Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
CSA
CSA 2015
Generate Citations
2015 International Conference on Computer Science and Applications (CSA)
Nov. 20 2015 to Nov. 22 2015
Wuhan, China
Table of Contents
[Title page i]
Freely available from IEEE.
pp. i-i
[Title page iii]
Freely available from IEEE.
pp. iii-iii
[Copyright notice]
Freely available from IEEE.
pp. iv-iv
Table of contents
Freely available from IEEE.
pp. v-x
Preface
Freely available from IEEE.
pp. xi-xi
Conference Organization
Freely available from IEEE.
pp. xii-xii
Program Committee
Freely available from IEEE.
pp. xiii-xvi
Keynotes
Full-text access may be available. Sign in or learn about subscription options.
pp. xvii-xvii
Stereo Camera Motion Estimation Based on Euclidean Reconstruction
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Ning-Hao Xu
,
Xin Du
,
Yun-Fang Zhu
Learning Stereoscopic Visual Attention Model for 3D Video
Full-text access may be available. Sign in or learn about subscription options.
pp. 6-9
by
Gang-Jian Huang
,
Xin Du
,
Yun-Fang Zhu
Unified Format Definition for Seismic Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 10-13
by
Yong-Jiang Liu
,
Bi-Long Wen
An Image Classification Method Based on Multiple Visual Dictionaries
Full-text access may be available. Sign in or learn about subscription options.
pp. 14-19
by
Jian Zhang
,
Xiao-yin Zhang
,
Zhou Lei
,
Wen-feng Shen
A Heuristic Algorithm on Space Information Flow
Full-text access may be available. Sign in or learn about subscription options.
pp. 20-24
by
Alfred Uwitonze
,
Yuan-Qing Ye
,
Jia-Qing Huang
,
Wen-Qing Cheng
A Target Tracking Algorithm of Passive Sensor Normal Truncated Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-29
by
Rong Wang
,
Xin-Xi Feng
,
Wei Du
,
Xiao-Mei Yan
A Spark-Based Study on the Massive Video-Receive IO Issues
Full-text access may be available. Sign in or learn about subscription options.
pp. 30-36
by
Zhou Lei
,
Hong-Xun Lin
,
Hong-Guang Du
,
Wen-Feng Shen
,
Hui-Ran Zhang
,
Yu Lei
Research on Metadata Management Scheme of Distributed File System
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-41
by
Lin Huo
,
Ran Yi
Estimating the Tolerable Waiting Time Using Fuzzy Logic
Full-text access may be available. Sign in or learn about subscription options.
pp. 42-47
by
Meng-Ting Li
,
Xiang Li
,
Jian Yin
A Framework for 2D Model-Based Pose Estimation
Full-text access may be available. Sign in or learn about subscription options.
pp. 48-51
by
Wei Wang
,
Guang-Jun Zhang
,
Zhen-Zhong Wei
A Seam Deviation Real-Time Detection Method Based on Laser Vision Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 52-54
by
Wen-Ming Zhang
,
Xiao-Xi Liu
,
Jian Xu
Handwriting Signature Identification Based on Improved Adaptive Median Filtering Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 55-59
by
Mei Wang
,
Xiao-Rong Lin
,
Liang Wang
,
Miao-Li Wen
,
Hong-Yang Zan
Method of Detecting Logistics Driver's Fatigue State Based on Computer Vision
Full-text access may be available. Sign in or learn about subscription options.
pp. 60-63
by
Guo-Fang Zhao
,
Ai-Xia Han
A Long Time Tracker Based on Self-Correction and Random Selection Strategy
Full-text access may be available. Sign in or learn about subscription options.
pp. 64-67
by
Zhi-Qin Zhang
,
Yi Cai
Research on Mining Optimization of FP-Table Algorithm in Mobile Electricity Market
Full-text access may be available. Sign in or learn about subscription options.
pp. 68-72
by
Xuesong Zhang
,
Chuncheng Gao
,
Yong Dai
,
Minghai Jiao
A Content-Based Intelligent Ranking Model for Microblog
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-76
by
Hui-Xiang Xiong
,
Jin Hu
,
Xu Yang
A Pore-Based Method for Fingerprint Liveness Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 77-81
by
Meng-Ya Lu
,
Zhi-Qiang Chen
,
Wei-Guo Sheng
Rotation Invariant Common Sketch Extraction
Full-text access may be available. Sign in or learn about subscription options.
pp. 82-85
by
Si-Yuan Li
,
Ya-Li Yang
,
Yun-Feng Sun
,
Dan Hui
The Financial Data of Anomaly Detection Research Based on Time Series
Full-text access may be available. Sign in or learn about subscription options.
pp. 86-89
by
Chen-Ming Guo
,
Ling-Yu Xu
,
Hui-Fang Liu
,
Lei Wang
,
Xiang Yu
,
Bo Han
Destriping Line-Scan Color Image in Transform Domain
Full-text access may be available. Sign in or learn about subscription options.
pp. 90-94
by
Wen-Zhu Yang
,
Zhao-Hai Liu
,
Si-Le Wang
,
Su-Kui Lu
Moving Shadow Detection Algorithm Using Multiple Features
Full-text access may be available. Sign in or learn about subscription options.
pp. 95-98
by
Wen-Hua Xie
,
Ji-Yong Zhao
,
Yan-Ming Hu
The Algorithm Reseach of Detecting Single-Phase-to-Ground Fault Line on Distribution Network with Distributed Generation
Full-text access may be available. Sign in or learn about subscription options.
pp. 99-104
by
Qiang Fan
,
Kai Huang
,
Yong Xiao
,
Mei-Mei Xu
,
Jian-Guo Chen
,
Wei Gu
SAR Image Denoising Method Based on Improved Wiener Filtering and P-M&LLT Partial Differential Equation
Full-text access may be available. Sign in or learn about subscription options.
pp. 105-108
by
Yang Cai
,
Xing-Tong Chen
,
Li-Ya Dong
A New MPR Selection Algorithm Based on the Optimal Subset
Full-text access may be available. Sign in or learn about subscription options.
pp. 109-112
by
Hong Zhang
,
Wen-Jie Fan
,
Chuan-Zhen Wang
CRAWL: A Trace Routing Algorithm Based on Hybrid Two-Layer Topology
Full-text access may be available. Sign in or learn about subscription options.
pp. 113-118
by
Li-Ming Zheng
,
Xiao-Dong Tan
,
Wei-Dong Sun
,
Xiao-Dong Li
Integrated Blur Image Quality Assessment Based on Human Visual Perception
Full-text access may be available. Sign in or learn about subscription options.
pp. 119-124
by
Wei Wang
,
Hui Liu
,
Jin-Jin Zheng
,
Jun-An Yang
Behavioral Learning for Data Adjacent Graph Construction in Semi-supervised Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 125-129
by
Zhen Liu
,
Jun-An Yang
,
Hui Liu
,
Wei Wang
Chinese Natural Language Processing Based on Semantic Structure Tree
Full-text access may be available. Sign in or learn about subscription options.
pp. 130-134
by
Qi-Jin Yin
,
Shao-Ping Wang
,
Yi-Nan Miao
,
Dou Xin
Improved One-Class SVM for Pattern Denoising
Full-text access may be available. Sign in or learn about subscription options.
pp. 135-140
by
Yong Tian
,
Xiao-Ming Wang
,
Xiao-Huan Yang
The Software Design of the Monitor and Simulate System Based on 1553B Bus
Full-text access may be available. Sign in or learn about subscription options.
pp. 141-145
by
Xiao-Min Zhang
,
Qing-Zhong Jia
,
Jia-Yuan Shan
Design and Implementation of Warehouse Management System Based on B/S Mode
Full-text access may be available. Sign in or learn about subscription options.
pp. 146-150
by
Pin Liu
,
Guo-Qing Yao
,
Hong-Yue Cai
,
Zhou Yang
Design Optimization and Implementation of Bootloader in Embedded System Development
Full-text access may be available. Sign in or learn about subscription options.
pp. 151-156
by
Chen Sha
,
Zhu-Ying Lin
Real-Time Grading Evaluation of Quality of Strokes in Chinese Characters Handwriting
Full-text access may be available. Sign in or learn about subscription options.
pp. 157-162
by
Rui-Fang Han
,
Wei-Hua An
,
En-Dong Xun
,
Qi Li
Reduction of Feature Items Based on Thesaurus and Its Application in FCA
Full-text access may be available. Sign in or learn about subscription options.
pp. 163-167
by
Wei He
,
Shuang Li
Hand Segmentation Based on Improved Gaussian Mixture Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 168-171
by
Yi Zheng
,
Ping Zheng
Hand Contour Detection Using Spatial Homomorphic Filtering and Variational Level Set
Full-text access may be available. Sign in or learn about subscription options.
pp. 172-176
by
Yi Zheng
,
Ping Zheng
A Research of DD Path Automatically Generated System
Full-text access may be available. Sign in or learn about subscription options.
pp. 177-179
by
Juan Zhang
,
Hong-Xin Liu
,
Yu-Qing Feng
,
Yong-Hua Li
Emergency Call Using EEG and Android Operation System for Disabled People
Full-text access may be available. Sign in or learn about subscription options.
pp. 180-183
by
Hong-Yang Zan
,
Liang Zhu
,
Mei Wangm
,
Xue-Bin Qin
,
Jzau-Sheng Lin
Short Message Service Using Steady-State Visual Evoked Potential and Android Operation System for Disabled People
Full-text access may be available. Sign in or learn about subscription options.
pp. 184-187
by
Mei Wang
,
Chang-Feng Xu
,
Hong-Yang Zan
,
Pai Wang
,
Heng Zhang
The Research and Design of Smart Home System Based on MQX
Full-text access may be available. Sign in or learn about subscription options.
pp. 188-190
by
Hong Wang
,
Hong-Ning Bian
,
Hong-Xia Zhang
,
Feng Zhang
Rainstorm Flood Building Risk Dynamic Assessment Conceptual Model Utilization Agent Based Modeling
Full-text access may be available. Sign in or learn about subscription options.
pp. 191-195
by
Wen-Ze Lai
,
Wen-Bo Li
,
Ying-Liang Huang
,
Wei-Xiang Wang
,
Dan Xiao
A Constructing Method of Mongolia-Chinese-English Multilingual Semantic Net Based on WordNet
Full-text access may be available. Sign in or learn about subscription options.
pp. 196-198
by
Yu-Liang Zhang
,
Hasi
The Analysis of Customer Churns in e-Commerce Based on Decision Tree
Full-text access may be available. Sign in or learn about subscription options.
pp. 199-203
by
Feng Guo
,
Hui-Lin Qin
PGST: Using Personal and Global Factors in the Spatio-Temporal Domain for Mobility Relationship Measurement
Full-text access may be available. Sign in or learn about subscription options.
pp. 204-207
by
Tao Guan
,
Ke-Ren Wang
Design and Development of the Farmers' Personalized M-learning System
Full-text access may be available. Sign in or learn about subscription options.
pp. 208-212
by
Feng Yu
,
Cui-Ping Tan
,
Jun-Feng Zhang
,
Su-Fen Sun
,
Huai-Guo Zheng
,
Xin Liu
,
Hui Zhang
,
Xiao-Jing Qin
Isogeometric Analysis: The Influence of Penalty Coefficients in Boundary Condition Treatments
Full-text access may be available. Sign in or learn about subscription options.
pp. 213-217
by
Feng Chang
,
Wei-Qiang Wang
,
Yan Liu
,
Yan-Peng Qu
A New Feedback-Based Intra Refresh Method for Robust Video Coding
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-221
by
Yi-Ran Zhou
,
Guang-Qiang Li
,
Shu-Shi Ning
Abnormal Event Detection Using Recurrent Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 222-226
by
Xu-Gang Zhou
,
Li-Qing Zhang
A Novel Research on Feature Extraction of Acoustic Targets Based on Manifold Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 227-231
by
Hui Liu
,
Wei Wang
,
Jun-An Yang
,
Liu Zhen
Transfer Learning by Fuzzy Neighborhood Density-Based Clustering and Re-sampling
Full-text access may be available. Sign in or learn about subscription options.
pp. 232-236
by
Zhen Liu
,
Jun-An Yang
,
Hui Liu
,
Wei Wang
Analysis of the Development and Application of Salary Management System in Railway Enterprise
Full-text access may be available. Sign in or learn about subscription options.
pp. 237-240
by
Lei Ma
,
Yi Chun
A Software Testing Method Based on Error Propagation Slicing Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 241-245
by
Kun Wang
,
Yi-Chen Wang
A LS-SVM Based Nonlinearity Compensator for Thermocouple Vacuum Gauge
Full-text access may be available. Sign in or learn about subscription options.
pp. 246-249
by
Fu-Qiang Xie
,
Song Gao
,
Xing Qu
,
Yao-Geng Tang
The Design of the GPS/BDS Dual Micro-track Recorder and the Application in Puclic Information
Full-text access may be available. Sign in or learn about subscription options.
pp. 250-254
by
Ya-Li Zhang
,
Jing Qin
,
Xiang Huang
A Test Based on Beam Angle of Ultrasonic Transducer Array
Full-text access may be available. Sign in or learn about subscription options.
pp. 255-259
by
Jia-Xiao Wang
,
Peng Rao
,
Guang-Qi Luan
,
Ming-Zhao Sun
Design and Development of Control Credit Loss Standardization System Based on Dimension Reduction Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 260-263
by
Yong-Fei Shan
,
Shu-Hai Fan
,
Qun Pan
,
Tian Xu
The Design of Function and Flow for Warehouse Management System in Pharmaceutical Enterprises -- The Case of NATON
Full-text access may be available. Sign in or learn about subscription options.
pp. 264-267
by
Xia Wei
,
Ning Ling
,
Meng-Meng Ren
,
Shu-Hai Fan
The Application of PDCA Cycle Management in Project Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 268-272
by
Meng-Meng Ren
,
Ning Ling
,
Xia Wei
,
Shu-Hai Fan
Analysis of Evolutionary Path of Enterprise Cooperative Innovation Based on Technical Inputs
Full-text access may be available. Sign in or learn about subscription options.
pp. 273-277
by
Qun Pan
,
Shu-Hai Fan
,
Yong-Fei Shan
,
Tian Xu
The Design and Development of Warehouse Management Information System on Hongxing Logistics
Full-text access may be available. Sign in or learn about subscription options.
pp. 278-282
by
Ning Ling
,
Xia Wei
,
Meng-Meng Ren
,
Shu-Hai Fan
The Design of Subway Station Console Extension Module
Full-text access may be available. Sign in or learn about subscription options.
pp. 283-286
by
Ya-Fang Wang
,
Na Wu
,
Xiu-Jie Zhai
,
Xiao-Pan Wang
Safety Analysis Based on Stochastic Time Petri Nets
Full-text access may be available. Sign in or learn about subscription options.
pp. 287-292
by
Ying Peng
,
Shu-Zhen Yao
,
Huo-Bin Tan
A Requirement-Driven Web Service Composition Modeling Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 293-297
by
Min Jiang
,
Xiu-Guo Zhang
Randomized Convergent Encryption in the Standard Model via UCEs
Full-text access may be available. Sign in or learn about subscription options.
pp. 298-302
by
Hui-Ge Wang
,
Ke-Fei Chen
,
Bao-Dong Qin
,
Liang-Liang Wang
The Implementation of Adaptive Web Service Composition
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-307
by
Zhuang Ma
,
Xiu-Guo Zhang
,
Zhi-Yi Zhu
,
Hao Wang
Exception Classification and Handling Mechanism of CA-CCML Web Service Composition Language
Full-text access may be available. Sign in or learn about subscription options.
pp. 308-312
by
Jing-Fei Zhang
,
Xiu-Guo Zhang
,
Hao Wang
,
Zhi-Yi Zhu
Research on Replica Strategy in Cloud Storage System
Full-text access may be available. Sign in or learn about subscription options.
pp. 313-317
by
Lin Huo
,
Ran Yi
A Construction Mechanism of Routing Service Chain Based on the Service Customization
Full-text access may be available. Sign in or learn about subscription options.
pp. 318-322
by
Xiao-Qiang Xi
,
Yan Zhang
Decipher the Hidden Secrets Behind Networks: Analyze the Influence Based on the Co-author Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 323-328
by
Ran Li
,
Han Li
,
Bo-Wen Liu
Technical and Economic Models of Information Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 329-332
by
Ru-Yi Ye
,
Li-Jun Feng
Research on Method for Information Standardized Description and Transmission in Networked Fault Diagnosis
Full-text access may be available. Sign in or learn about subscription options.
pp. 333-338
by
Yu-Hao Shen
,
Cang-Hai Lu
Research on Technology of Process Hiding Based on VMM
Full-text access may be available. Sign in or learn about subscription options.
pp. 339-344
by
Wei-Liang Kong
,
Guang-Yu Zeng
,
Deng-Yuan Zhou
Executable Program Code Segment Address Randomization
Full-text access may be available. Sign in or learn about subscription options.
pp. 345-350
by
Jian Lin
,
Yu-Dong Guo
,
Yu-Jia Man
,
Shao-Huang Zhou
Web Service QoS Prediction with Adaptive Calibration
Full-text access may be available. Sign in or learn about subscription options.
pp. 351-356
by
Guo-Sheng Li
,
Na Wang
Research on Data Communication Between Intelligent Terminals of Medical Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 357-359
by
Yong Cui
,
Gang Shi
,
Xiao-Song Liu
,
Wei Zhao
,
Yong-Qing Li
Evaluation of Spatial Configuration and Cross-Regional Sharing of Urban Shelters
Full-text access may be available. Sign in or learn about subscription options.
pp. 360-365
by
Jia Yu
,
Jia-Hong Wen
,
Shao-Ni Du
,
Bang-Gu Liao
,
Wei-Jiang Li
,
Xian-De Li
,
Jun Gao
,
Jiang Yong
Network Security Monitoring and Defense System Framework Design Using Mobile Agents Based on DoDAF
Full-text access may be available. Sign in or learn about subscription options.
pp. 366-370
by
Yan Tong
,
Jian Zhang
,
Ming-Di Xu
,
Tao Qin
Demystifying the Resilient Clustering Protocols in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 371-376
by
Muhammad Toufique
,
Hong-Bo Jiang
Research on Resource Allocation Scheme Based on Access Control in Cloud Computing Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 377-380
by
Jun-She Wang
,
Jin-Liang Liu
,
Hong-Bin Zhang
Author index
Freely available from IEEE.
pp. 381-382
[Publisher's information]
Freely available from IEEE.
pp. 384-384
Showing 89 out of 89