robot Network Communication System in Underground Coal Mine Based on ZigBee ..............................................................................................................................................22 Quanxi Li, Hongtu Zhao, and Peiqian Liu Research of Congestion Control in Wireless Video Transmission ....................................................................25 Zhou Zurong and Chen Rongzhen v A Reinforced Approach for Enhancing Stochastic Search ..................................................................................29 Jiarui Si, Jing Yang, Xiaopei Li, and Chunhua Tao Research on Force Control Algorithm of Parallel System ..................................................................................32 Hui Liang, Hongfang Li, and Xiaona Zhang A Prediction Approach of Transmembrane Helical Segments in Membrane Proteins Based on Wavelet Transform ...................................................................................................................35 Bin Yu and Yan Zhang QoS Routing Scheme for Wireless Multimedia Networks Based on UWB .....................................................39 Qiuna Niu Applying Semi-supervised Cluster Algorithm for Anomaly Detection ............................................................43 Gao Xiang and Wang Min Study of Multiple Instances Schedule Based on Object Pool .............................................................................46 Linlan Liu, Shuang Cao, Yebin Chen, and Jian Shu RET: A Random and Encounter Time Based Forwarding Mechanism for Opportunistic Network .......................................................................................................................................50 Jian Shu, Kun Yu, Linlan Liu, Yebin Chen, and Youlei Fan SANATOMY: Privacy Preserving Publishing of Data Streams via Anatomy ................................................54 Pu Wang, Lei Zhao, Jianjiang Lu, and Jiwen Yang Processing Online Market Information Based on Users’ Online Information Behavior ......................................................................................................................................................................58 Liu Yanbin and Yuan Ping Mechanism of Particle Swarm Optimization and Analysis on Its Convergence .............................................63 Wen-fei Zeng, Ying-jie Zhang, and Ling Yan Cryptanalysis of a Substitution–Diffusion Based Image Cipher Using Chaotic Standard and Logistic Map ......................................................................................................................................67 Jin-mei Liu and Qiang Qu A Telemetry System for Neuronal Signal Acquiring and Processing ...............................................................70 Wang Min, Zhao Yiliang, Ai Hongbin, Guang Kui, Yang Maoquan, and Zhang Xiao Tabu Search Algorithm for Solving the Vehicle Routing Problem ...................................................................74 Cui-hua Guan, Yan Cao, and Jing Shi A Project Management System for Product Development ..................................................................................78 Peng Wuliang, Meng Fanbo, and Kong Decai I2C Protocol Design for Reusability .......................................................................................................................83 Zheng-wei Hu An Adaptive Airspace Sectorization Algorithm and Intelligent Controlling ...................................................87 Jun Luo, Lin Zhang, and Haiwen Xu vi Hybrid Particle Swarm Optimized Wavelet Network for Video OCR ..............................................................91 Tongcheng Huang and Liping Yin Survivable Storage Architecture ..............................................................................................................................95 Zhang Wei, Liu Shuguang, and Zhong Weidong Interpretation and Simulation of the JVM .............................................................................................................98 Hong-Na Zhang and Yi-Jun Liu Evaluation of Market Feedback about the Price Strategy of Enterprises ........................................................102 Yang Junqi, Chen Lijia, Gao Xia, and Li Junmei A Grey Forecasting Model Based on BP Neural Network for Crude Oil Production and Consumption in China .................................................................................................................105 Hongwei Ma and Yonghe Wu The Impact of Reward Programs on Customer Behavior of Commercial Bank ............................................110 Yanan Gu Research on Hamilton Graph Discrimination .....................................................................................................113 Yan Cui and Chao-Dong Cui Approach to Construct Cluster in Unstructured P2P Networks Based on Small-World Theory ..........................................................................................................................................117 Zhen Zhang Pedestrian Detection Based on Active Contour Models ....................................................................................121 Jin Feifei, Zheng Aibo, and Wang Shengke Spatial Heterogeneity of Vegetation and Its Causes in Southern Yunnan Province .....................................................................................................................................................................126 Chengyuan Hao and Xiaoping Lu Weak Signal De-noising Method Based on Accumulation in Frequency Domain and Wavelet Transform ...........................................................................................................................130 Wei Chongyu and Zhu Weijuan The Research of Optimization Algorithms of Vertical Handoff in Heterogeneous Network .....................................................................................................................................134 Longjiang Li and Xianwu Zeng A Compressed Format Index Based on the Wavelet Tree and Its Implement................................................139 Zhang Yi, Li Xiao-qi, Lu Yan, and Zhao Xiao-hui CLSP2P: A P2P Overlay Combination Location and Semantic Clustering ...................................................143 Huo Ying Research on Long Running Transaction Consistency Based on CSP Trace Semantic ....................................................................................................................................................................148 Wang Xiaolan and He Hong vii Research on Aquatic Vegetation Monitoring Technology Based on WSN ....................................................153 Wenliang Tang and Zhishui Huang On Customer Churn and Early Warning Model of Telecom Broadband ........................................................157 Ding Pan Codeless Data Acquisition and Analysis Software (CDA&A) Development Platform .....................................................................................................................................................................161 Xin Wang, Shumao Wang, and Junping Shang Research on Soft Sensing Technology for Column Efficiency of Ion Chromatography ......................................................................................................................................................166 Ma Xinglu Breaking a Chaotic

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    11 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us