2Nd International Conference on Computer and Information Applications (ICCIA 2012)

2Nd International Conference on Computer and Information Applications (ICCIA 2012)

2nd International Conference on Computer and Information Applications (ICCIA 2012) Advances in Intelligent Systems Research Volume 26 Taiyuan, China 8-9 December 2012 Volume 1 of 2 ISBN: 978-1-62993-088-6 Printed from e-media with permission by: Curran Associates, Inc. 57 Morehouse Lane Red Hook, NY 12571 Some format issues inherent in the e-media version may also appear in this print version. Copyright© (2012) by Atlantis Press All rights reserved. Printed by Curran Associates, Inc. (2013) For permission requests, please contact Atlantis Press at the address below. Atlantis Press 8 Square des Bouleaux 75019 Paris France [email protected] Additional copies of this publication are available from: Curran Associates, Inc. 57 Morehouse Lane Red Hook, NY 12571 USA Phone: 845-758-0400 Fax: 845-758-2634 Email: [email protected] Web: www.proceedings.com TABLE OF CONTENTS VOLUME 1 The Patient Admission Scheduling of an Ophthalmic Hospital Using Genetic Algorithm ........................................................................1 Liming Zhang, Huiyou Chang, Ruitian Xu An Effective Image Fusion Method Based on Nonsubsampled Contourlet Transform and Pulse Coupled Neural Network ...............................................................................................................................................................................................................8 Lijuan Ma, Chunhui Zhao An Improved Personalized Recommendation System Research.................................................................................................................13 Xingyuan Li, Qingshui Li A New Energy-Efficient On-Demand Routing Protocol for Green Wireless Mesh Networks ................................................................17 Yinpeng Yu, Yuhuai Peng, Lei Guo, Meng Song Community Evolution in Dynamic Social Networks ....................................................................................................................................21 Gang Wang, Yuli Lei, Chongjun Wang, Shaojie Qiao A Novel Hybrid Threshold Proxy Signature Scheme...................................................................................................................................25 Xin Yang, Long Zhang, Chunming Li, Guoqiang Li Gene Prediction Based on One-Dimensional Image Segmentation ............................................................................................................29 Fei-Yu Wang, Zi-Wei Zheng, Wei-Hua Li Curriculum Schedule Arrangement Solved by An Improved Immune Optimization Algorithm ..........................................................34 Xiao-Feng Li, An Shi, Jian-Guo Luo A Localization Algorithm of Multi-hop Three Dimensional AOA with Space-based Angle Transmission and Its Application ........................................................................................................................................................................................................39 Qingzhang Chen, Yunfeng Ni, Xinghua Li, Rongjie Wu, Yanjing Lei Research on Node Localization Algorithm in WSN basing Machine Learning ........................................................................................43 Qingzhang Chen, Yuzheng Chen, Congling Fan, Fan Yang, Peng Wang, Yanjing Lei Synchronous Optimization Method for Heterogeneous Database Based on the Minimal DataSet ........................................................47 Zhenyou Zhang, Dongguang Wang, Zhi Cao Dynamic Integration System for Heterogeneous Database Based on S2SH ..............................................................................................50 Zhenyou Zhang, Ziqi Zhao, Zhi Cao Data Extraction Method for Heterogeneous Database Based on EJB .......................................................................................................54 Zhenyou Zhang, Bochen Sun, Zhi Cao Target Tracking Based Adaptive Particle Filter in Binary Wireless Sensor Networks ...........................................................................58 Ling-Dong Su, Ming-Yue Zhai, Zhi-Yu Zhu Development Trend Analysis on Corn Futures Price in Our Country by Multiple Regression Model .................................................63 Junyi Chen, Pingyuan Xi Research on the Credit Management of Commercial Banks of Lianyungang City for the SMEs..........................................................67 Junyi Chen, Shuping Han An Efficient Sleeping Scheduling for Save Energy Consumption in Wireless Sensor Networks ............................................................71 Shu-Guang Jia, Li-Peng Lu, Ling-Dong Su, Gui-Lan Xing, Ming-Yue Zhai Research of Node Energy Consumption Based on Dynamic Power Management in Wireless Greenhouse Control System ................................................................................................................................................................................................................76 Yongxian Song, Juanli Ma, Xianjin Zhang Estimation Algorithm of Two-Dimensional Direction of Arrival based on Rectangle array of Distributed Source ............................81 Hui Yao, Ying Wu Blind Image Separation Based on an Optimized Fast Fixed Point Algorithm..........................................................................................85 Wei Yuan, Liyi Zhang A General Threshold Signature Scheme Based on Elliptic Curve..............................................................................................................89 Yulian Shang, Xiujuan Wang, Yujuan Li, Yufei Zhang Design and Implementation of Mongolian Wordnet Management Platform............................................................................................93 Si Ha, Enbo Tang A π-calculus-based Complaint Model for a User-interactive Question Answering System.....................................................................97 Yancheng Li, Hua Duan, Qingtian Zeng, Faming Lu On the First-Order Markov Model for the PLC Fading Channel............................................................................................................101 Wei Shen A Realization of Security Model on Unified Database Console ................................................................................................................105 Hui Wang, Lianzhong Liu Face Recognition Algorithm Based on Kernel Collaborative Representation ........................................................................................109 Liang Zhang, Jiwen Dong A Verifiable Visual Cryptography Scheme Using Neural Networks........................................................................................................113 Yuqiao Deng, Ge Song Kernel Methods and Its Application in Wavefront Reconstruction.........................................................................................................117 Zhiying Tan, Ying Chen, Kun She, Yong Feng Design and Implementation on Auto Test Set of an Airborne Radar ......................................................................................................121 Fulu Jin, Yunpeng Li, Hongrui Wang A Novel Data Access Scheme in Cloud Computing ....................................................................................................................................124 Xiaowei Gao, Zemin Jiang, Rui Jiang Slotting Optimization Algorithm of the Stereo Warehouse.......................................................................................................................128 Junhui Wu, Tongdi Qin, Jie Chen, Huiping Si, Kaiyan Lin, Qiang Zhou, Chibin Zhang Efficient Data Structures for Range Selections Problem ...........................................................................................................................133 Xiaodong Wang, Jun Tian Software Simulation Method for Digital IF GNSS Signal .........................................................................................................................137 Xiangyu Wu, Jinrui Liu, Hang Gong, Gang Ou A Design for Water Surface Communication System of Ultra Short Base Line Positioning System ...................................................141 Fupeng Qiu, Hongjie Wan, Xuewei Wang Non-uniform Cluster-Based Mobile Data Collector Routing Protocol in Wireless Sensor Networks..................................................145 Xinlian Zhou, Sheng Chen Dynamic Evolution of Requirement Goal Deployed on Network Environment .....................................................................................149 Yang Liu, Jinzhao Wu Accelerating Unpopular Channel through Federation ..............................................................................................................................153 Jing He, Wei Zhou, Shipu Wang Research On DB2 Performance Testing Automation.................................................................................................................................157 Lei Zhuang, Zhen Gao, Hao Wu, Chunxin Yang, Miao Zheng Design of Dual-mode RFID Reader..............................................................................................................................................................161 Yulin Zhang, Tongtong Wang, Changbin Shang Remote Video Surveillance System Based on DirectShow and Image Compression..............................................................................165 Shangfu Gong, Ligang Wu, Yanjun Wang The Implementation of Serial Communication CSerial the Port Class ...................................................................................................169

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    16 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us