Default Cover Image

2015 International Conference on Computer Science and Applications (CSA)

Nov. 20 2015 to Nov. 22 2015

Wuhan, China

Table of Contents

[Title page i]Freely available from IEEE.pp. i-i
[Title page iii]Freely available from IEEE.pp. iii-iii
[Copyright notice]Freely available from IEEE.pp. iv-iv
Table of contentsFreely available from IEEE.pp. v-x
PrefaceFreely available from IEEE.pp. xi-xi
Conference OrganizationFreely available from IEEE.pp. xii-xii
Program CommitteeFreely available from IEEE.pp. xiii-xvi
KeynotesFull-text access may be available. Sign in or learn about subscription options.pp. xvii-xvii
Stereo Camera Motion Estimation Based on Euclidean ReconstructionFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Learning Stereoscopic Visual Attention Model for 3D VideoFull-text access may be available. Sign in or learn about subscription options.pp. 6-9
Unified Format Definition for Seismic DataFull-text access may be available. Sign in or learn about subscription options.pp. 10-13
An Image Classification Method Based on Multiple Visual DictionariesFull-text access may be available. Sign in or learn about subscription options.pp. 14-19
A Heuristic Algorithm on Space Information FlowFull-text access may be available. Sign in or learn about subscription options.pp. 20-24
A Target Tracking Algorithm of Passive Sensor Normal Truncated ModelFull-text access may be available. Sign in or learn about subscription options.pp. 25-29
A Spark-Based Study on the Massive Video-Receive IO IssuesFull-text access may be available. Sign in or learn about subscription options.pp. 30-36
Research on Metadata Management Scheme of Distributed File SystemFull-text access may be available. Sign in or learn about subscription options.pp. 37-41
Estimating the Tolerable Waiting Time Using Fuzzy LogicFull-text access may be available. Sign in or learn about subscription options.pp. 42-47
A Framework for 2D Model-Based Pose EstimationFull-text access may be available. Sign in or learn about subscription options.pp. 48-51
A Seam Deviation Real-Time Detection Method Based on Laser Vision TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 52-54
Handwriting Signature Identification Based on Improved Adaptive Median Filtering AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 55-59
Method of Detecting Logistics Driver's Fatigue State Based on Computer VisionFull-text access may be available. Sign in or learn about subscription options.pp. 60-63
A Long Time Tracker Based on Self-Correction and Random Selection StrategyFull-text access may be available. Sign in or learn about subscription options.pp. 64-67
Research on Mining Optimization of FP-Table Algorithm in Mobile Electricity MarketFull-text access may be available. Sign in or learn about subscription options.pp. 68-72
A Content-Based Intelligent Ranking Model for MicroblogFull-text access may be available. Sign in or learn about subscription options.pp. 73-76
A Pore-Based Method for Fingerprint Liveness DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 77-81
Rotation Invariant Common Sketch ExtractionFull-text access may be available. Sign in or learn about subscription options.pp. 82-85
The Financial Data of Anomaly Detection Research Based on Time SeriesFull-text access may be available. Sign in or learn about subscription options.pp. 86-89
Destriping Line-Scan Color Image in Transform DomainFull-text access may be available. Sign in or learn about subscription options.pp. 90-94
Moving Shadow Detection Algorithm Using Multiple FeaturesFull-text access may be available. Sign in or learn about subscription options.pp. 95-98
SAR Image Denoising Method Based on Improved Wiener Filtering and P-M&LLT Partial Differential EquationFull-text access may be available. Sign in or learn about subscription options.pp. 105-108
A New MPR Selection Algorithm Based on the Optimal SubsetFull-text access may be available. Sign in or learn about subscription options.pp. 109-112
CRAWL: A Trace Routing Algorithm Based on Hybrid Two-Layer TopologyFull-text access may be available. Sign in or learn about subscription options.pp. 113-118
Integrated Blur Image Quality Assessment Based on Human Visual PerceptionFull-text access may be available. Sign in or learn about subscription options.pp. 119-124
Behavioral Learning for Data Adjacent Graph Construction in Semi-supervised LearningFull-text access may be available. Sign in or learn about subscription options.pp. 125-129
Chinese Natural Language Processing Based on Semantic Structure TreeFull-text access may be available. Sign in or learn about subscription options.pp. 130-134
Improved One-Class SVM for Pattern DenoisingFull-text access may be available. Sign in or learn about subscription options.pp. 135-140
The Software Design of the Monitor and Simulate System Based on 1553B BusFull-text access may be available. Sign in or learn about subscription options.pp. 141-145
Design and Implementation of Warehouse Management System Based on B/S ModeFull-text access may be available. Sign in or learn about subscription options.pp. 146-150
Design Optimization and Implementation of Bootloader in Embedded System DevelopmentFull-text access may be available. Sign in or learn about subscription options.pp. 151-156
Real-Time Grading Evaluation of Quality of Strokes in Chinese Characters HandwritingFull-text access may be available. Sign in or learn about subscription options.pp. 157-162
Reduction of Feature Items Based on Thesaurus and Its Application in FCAFull-text access may be available. Sign in or learn about subscription options.pp. 163-167
Hand Segmentation Based on Improved Gaussian Mixture ModelFull-text access may be available. Sign in or learn about subscription options.pp. 168-171
Hand Contour Detection Using Spatial Homomorphic Filtering and Variational Level SetFull-text access may be available. Sign in or learn about subscription options.pp. 172-176
A Research of DD Path Automatically Generated SystemFull-text access may be available. Sign in or learn about subscription options.pp. 177-179
Emergency Call Using EEG and Android Operation System for Disabled PeopleFull-text access may be available. Sign in or learn about subscription options.pp. 180-183
The Research and Design of Smart Home System Based on MQXFull-text access may be available. Sign in or learn about subscription options.pp. 188-190
A Constructing Method of Mongolia-Chinese-English Multilingual Semantic Net Based on WordNetFull-text access may be available. Sign in or learn about subscription options.pp. 196-198
The Analysis of Customer Churns in e-Commerce Based on Decision TreeFull-text access may be available. Sign in or learn about subscription options.pp. 199-203
PGST: Using Personal and Global Factors in the Spatio-Temporal Domain for Mobility Relationship MeasurementFull-text access may be available. Sign in or learn about subscription options.pp. 204-207
Design and Development of the Farmers' Personalized M-learning SystemFull-text access may be available. Sign in or learn about subscription options.pp. 208-212
Isogeometric Analysis: The Influence of Penalty Coefficients in Boundary Condition TreatmentsFull-text access may be available. Sign in or learn about subscription options.pp. 213-217
A New Feedback-Based Intra Refresh Method for Robust Video CodingFull-text access may be available. Sign in or learn about subscription options.pp. 218-221
Abnormal Event Detection Using Recurrent Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 222-226
A Novel Research on Feature Extraction of Acoustic Targets Based on Manifold LearningFull-text access may be available. Sign in or learn about subscription options.pp. 227-231
Transfer Learning by Fuzzy Neighborhood Density-Based Clustering and Re-samplingFull-text access may be available. Sign in or learn about subscription options.pp. 232-236
Analysis of the Development and Application of Salary Management System in Railway EnterpriseFull-text access may be available. Sign in or learn about subscription options.pp. 237-240
A Software Testing Method Based on Error Propagation Slicing TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 241-245
A LS-SVM Based Nonlinearity Compensator for Thermocouple Vacuum GaugeFull-text access may be available. Sign in or learn about subscription options.pp. 246-249
The Design of the GPS/BDS Dual Micro-track Recorder and the Application in Puclic InformationFull-text access may be available. Sign in or learn about subscription options.pp. 250-254
A Test Based on Beam Angle of Ultrasonic Transducer ArrayFull-text access may be available. Sign in or learn about subscription options.pp. 255-259
Design and Development of Control Credit Loss Standardization System Based on Dimension Reduction ModelFull-text access may be available. Sign in or learn about subscription options.pp. 260-263
The Application of PDCA Cycle Management in Project ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 268-272
Analysis of Evolutionary Path of Enterprise Cooperative Innovation Based on Technical InputsFull-text access may be available. Sign in or learn about subscription options.pp. 273-277
The Design and Development of Warehouse Management Information System on Hongxing LogisticsFull-text access may be available. Sign in or learn about subscription options.pp. 278-282
The Design of Subway Station Console Extension ModuleFull-text access may be available. Sign in or learn about subscription options.pp. 283-286
Safety Analysis Based on Stochastic Time Petri NetsFull-text access may be available. Sign in or learn about subscription options.pp. 287-292
A Requirement-Driven Web Service Composition Modeling FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 293-297
Randomized Convergent Encryption in the Standard Model via UCEsFull-text access may be available. Sign in or learn about subscription options.pp. 298-302
The Implementation of Adaptive Web Service CompositionFull-text access may be available. Sign in or learn about subscription options.pp. 303-307
Exception Classification and Handling Mechanism of CA-CCML Web Service Composition LanguageFull-text access may be available. Sign in or learn about subscription options.pp. 308-312
Research on Replica Strategy in Cloud Storage SystemFull-text access may be available. Sign in or learn about subscription options.pp. 313-317
A Construction Mechanism of Routing Service Chain Based on the Service CustomizationFull-text access may be available. Sign in or learn about subscription options.pp. 318-322
Decipher the Hidden Secrets Behind Networks: Analyze the Influence Based on the Co-author NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 323-328
Technical and Economic Models of Information SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 329-332
Research on Method for Information Standardized Description and Transmission in Networked Fault DiagnosisFull-text access may be available. Sign in or learn about subscription options.pp. 333-338
Research on Technology of Process Hiding Based on VMMFull-text access may be available. Sign in or learn about subscription options.pp. 339-344
Executable Program Code Segment Address RandomizationFull-text access may be available. Sign in or learn about subscription options.pp. 345-350
Web Service QoS Prediction with Adaptive CalibrationFull-text access may be available. Sign in or learn about subscription options.pp. 351-356
Research on Data Communication Between Intelligent Terminals of Medical Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 357-359
Evaluation of Spatial Configuration and Cross-Regional Sharing of Urban SheltersFull-text access may be available. Sign in or learn about subscription options.pp. 360-365
Network Security Monitoring and Defense System Framework Design Using Mobile Agents Based on DoDAFFull-text access may be available. Sign in or learn about subscription options.pp. 366-370
Demystifying the Resilient Clustering Protocols in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 371-376
Research on Resource Allocation Scheme Based on Access Control in Cloud Computing EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 377-380
Author indexFreely available from IEEE.pp. 381-382
[Publisher's information]Freely available from IEEE.pp. 384-384
Showing 89 out of 89