0

International Conference on Electronics, Information and Communication Engineering (EICE 2012)

  • Author(s)/Editor(s):
  • Published:
    2012
  • DOI:
    10.1115/1.859971
Description | Details

Proceedings of the 2012 International Conference on Electronics, Information and Communication Engineering (EICE 2012) that was held in Macau on March 1–2, 2012.

  • Copyright:
    All rights reserved. Printed in the United States of America. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher. ©  2012  ASME
  • ISBN:
    9780791859971
  • No. of Pages:
    1008
  • Order No.:
    859971
Front Matter PUBLIC ACCESS
PDF
  • Advanced Technology in Electronics and Computers

    • Show Sections

      Hide Sections

      In this paper we illustrate application of many valued context for extracting dependences from complex data sets. While the classical binary approach clearly indicates relationships among objects and attributes it still does not provide any information on the degrees to which an object possesses an attribute. Many valued contexts allow inclusion of more detailed description on such dependences.
    • Show Sections

      Hide Sections

      This project started in 2003, when we found La Grammaire est une chanson douce by Orsenna. The first of many books we discovered and collected in different languages in the last few years, about grammar in non-scientific approaches, which are complementary multimodal texts to exercise, at home, school, in the internet, affecting the study of grammar. This paper presents part of a wider study on a significant number of French and Portuguese books from the first decade of the XXIst century approaching grammar issues in an unorthodox way: poetry, novels, theater, linguistic games, to mention just a few different strategies and text typologies, based on image and complemented in internet sites, used as sequels of the books, closer to their reader's digital references. We would like to present two examples, a French and a Portuguese, of how this grammar study can be made online and its importance in didactics.
    • Show Sections

      Hide Sections

      Formal methods are very efficient techniques for formal verification of a specification and to find errors in early stage of the system development. In order to generate a high quality code from a formal specification particularly in the embedded system is highly indispensable and a defacto standard in many industrial application domains, such as medical, avionics and automotive control. This paper presents automatic source code generation from the developed formal specifications of a cardiac pacemaker. Cardiac pacing system is a Grand Challenge in the area of Software Verification. This paper includes an architecture of automatic code generation tool, summary of a formal development of the cardiac pacemaker using refinement techniques in Event-B, code generation of the developed formal model into C, C++, Java and C# using code generation tool EB2ALL, and finally the code compilation and execution.
    • Show Sections

      Hide Sections

      Using channel characteristics for authentication in wireless sensor networks has many advantages such as low power, low computational overhead and crypto-free system. In spite of its advantages, it faces two challenges. The first challenge is the regional effects like WiFi and communication obstacles. The second challenge is that when it is applied in an environment that has human motion, it fails. These challenges cause false alarms in detection. In this paper, we introduce two mechanisms to face these challenges. The first one helps to differentiate between regional effect and malicious nodes. If the number of nodes fail in authentication in the same region exceeds certain threshold, regional effect is detected. The second mechanism is based on the idea of cooperative detection. If a node fails to authenticate with one neighbor due to human presence, it can instead authenticate with another neighbor, so it can still be trusted.
    • Show Sections

      Hide Sections

      Network-Centric Warfare (NCW) is a new military doctrine or theory of war that seeks to translate an information advantage into a competitive war fighting advantage through the robust networking of well informed geographically dispersed forces [1, 2]. The focus of NCW efforts has largely been concentrated on issues related to technology and infrastructure. However, there is a growing trend in the scientific community to analyze the human aspect of network warfare. The game of Go though unrelated to warfare per say creates an opportunity for simulating cooperation and coordination between teams and individuals. By constructing a competitive and collaborative environment where players/teams compete against each other, human factors may be identified which could have a profound impact on the outcomes of future NCW wars. Go*Team is based on the traditional Go game in which players place black and white stones onto a board in order to occupy territory on the board [3].
    • Show Sections

      Hide Sections

      In this paper, we present some works carried out independently by secondary school's students with the aid of the MatCos software. The works produced as part of the Regional Project ‘Mathematics and Computers’ are - albeit at a basic level - examples of mathematical modelling of sensible reality. When mathematical concepts are associated to certain real objects, imagination and creativity, combined with rationality, feature strongly in the work of students and open up new opportunities for cultural growth and training. A short description of the general framework within which the idea of the research took shape, of the pedagogical paradigm of the software and of the experimentation round off the paper.
    • Show Sections

      Hide Sections

      A failure of a safety-critical operating system may cause a catastrophic consequence. To guarantee the high reliability of a safety-critical system, one important issue is the timing analysis of the operating system. Inaccurate timing analysis may cause a missed deadline, which might result in a catastrophic consequence. Traditionally, the timing analysis is done by exhaustive testing. Such testing is labor-intensive and cannot thoroughly guarantee the correctness of the result. In this paper, we describe an automatic static timing analysis with strong safety guarantees of a safety-critical OS that is deployed on several aircrafts and missiles. Our experience suggests that this analysis can provide higher safety guarantees with dramatic saving in cost.
    • Show Sections

      Hide Sections

      The methodology of application probabilistic-statistical syntactic model for assessing the adequacy of information text objects was developed. The structure of probabilistic-statistical syntactic model was determined. The technique of probability images formation for compared texts was shown. The amount of information of compared texts estimated by the entropy, and as a measure of semantic proximity of the texts used the mutual information. The sensitivity of mutual information to differences in texts and parts of sentence weights variations was demonstrated on examples.
    • Show Sections

      Hide Sections

      A large number of educators develop automated tests for assessing students knowledge at the their universities. When two or more educational institutions are merged into a new one, some subjects have to be reorganized as well. In this work we consider facilitation of a decision process related to choosing the best test for assessment of students' knowledge among the locally developed ones. To attain a higher quality of the evaluation process we propose involvement of a committee consisting of faculty members who rank tests on one subject but are developed by different individuals. The evaluation process is based on application of grey theory and linguistic variables. Grey theory is chosen over other mathematical methods due to the theory's ability to handle incomplete information.
    • Show Sections

      Hide Sections

      ICT (Information and Communication Technology) industry is an important contributor to growth almost every economy. Its contribution to the growth represents 5% of GDP and ICT also drive 20% of overall productivity growth in European Union [1]. In order to hold such portion of ICT sector on total GDP in the future, continuous supply of relevant Qualified ICT professionals into this industry is required. Some development scenarios of requirements for ICT professionals are presented in McCormack [2]. He expects that ICT will generate almost 5.8 million new jobs till year 2015 in EU [2]. These new jobs will have to be saturated by adequately qualified ICT specialists but this is not supported by the number of live births. This paper identified the most important factors that influence economic growth through ICT sectors in EU and especially in the Czech Republic.
    • Show Sections

      Hide Sections

      Information technology plays a key role in the advancement of distance education and with the resources available from the computer it was possible to create virtual learning environments enabling communication and interaction between individuals involved in the teaching and learning process. Aiming to provide students, teachers, tutors and the educational institution with new means of monitoring and evaluation of the course, its content and students, we present the Highlight tool and its possible applications.
    • Show Sections

      Hide Sections

      Supercomputing education is very important for the innovative country development. We describe supercomputing educational project of Russian Federation Presidential Commission on modernization and technological development of Russia's economy. Following the main objectives of the project we present developed Body of Knowledge and Skills in parallelism and HPC. We give a description of the courses and tools supported this project. The different forms of educational programs implementation developed under the framework of the project are presented. Interaction with organizations of science, industry and business and international cooperation are described.
    • Show Sections

      Hide Sections

      The aim of this series of two reports is to demonstrate that Control Network Programming (CNP), respectively WinSpider, can be used as an excellent environment for teaching and learning both non-determinism and randomization. More specifically, the focus is on CNP implemented models and algorithms typically studied in courses on Computation theory and Artificial intelligence for students in computing programs. In this first part only teaching the concept of non-determinism is discussed; the second report presented to the same conference is devoted to randomized models and algorithms.
    • Show Sections

      Hide Sections

      A series of two reports are presented to this conference. The aim of the series is to demonstrate that Control Network Programming, respectively Spider, can be used as an excellent environment for teaching and learning both non-determinism and randomization. More specifically, the emphasis is on CNP implemented models and algorithms typically studied in courses on the Computation theory and Artificial intelligence for students in computing programs. While the focus of first of the reports was using CNP in teaching and learning the concept of non-determinism, the current presentation addresses probabilistic computation models and randomized algorithms.
    • Show Sections

      Hide Sections

      Nowadays, there are a large number of frameworks for developing Web applications such as Struts, JSF, Ruby on Rails or, CakePHP, among others. Each framework gives features to make easy the Web applications development. Lift emerges as a new Web framework which has own features and learns from the mistakes of other Web frameworks. Some companies such as Siemens and IBM are deploying theirs applications in Scala and Lift, as well as social networks like Twitter and Foursquare. However, Lift is a new Web framework so there is few information for developing Web applications through of best practices. This paper discusses the best practices in order to develop Web applications with Lift avoiding common mistakes of design and implementation that other Web frameworks have. Finally, as proof of concept we developed a set of Lift-based Web applications taking into account some best practices such as actors, lazy loading, sitemap and wiring.
    • Show Sections

      Hide Sections

      There is a need for more and better applications that combine features of social networks with the purpose of providing results of added-value to users. Whit this, a new kind of applications called mashups has emerged. A mashup is a Web application that integrates data from multiple Web sources in order to provide a unique service. Internal data sources, RSS/Atom feeds, Screen-Scraping and Web services are some resources used by mashups. Nowadays, most of Web services provided by social networks use the REST-based architectural style because it offers significant advantages in comparison with other technologies. This paper presents a review of 7 RESTbased APIs for social networks; in addition, a set of 3 mashups were developed combining the APIs discussed.
    • Show Sections

      Hide Sections

      The amount information handled by information systems is growing steadily. This requires the use of recommendation systems for handling all this information. A recommendation system helps to find items of interest, but the development of this kind of systems is complicated due to the existence of a large number of algorithms for recommendation systems. In this context, this paper proposes an analysis of the algorithms used in recommendation systems and its most common application domain. The algorithms to calculate similarity presented in this paper are the algorithm of the cosine and Pearson correlation. The clustering algorithms analyzed are K-nearest neighbors (KNN) and clustering. All these algorithms are used in the collaborative filtering. The algorithms used for content-based filtering and hybrid approaches are Naive Bayes Classifier, Floyd-Warshall algorithm, Demographic recomm
    • Show Sections

      Hide Sections

      Rich Internet Applications (RIAs) Engineering is an emerging area of Software Engineering which lacks of development approaches and tools for support. The demand for RIAs is driven by the increase in the development of cloud-based applications. In the aim of helping to meet the growing need for support of RIAs engineering, an extension to the Phases Process for RIAs Development (PPRD) for source code generation of multi-device RIAs is proposed in this paper. As a salient contribution, our proposal covers multi-device applications in comparison with other approaches where they are focused on software modeling allowing the code generation in a semi-automatically way. In order to validate our proposal, we have generated a set of cloud services APIs-based multi-device RIAs.
    • Show Sections

      Hide Sections

      Webpage classification is one of the important issues today. All internet users aim in easier search with a reasonable search time and effort. Different Lexical libraries are used in classification. Features affecting classification should be defined correctly so as the classification will be accurate. The paper reviews work in web page classification, classification features and different lexical systems that include relationships between terms. Finally the paper will describe state-of-the-art practices in web classification and lexical systems.
    • Show Sections

      Hide Sections

      Data mining helps end users extract valuable information from large databases. In medical field, practitioners have with them mountains of patient data. Any successful medical treatment is based after complete analysis of vast amount of patient data. But practitioners are often faced with the problem of extracting relevant information and finding certain trend or pattern that may further help them in the analysis of treatment of any disease. Data mining is such a tool, which sifts through voluminous data and presents the data of essential nature. In this paper we have focused on managing asthma in children. The approach used is C4.5 algorithm. Our predictive model will help in categorizing of asthma and also suggesting the best possible treatment. The choice of treatment is dependent on severity of the disease. The trick in building a successful predictive model is to have some data in the database that describes what has happened in the past. Classification method is designed to learn from the past successes and failures and then predict the outcome. Decision trees are a form of data mining technology that has been around for almost 20 years. They are increasingly used for prediction.
    • Show Sections

      Hide Sections

      The case for competitive intelligence (CI) to play a developmental role in Africa is strong as is evident in the competitiveness rankings released by the World Economic Forum. Currently most African countries are weakly integrated with the global economy. The research done for this paper focused on how CI can enhance Africa's competitiveness and specifically focus on the situation in South Africa. A survey was conducted to determine how South African organizations can use CI to increase their competitiveness. The findings indicate that organizations recognize the importance of CI and that CI is in existence for more than five years in the majority of organizations.
    • Show Sections

      Hide Sections

      This study examines the implementation of information management in thirteen government organizations. It uses the Amsterdam Information management Model (AIM), which is derived from the strategic alignment model as developed by Henderson and Venkatraman [8] the decision was made to use the AIM model because this model draws a clear distinction between the information management part and the technical information and communication (ICT) part of an organization. The AIM model looks at the information management part of the organization as intermediary between the demand from the business processes for ICT and its support by ICT. The study attempts to provide an answer regarding the manner in which the investigated government organizations realize information management (IM) in practice. The study shows that not all aspects that are of importance to IM are given attention in every day practice. In the investigated government organizations, within information management there is often a lack of attention as far as the structure level of IM tasks are concerned, whilst the strategic function rarely receives the attention it requires in the field of ICT management.
    • Show Sections

      Hide Sections

      The integration of Geographic Information Systems (GIS) and E-Government has a lot of advantages. This integration can create new cost avoidance opportunities and provide extraordinary new ways for the government to deliver government services in order to create more effective government. A geographic and mapping interface moves the E-Government application towards more interactive and information process. Few international applications have partially or fully integrated GIS and E-Government. In our work, we point out the importance of this integration by presenting a complete application which has been developed by Ajman Municipality & Planning Department (UAE): The Ajman Land Information System (ALIS). This application shows how E-Government becomes more effective by using GIS.
    • Show Sections

      Hide Sections

      In the last 20 years, credit risk models have become a hot topic in the financial world. This paper reviews CrediMetrics and KMV, two well known industry credit risk models. Both of them are based on the asset value model originally proposed by Merton's asset value model. After briefly introducing credit ratings and Merton's asset value model, the framework of CreditMetrics and an example computed by R software follows. Then, KMV method is introduced and an example is given. Finally, CreditMetrics and KMV are compared.
    • Show Sections

      Hide Sections

      This paper represent part and core idea of doctoral dissertation, which was published and presented in Faculty of Mechanical Engineering, University of Montenegro. The paper point out many years experience from research in field of expert systems, business processes performance improvement, quality management systems and business excellence. The main objective is to develop intelligent system that will be based on the level of fulfillment of the requirements of ISO 9001 and give recommendations to improve the performance of business processes in terms of achieving business excellence (according European Award for Business Excellence) and achieving financial improvement. This should be an innovative approach which should make significant advantages of organization and their competitiveness. The main subjects of research are: the certified companies, their orientation to innovation as well as the development and implementation of innovation. For this research we use analogy between human body function and organizational activities. This system was tested in a one successfully organization and proved to be as efficient and effective.
    • Show Sections

      Hide Sections

      This paper analyses the theoretical and practical background of real estate price bubble. The factors, influencing real estate price bubble, according to various scientists and economists, are investigated. The paper analyses the real estate market in Lithuania during the period of 2000–2010. The paper emphasizes the Theory of logistic management of capital. The research in this paper approves this theory, which states that the occurrence of price bubble is explained by the exhaustion of financial growth resources.
    • Show Sections

      Hide Sections

      Local and indigenous knowledge is the knowledge held by individuals that comes from their own observation, experiences, and beliefs. Indigenous knowledge is not restricted to the developing countries, nor is it always related to olden traditions but it different then other knowledge systems produced by formal institutions and private firms. Due to its practical approach it can be use to facilitate communication among people coming from different backgrounds such as researchers, development practitioners, and beneficiaries.
    • Show Sections

      Hide Sections

      Information security is a risk function. Paying for too much security can be more damaging in economic terms than not buying enough. This leads to the optimal expenditure on damage prevention and the question as to where this should lie. Who should be responsible for the security failures that are affecting the economy and society and how is this maximized in order to minimize negative externalities? Next, how do we best enforce liability in a global economy? In this paper, we address some of the economic issues that are arising due to an inability to assign risk correctly. We look at the externalities that restrict the development of secure software and how the failure of the end user to apply controls makes it less probable that a software vendor will enforce stricter programming controls.
    • Show Sections

      Hide Sections

      Organized criminal groups can be modeled using rational choice theory. Criminal groups act as profit seeking enterprises, and the ability to shift the economic returns away from this activity results in a lower amount of crime. Criminal behavior does not need to rely on social deviance, but is moving towards the greatest financial rewards. As a consequence, as criminal groups face few financial disincentives, a growing class of criminal specialists has resulted. The course of action to best minimize the online criminal threat can be linked to minimization of economic returns from cybercrime.
    • Show Sections

      Hide Sections

      Combining hazard models with SIR (Susceptible-Infected-Removed) epidemic modeling provides a means of calculating the optimal information systems audit strategy. Treating audit as a sequential test allows for the introduction of censoring techniques that enable the estimation of benefits from divergent audit strategies. This process can be used to gauge the economic benefits of these strategies in the selection of an optimal audit process designed to maximize the detection of compromised or malware infected hosts.
    • Show Sections

      Hide Sections

      For many years information security and risk management has been an art rather than a science. This has resulted in the reliance on experts whose methodologies and results can vary widely and which have led to the growth of fear, uncertainty and doubt within the community. At the same time, the failure to be able to effectively expend resources in securing systems has created a misalignment of controls and a waste of scare resources with alternative uses. This paper aims to introduce a number of models and methods that are common in many other areas of systems engineering, but which are only just starting to be used in the determination of information systems risk. This paper introduces the idea of using neural networks of hazard data to reliably model and train risk systems.
    • Show Sections

      Hide Sections

      The increasing influence of renewable energy on the power flow in the distribution grid demands options for the distribution system operator to intervene. One opportunity is represented by variable grid fees which enable a causation-based allocation of grid costs by means of decentralized power feeds. According to the development of pricing in the communication sector two novel approaches are compared. On the one hand multivariable grid fees depending on the power flow, the location and the feeds of decentralized generation units. And on the other hand a flat-rate tariff with an additional usage-sensitive component.
    • Show Sections

      Hide Sections

      The Internet is formed from the interconnection of a succession of linked hosts. Originally envisaged by the United States government, the Internet was developed to offer a network solution to the military in time of war. It has been adapted to use by the general public opening up access to private companies hence creating an international commercial network. In the physical world, intermediaries are generally conscious players that are actively involved with a transaction. They will generally have some type of legal relationship with the other party that has been negotiated and agreed in advance. An Internet intermediary may not be consciously involved in the transaction and further may not have any pre-existing relationship. In this paper, we look at the legal implications that can result as a consequence of the changes in legal frameworks and paradigms.
    • Show Sections

      Hide Sections

      The aim of paper is to compare income stratification estimations in Slovakia based on administrative microdata (covering the whole Slovak population) and survey microdata. According to findings differences between these two approaches are substantial. According to the survey data 42 percent of people are included in income middle class and 50 percent of Slovak economically active people earn less than 500 EUR monthly. Such a conclusion is in contradiction with reality. There are only 29 percent of Slovaks in income middle class and almost 62 percent can be considered poor. Results of comparison indicate that effective spending of public financial resources and targeted social policy require using administrative time series data from social security agency.
    • Show Sections

      Hide Sections

      The increasing volatility of their companies' environment is a growing concern for executives. Environmental scanning systems should enable them to focus earlier on emerging threats and opportunities. Although a substantial body of knowledge exists, a lack of applicability means the concepts often go unused in practice. But what does applicability mean for environmental scanning systems design? Adhering to the design science paradigm, this article contributes to better information systems (IS) design by developing a systematic list approach to requirements criteria that specify the applicability of environmental scanning systems. The criteria are derived from the principle of economic efficiency, use findings from the absorptive capacity theory, and can be applied to both evaluate existing environmental scanning systems and develop a new, more applicable generation. The findings should also be applicable to other IS domains.
    • Show Sections

      Hide Sections

      Various econometrics and operations research methods and models, neural networks, decision support, expert and knowledge systems are used for crisis management in different construction and real estate fields. It may be noted that researchers from various countries engaged in the analysis of crisis in the construction and real estate sectors but they did not consider the research object that is being analyzed by the authors of this present research. The latter may be described as a life cycle of the construction and real estate industry, the stakeholders involved and as the micro, meso and macro environments that have some particular impact on a life cycle in making an integral whole. A complex analysis of the formulated research object was performed with the help of Construction and Real Estate Crisis Management Model and Recommended System which were especially developed for this purpose. Economic, political and legal/regulatory decisions, social, culture, ethical, psychological, educational, environmental, provision, technological, technical, organizational and managerial factors were considered in the developed Model and System.
    • Show Sections

      Hide Sections

      In this article we are going to investigate the problem of estimation of operational risk loss for the next period of time. The goal is to use such an estimation in the system of identification, measurement, management and control of operational risk. It can be found that, by using a standard regression model for suitably transformed losses, such estimation is possible, including estimation of probable bounds. The suggested procedure is based on the Basel II Directive (CRD) in the operational risk regulation and control. This procedure is not primarily oriented on risk capital estimate (specifically emphasized in the regulation rules of Basel II), but rather on prediction of risk losses behavior in the next period of time. The example presented here uses data over the period of four years and shows a prediction for the next year.
    • Show Sections

      Hide Sections

      The method involves counting thin steel plates for car chassis in stacks by using digital image processing and a software interface. First enhance the photo of the stacked plates to a clear intensity image. After manually selecting the region of interest by the user and detecting the lines of each plate, adjust the lines to the vertical direction by horizontally shearing the image against the inclination angle. Finally, count the number of plates in the picture by counting the intensity pitch. The approach is efficient and accurate in counting plates. It relies on two-dimensional processing and requires no mechanical equipment as the traditional means.
    • Show Sections

      Hide Sections

      The purpose of this paper is study and analysis the notable cases of digital publishing , “ the Google eBookstore ”, so that Similar enterprises in China can learn advanced experience. On the basis of qualitative analysis and assisting with case study, This paper analyzes the background how the Google eBookstore was introduced, and elaborates the market features of Google's e-Book platform. The paper also discusses the Google's e-book sales model. finally It points out the significances of Google's e-Book business case to the development of Chinese e-book market.
    • Show Sections

      Hide Sections

      The research on the automatic scoring of essay makes the large-scale machine-scored come true for CET compositions. This paper analyzes the CET compositions, and compares the core technology and the focus of the domestic and foreign Automated Essay Scoring System. Based on these, the focus and methods are put forward for the automated essay scoring. The future work will concentrate more on the experiments, which could verify the influence of the focus and methods to predict the composition.
    • Show Sections

      Hide Sections

      A finite element model of an eddy current sensor array is built up by electromagnetic-circuit couple method, and the influences of copper foil thickness on sensor's output characteristics are analyzed by the model. It was shown that the amplitudes of sensing coils' output would increase, while the phases would decrease gradually when foil thickness increased. Besides, the discrepancies of phase were diminished when the foil becoming thicker. While the differences of amplitude increased and reached the maximum at thickness of 0.67, then it began to decrease. Generally it is necessary to make the copper foil thickness between 0.17 and 0.33 in sensor fabrication process to enhance the crack inspecting capability of the sensor.
    • Show Sections

      Hide Sections

      Local universities need a rational orientation to talents training target to cultivate high level practical innovative talents adapting to the requirements of times and the current economic development. At an angle of optimizing teaching resource and promoting the development of subjects, specialty cluster construction is a suitable option. Construction of specialty cluster is favorable for forming cluster competitive advantage on specialties, realizing resource sharing and reducing practice training cost, and is also favorable for forming professional characteristics and brand advantages. Specialty cluster construction of electrical and information engineering majors is carried out based on key discipline and preponderant major. Specialty cluster construction objects, contents and some measures are described in this paper.
    • Show Sections

      Hide Sections

      Some redundant communications are imported in parallel compilation to guarantee the consistency between computation partition and data distribution. To solve this problem, this paper proposed a data distribution calculating algorithm. Based on dependence testing analysis, the algorithm recognized the parallelizable loops, implemented calculating data distribution by analyzing the loop indexes and array subscripts so as to eliminate redundant communications. The experimental results show that using the results of the algorithm to generate MPI communications code can reduce the redundant communications significantly, and the performance of optimized programs can be improved to 70 percent of the manual programs.
    • Show Sections

      Hide Sections

      Information technology based on computer has been used widely in various fields, thus this essay divides information technology into three levels according to level relationship of knowledge and applied groups of information technology in order to develop information technology education accurately and impetus information technology stably, efficiently, consistently in right direction for the long time.
    • Show Sections

      Hide Sections

      Aiming at the poor stability and the big friction work in the dual clutch automatic transmission speed changing process, and according to the dual clutch automatic transmission structure characteristics, this paper studies the timing sequence of the dual clutch transmission torque and the engine torque in the shift process, and the program flow chart is given in this paper. The control method in this paper achieves the clutch pressure and the engine timing sequence precisely controlled. This project established the relevant test condition bench, and the experimental results show that the design of the dual clutch automatic transmission (DCT) control system presented in this paper solves the smooth shift problem of the automobile.
    • Show Sections

      Hide Sections

      This paper presents the prototype of an Intelligent Second Language Acquisition (SLA) Monitor Corpus for learning particular problem in domain second language acquisition theory - inter-language - by examining the implications of connectionist models of cognition for information processing. The system applies optimal artificial neural network (ANNs) using generic algorithm which discovers direct codification and uses the error from the trained network as a performance measure to guide the evolution. These corpora are intended to serve as a resource for researchers and practitioners who need information on specific purpose in second language acquisition. The aim of this paper is to disseminate information on the project, and also to initiate discussion on how the Intelligent SLA Monitor Corpus Using Optimal ANNs might be developed.
    • Show Sections

      Hide Sections

      This paper describes in detail the cooperation of foreign industrial design mode and the our country present situation, proposed the cooperation of industrial design professional cooperation in order to adapt to the depth and the breadth development, need more practice course proportion, make more flexible teaching plan, seek the multi-level cooperation with enterprises, meet the demand of market. The government should from the strategic point of view, to guide the school-enterprise cooperation, promote the sustained development.
    • Show Sections

      Hide Sections

      Virtual photoelastometer is a software system to simulate the instruments, procedures and results of photoelasticity. The realization of this virtual photoelastometer is based on the advanced virtual reality techniques and 3-dimensional model operation techniques, which are implemented by program languages and applied software such as 3D Studio Max, EON Studio, and Visual Basic, etc. Different from the conventional virtual experiments, the virtual photoelastometer developed in this paper not only obtain the experimental results real-time, but also operate in 3-dimensional scene. This virtual photoelastometer can works on line, therefore it resolve the heavy deficiency in teaching of experimental mechanics, such as lack of instruments and high teaching workload. Virtual photoelastometer becomes an important reform in the teaching of experimental mechanics.
    • Show Sections

      Hide Sections

      To deal with so many basic concepts and miscellaneous knowledge in Visual FoxPro programming teaching, a new pedagogics, KM pedagogics, is put forward from deep logic mind. The knowledge of Visual FoxPro programming is framed from macrocosmic structure and microcosmic deduction by feature abstract, line-link, netting, extension and generality. A great deal of miscellaneous and scattered knowledge is organized in series by logic-mind-structure-map which is helpful to understand inner relationship among knowledge points. The learning time is shortened and the knowledge acquired is hard to lose. The practice of lecturing indicates that the study efficiency and effect are both improved.
    • Show Sections

      Hide Sections

      In this paper, CBERS CCD remote sensing images obtained in 2007 were employed to survey land use in 5km coastal zone of 13 regions around the Bohai Sea. Some assessment indicators, such as main type index, main level index and land use intensity index were established to assess the land use characteristics in these regions. The result shows there exist great regional differences in land use structure in 13 coastal regions around Bohai Sea. Some regions such as Huludao coastal zone and Yantai coastal zone are typical agricultural landscapes. Cangzhou coastal zone is typical fish pool landscape , while Weifang coastal zone and Binzhou coastal zone, together with their transition zones, are typical salt lake landscape.
    • Show Sections

      Hide Sections

      According to the decentralization of modeling tasks caused by user who is essentially nondeterministic and highly individual in Ambient Intelligence (AmI) environment, an interactive model based on multi-agent is firstly introduced to abstract the interaction between user and AmI environment. Secondly, the user is characterized by a mental model, a plan model, and a behavior model, which cooperatively describes both the static features and the dynamic behavior, and formal methods to describe these models are discussed at detail. Finally, the path which maps a natural scenario into a real system shows the benefits of using these models to design and develop AmI systems.
    • Show Sections

      Hide Sections

      Unsupervised image segmentation (UIS) is a very challenging problem in computer vision and artificial intelligence. In general, the UIS can be viewed as a clustering problem, which aims to partition the image into K sets of regions that have coherent color and texture features. Clearly, the UIS results depend on the employed clustering methods. Inspired by the recent rapid progress of l1-norm minimization techniques and the great success of l1-norm minimization based sparse representation (SR), in this paper we propose a K-sparse clustering algorithm to segment the image into K partitions. The given image is first over-segmented into many small regions, from which the K clustering centers are learned under the SR framework using l1-norm minimization. Finally, each of the regions can be classified into one of the K classes based on its SR coefficients over the K cluster centers. The experimental results on the benchmark images demonstrate the effectiveness and superiority of the proposed K-sparse clustering method to the classical K-means clustering method and recently developed sparse subspace clustering method in applications of UIS.
    • Show Sections

      Hide Sections

      Currently, in web page classification, absolute weighting method is a common method to weight HTML main structure features. The disadvantage of the method is that weighting coefficient is a fixed value, which has different effect on the long and short text. So the influence of structure features on local text will be weakened with the length of local text increasing. To solve the problem, we propose an improved weighting method, namely relative weighting method. In the experiment of web page hierarchical classification, we compare the two methods' classification performance on a single label and several labels combination. The results show that relative weighting method can effectively improve the classification accuracy, which is better than the absolute weighting method.
    • Show Sections

      Hide Sections

      The uncertain knowledge representation and reasoning are the hotspot and core of artificial intelligence research. In the paper a unified framework for representing, reasoning and learning of uncertain information is put forward. The abstract degree is used to measure the uncertain degree of uncertain information and thus more powerful expressive capacity is attained. Moreover the framework supports the efficient acquisition of the uncertain information, and concept abstract degree is used to describe the conceptual hierarchic in concept space. These features make the framework more practical than existing theories of reasoning about uncertainty.
    • Show Sections

      Hide Sections

      The type of university experimental courses is of very significance for deepening teaching reform and enhancing the abilities of students. Based on the cluster analysis on the results of students' main experimental courses majored in Mechanical Engineering and Automation by means of SPSS, this study mainly explore how to classify the type of experimental courses in universities of science and technology to improve the management level, and presents a number of suggestions to improve the quality of experimental teaching.
    • Show Sections

      Hide Sections

      The independent institute is an innovative system of the schooling pattern of higher education in our country. The computer programming course is regarded as the required course in the process of computer teaching in independent institutes, whose main purpose is to cultivate the programming skills of students as well as the algorithmic analysis application ability. Based on the teaching practice, this paper has explored and analyzed the practical teaching on computer programming courses in independent institute and some suggestions have been also proposed.
    • Show Sections

      Hide Sections

      This paper carries on depth analysis on the cost of green building and the economical attributes, and points out that the government needs to establish and improve incentives to promote the green building market prosperous, apart from the necessary supervision and restraint. But both the government supervision and incentives need the cost, we will establish a subsidy model from the government angle to adjust the degree between government supervision and incentive, which can find a balance point of them to reduce the government cost. Then focus on long-term development, puts forward policy proposal.
    • Show Sections

      Hide Sections

      Large-scale terrain rendering is an important application of virtual reality, However, the large data amount, low speed are always problems facing large terrain rendering, Therefore, how to improve the rendering speed and reduce the amount of data meanwhile maintain the original topography becomes a challenge. Considering the features and visualization requirements of large-scale battlefield terrain, a view-dependent, real-time and high quality terrain display method is presented in this paper. Using the Quadtree, Layered multi-resolution strategy, we partition the terrain into blocks and simplify triangular meshes inside the blocks, a simplified standard is given. Simulated operation shows that it has better effect in reserving the details and performance well in rendering.
    • Show Sections

      Hide Sections

      In order to determine the nature and distribution of marine gas hydrate, a series of geophysical data processing techniques are used in this paper. By using the traditional seismic data processing, purpose seismic data-processing, wave impedance inversion techniques and geophysical well logging data processing based on Self-organizing feature map neural network, a great deal of useful information are abstracted to determine the gas hydrate zone beneath the seabed. The results show (1) the conventional seismic data processing techniques contains much useful information and provide a visual and qualitative evidence of the presence of gas hydrate in sediments under normal condition;(2)special processing techniques, such as attribute extraction and wave impedance inversion, is necessary so as to mine more effective data, they could compensate the shortage of conventional seismic data processing techniques used for distinguishing gas-bearing reservoirs;(3)as a kind of intelligent information processing technology, SOFM neural network is feasible for lithologic identification by logging data and has a high rate of identification of gas hydrate. In the end, the author hopes it may provide some useful clues to the exploration of gas hydrate.
    • Show Sections

      Hide Sections

      Currently the common online upgrade scheme of system software is not safety in network terminal devices, because if power outages happened or the terminal is restarted when the content of system software is erased, system software is damaged. It is not friendly to users, and requires restart system before and after upgrade system. In this paper, a new effective online upgrade scheme is proposed by controlling the key point status of upgrade process. And the approached method does not need to restart the devices before and after online upgrade, is not visible for users. It greatly improves users' friendly experience of users and is more safety than common upgrade scheme. The method is very suitable to requirements of upgrade for embedded network terminal device. The new upgrade method is verified by bed extension, doctor extension and doorway extension of health-care systems, is highly demanded to be safety and friendly to users, the results proved the correctness and reliability of the scheme.
    • Show Sections

      Hide Sections

      Mobile ad hoc network (MANET) is temporarily constructed network with no fixed infrastructure. Energy conservation is a critical issue in MANET since batteries are the only limited-life energy source to power the nodes. The multicast ad hoc on-demand distance vector (MAODV) protocol is multicast operation of the ad hoc on-demand distance vector (AODV) routing protocol. This paper presents an innovative improvement of energy aware multicast routing protocol for wireless ad hoc network called Power Efficient Multicast Ad hoc On demand Distance Vector (PEMAODV) routing protocol. The improvement of this protocol in energy performance is obtained by Power Aware (PA) selection mechanism which considers not only the nodal longevity but also the maximal nodal residual energy during the routing process. A comparison of PEMAODV and MAODV routing protocols can be done through simulations. The results show that PEMAODV has a higher packet delivery ratio and smaller end-to-end delay than MAODV and a more balance in energy consumption. Meanwhile PEMAODV prolongs the network lifetime with a small increase of protocol overload.
    • Show Sections

      Hide Sections

      A new algorithm for image segmentation based on k-mean and particle swarm optimization algorithm is proposed in the paper. K-mean clustering algorithm is a local search algorithm because it is easily trapped local optimum and is sensitive to initial value effectively. On the other hand, particle swarm optimization algorithm is a global optimization algorithm. By incorporating the local search ability of k-mean algorithm and the global optimization ability of PSO and taking the criterion function of k-mean as the object function of PSO, a new hybrid color image segmentation algorithm based on particle swarm optimization and k-mean algorithm is proposed. Experiments show that the new algorithm can get the optimal quantizated image by PSNR and RMSE.
    • Show Sections

      Hide Sections

      Light ray optimization is an intelligent algorithm simulating the propagation process of light rays in inhomogeneous media. The searching area is divided by grids in this algorithm, and then the optimal searching path is assumed to be the propagation path of light rays. Gradient information is not necessary and only a few parameters are needed to be adjusted in light ray optimization, so it is simple and easy to be used. Light ray optimization algorithm was used to solve one dimensional optimization problems, and convergence for single extreme value problems was proved in this paper. Numerical experimental results showed that the algorithm is feasible and effective.
    • Show Sections

      Hide Sections

      30 years of reform and opening up, China's economic system had Changed from a highly centralized planned economy to a socialist market economy. China's private enterprises are springing up, and the land formation and development in private enterprises, family businesses occupy the vast proportion of its and increasingly become an important force for economic growth, development and growth of family business, for our sustainable economic development and social Harmony plays an important role, but the family business itself has restricted the expansion and development of its operating mechanism, it is necessary restructuring of family enterprises.
    • Show Sections

      Hide Sections

      The ubiquitous network society is an umbrella term for the next generation of information and communications technology, which brings new challenges in information security at the same time. Firstly, we have made a detailed analysis from the purpose, the objective, the process methodology of risk evaluation according to the role, the structure and the environment of information system. The tendency of risk evaluation is asserted with the current ubiquitous network background and some suggestions for the information security risk evaluation in the context of ubiquitous network are presented.
    • Show Sections

      Hide Sections

      In terms of dry and wet gas control technologies, the authors attempt to introduce common flue gas DeNO_X technologies and describe their processing principles, industrial status, strengths and weaknesses and improved prospects. Relevant principles on new technologies of DeNO_X are discussed, and the constraints of large-scale industrial application of new technology and future focus of the study are given. Based on present situation and application of flue gas DeNO_X technology, the future development of the technology is put forward.
    • Show Sections

      Hide Sections

      This paper reviews the differences in the two ways of anaerobic landfill and semi-aerobic landfill. The leachate came from semi-aerobic landfill being recycled leachate has such characteristics: A small quantity of acid and COD, high degradation rate of NH3-N. The acid accumulation phenomenon is not occurred when anaerobic landfill leachate was recycled to the landfill at the initial stage and also not occurred high NH3-N concentration in the middle and end stage. The improving way of landfill accelerated the degradation of COD and BOD, and speeded up the course of stabilization of the waste by the way of mix half of new waste with half of old waste.
    • Show Sections

      Hide Sections

      Shale gas is a potentially huge resource of unconventional gas resources, with mining technology for high, mining, long life, stable long cycle characteristics. In recent years, a severe energy shortage situation and the rapid growth of energy prices, the shale gas resource in the world by a wide range of attention. In this paper, source rocks, reservoir conditions, gas shale cap rock and storage conditions, formation pressure and shale gas in terms of output characteristics of forming conditions and gas reservoirs are summarized overview, and the impact of shale gas. Development of the main factors to do a brief introduction. Summed up during the mining of shale gas reservoir evaluation technology, horizontal wells, logging, cementing and completion techniques and gas reservoir simulation technology and fracturing stimulation techniques to carry out the yield more thorough analysis and discussion, thought to horizontal well technology and fracturing stimulation technology current development process in the study of shale gas priority.
    • Show Sections

      Hide Sections

      Currently the domestic portable medical electronic products are facing competition from both domestic and overseas. Jiuan Medical not only needs to conscientiously analyze its own strengths, weaknesses, opportunities, and threads (SWOT), but also needs to nicely design its positioning in the market, to correctly plan channel strategies, in order to win in the market with fierce competition. This paper first makes correct positioning in the domestic market for Jiuan on the basis of analyzing domestic market environment, pointing out that Jiuan's positioning is providing customers with portable, home appliance like, popularized household medical electronic products, providing people with high tech home health guarantees, becoming the leader in the industry in the domestic market. Second, the paper analyzes Jiuan's marketing channel strategies, which are pursuing flat horizontal channel, pursuing win-win and pursuing smooth communication. Last, the paper proposes marketing channel countermeasures from aspects of strengthening direct selling models, establishing joint ventures, diversifying channels, exploring rural market and developing internet marketing etc.
    • Show Sections

      Hide Sections

      With the big change that the irrigation water from Yellow River is facing sharp drop situation in Hetao irrigation area, the ecological environment which has shaped for a long time and has stabilized to some extent will be changed inevitably. In this paper, we researched the groundwater environment impact factors because of the irrigation water volume change, based on the typical experiment station —Longsheng in Hetao irrigation district. According this study, we found that the groundwater table is continuously declining during the crop growth period. It showed that crops need to consume part of groundwater during the crop growth period and autumn irrigation can effectively make up the groundwater. Water-saving transformation of the former water table is higher than most of the time-saving transformation of the water table subsequent years, irrigation is main supply source of ground water in the Inner Mongolia Hetao irrigation district. Water levels of the different forecasting results show that when the Yellow River water in the 4.0 billion m3/a when the average depth of groundwater at 1.90m about crops suitable for the growth limit has been reached, different water level of the prediction results show that, when the yellow water in 4.0 billion m3/a, annual average depth of groundwater is about 1.90 meter, it has reached the crops being suitable growth limiting value; when the yellow water in 3.64 billion m3/a, annual average depth of groundwater is about 2.50 meter, it has surpassed the suitable crops growth limiting value, the two levels has been reduced in groundwater freshwater area, but the yellow water in 3.64 billion m3/a has decreased significantly, from the angle of ecological safety, the threshold water volume would be 4 billion m3/a in order to keep the water environment benign cycle.
    • Show Sections

      Hide Sections

      Ecological environment evaluation is an indispensible premise for environmental protection, achievement of scientific development outlook, and economic sustainable development. In recent years study on the evaluation of ecological environment has been more and more in depth. Many evaluation methods are proposed, and many evaluation models and indicator systems are established. Evaluation researches can be applied to realistic regions or cities, and quantitative results can be given. Some new methods, new concepts and new trains of thought are put forward, and the scope of research is enlarged. But at present studies especially in the domestic are still facing some problems: theories and practices are isolated; the channel of thought is still narrow; consideration to factors influencing environment is not comprehensive; studies from angles such as economics, management and social science are insufficient.
    • Show Sections

      Hide Sections

      Resource and environment are the important material foundations for economic growth. Tianjin economic development is facing restriction from problems of resource scarce and environment pollution. To quantitatively analyze and define the ratio of resource and environment losses and their influences to economic development, this paper makes empirical analysis on Tianjin resource and environment losses and draw conclusions that from 1991 to 2008 the ratio of Tianjin resource and environment losses to GDP reached 9.47% to 16.53%, and resource loss is more serious than environment loss. The result is importantly meaningful for objectively analyzing and evaluating status of Tianjin economic development and promoting economic growth mode transmission to intensive one.
    • Show Sections

      Hide Sections

      On the background of realizing the scientific development outlook, constructing environment friendly society, and achieving economic sustainable development, all regions have constituted the “Eleventh Five” development plans for the circular economy. This paper selected circular economy development planning of six provinces, and made comparative analysis on the plan structures, main indicators and development focal points respectively. All plans are made according to the region's characteristics, joining with the region's economic and social development level. Plans need to be further improved in unified criteria, rationality, completeness and quantification of indicators, as well as the concretion of key tasks.
    • Show Sections

      Hide Sections

      With the increase of life quality of our people, and with the new medical reform stepping onto the quick track, medical instrument industry is developing rapidly. The domestic portable medical electronic products are facing competition from both domestic and overseas. As the new listed company in the A stock market SME board, Jiuan Medical needs to conscientiously analyze its own strengths, weakness, environmental opportunities, and external threads (SWOT), nicely design its positioning in the market, and correctly set up marketing scheme, in order to win in the market with fierce competition. This paper made SWOT analysis for Jiuan portable medical electronic products on the basis of analyzing market environment of domestic portable medical electronic products, finding solutions of SWOT strategy and tactics.
    • Show Sections

      Hide Sections

      For realizing sustainable development of economy and society, green building of saving energy and protecting environment is in the ascendant. Evaluation system both in the domestic and overseas is gradually being established. Domestic researchers have made probe study on aspects such as system criteria, establishment of system indicators, system implementation and effects, evaluation mathematics model and cost benefit analysis etc. In the future it is needed to further study on following aspects: procedure problem of establishment of green building evaluation system, problem of quantification of environment benefit and social benefit, issue of typical cases analysis and issue of reevaluation of green building project.
    • Show Sections

      Hide Sections

      In order to optimize communication window chip and solve on the real-time problem in the industrial wireless networked control, the optimal scheduling algorithm based on throughput maximize of non-periodic information is proposed and proved. Compared with typical application layer scheduling strategy of industrial network control system, it improves non-periodic tasks theoretical throughput. At the same time the solution method of scheduling timetable based on nonlinear programming model is given for the scheduling algorithm.
    • Show Sections

      Hide Sections

      With the development of Internet, the material management system is an imperative system on enterprise. It is not only deviating user's manual manage, but also developing to Internet. This paper analyzes existing conditions of mobile company and existing domestic mobile phone industry's materials management system, against the company's capital, technology, weak strength of the present situation, it proposed a material management system solution by using PHP + MYSQL based on MVC. This paper discusses the overall development of situation of material supply management system, emphasizing system requirements analysis, designing and developing. Because this system is a custom development information system according to specific business processed of mobile company. It solves problem absolutely that material management informalization of mobile company and bring the enterprise's material supplying on a new stage.
    • Show Sections

      Hide Sections

      Path-finding is an important part of Game AI and we first give an introduction of two popular path-finding algorithms A* and HPA* in this paper. HPA* which is based on hierarchical searching has significantly reduced the store and time cost of A*. However, HPA* does not consider the terrain information when partitioning maps, decreasing the optimal degree of path-finding in open areas. We present a method based on a minimal rectangle which can cover the obstacles. Then large open areas change into a few rectangle clusters of which number is smaller than that of HPA*. In such clusters, path-finding can be done like the beeline path-finding. Finally, we point out the map type in which HPA* or our method are suitable to be used.
    • Show Sections

      Hide Sections

      Firstly this article establishes the mathematical models and speed principles of brushless DC motors, then designs fuzzy PID controllers and current adjustors based on the adjusting speed theory and characteristics of brushless DC motors, which form double closed-loops to achieve intellectualized adjustment of brushless DC motors, and make effects the best simultaneously.
    • Show Sections

      Hide Sections

      Because adding decaying self-feedback continuous Hopfield neural network (ADSCHNN) is proposed based on continuous Hopfield neural network (CHNN), firstly the CHNN is simplified after sigmoid activation function is replaced with piecewise linear activation function. Secondly, the extra self-feedbacks are added to the simplified CHNN to form simplified ADSCHNN. The convergence analysis is given for the simplified ADSCHNN. Finally it is proofed that ADSCHNN is more effective than CHNN, when they are applied to solve optimization problem and when ADSCHNN is applied to solve traveling salesman problem (TSP), the ADSCHNN with zi<0 is better than that with zi>0 and the energy of the ADSCHNN may increase.
    • Show Sections

      Hide Sections

      The long-distance telephone control system based on FPGA is realized in this paper. The controller is applied in the system board hardware circuit design, PCB design, FPGA logic design, etc. I have proved that the system has perfect functions of pick - please, flexible control mode, simple password as well as strong anti-interference ability. Besides, the work system will not bother common use of the telephone. The system can control a lot of switch of household electrical appliances. The system' main feature is user friendly interface, low cost and reliable operation, which provides a practical solution for remote control household appliances.
    • Show Sections

      Hide Sections

      The construction of building consumes large amount materials, and the inventory of material is limited by space of construction site. Scientifically and reasonably determine order quantity in the construction plays important role for reducing cost and increasing efficiency. The paper researched on inventory management in building construction with Economic Order Quantity Model (EOQ) in logistic and supply chain management. Based on determination of engineering material supplier, the determination of economic order quantity needs to consider price discount. After determination of discount point and comparison of inventory cost, the optimal order quantity can be arrived to serve for construction and reduce uncertainty, so as to ensure smooth implementation of construction.
    • Show Sections

      Hide Sections

      In an ad hoc network with flooding-based on-demand routing, many routing messages are propagated unnecessarily. Besides, the widely used minimum hop-count routing metric could not guarantee to find a network high-throughput path. For the above questions, we present a Congestion-aware Multipath Routing (CMR) algorithm in ad hoc networks. In the route discovery, by introducing parameters which is related with the node density of the network, we propose the distance-based flooding constraint broadcasting. It restricts flooding in a certain area according to the node density, but guarantees almost all nodes to receive the packet. Route selection and traffic distribution among multipath of CMR algorithm are based on the link quality and node queue length. The proposed algorithm can find high throughput routes and decrease end-to-end delay. Simulation results show that the CMR algorithm achieves better performance than MSR [1] in terms of packet delivery fraction, end-to-end delay and routing overhead.
    • Show Sections

      Hide Sections

      In order to reveal the incentive functions of enterprise informationization (EI) construction during the process of knowledge transformation, the structure equation modeling (SEM) is used in this paper. By model deduction, research design and model verification, the SEM can effectively reveal the correlation between informationization construction and knowledge transformation in Chinese Enterprises. For illustration, the collected copies are 300 enterprises, in which 271 copies are valid. The empirical results show that the reliability and validity in the information construction measurement model are quite well and the reliability and validity in the knowledge transformation measurement model are also quite well. The empirical research has revealed the EI-related microcosmic mechanism in the process of the knowledge transformation, which can provide the effective theoretical references and support for enterprises to further strengthen the informationization construction and raise the efficiency of the knowledge transformation.
    • Show Sections

      Hide Sections

      In order to reveal the incentive functions of the informationization innovative activities in the process of the formation of core competence, the structure equation modeling (SEM) is used in this paper. By research supposition, research design and model verification, the SEM can effectively reveal the interrelation between informationization innovation and the formation of core competence in Chinese commercial banks. For illustration, the collected copies are 400 enterprises, in which 278 copies are valid. The empirical results show that the reliability and validity in the information innovation construction measurement model are quite well and the reliability and validity in the core competence measurement model are also quite well. The empirical research has revealed mechanisms about the micro-conductive effect of the formation of core competence so as to provide the reliable theory reference for Chinese commercial banks to substantially raise the information innovation efficiency and strengthen the cultivation of core competence.
    • Show Sections

      Hide Sections

      In order to mitigate the power fluctuations on ultra-high voltage (UHV) tie-line, a non-linear PI control strategy is proposed. Based on the dead band of regional control units, this strategy according to the real generations of provincial and regional control units to calculate the area control error (ACE) to as the new control objective. It changes the proportion and integral parameters as the ACE changes, to enhance its ability of restraining the power fluctuations on UHV tie-line. In the end, a simulation of Central China Power System under this strategy is established, and the simulation results show that this strategy works more effectively.
    • Show Sections

      Hide Sections

      The thermal behavior of Ni/MH power battery during charging was studied in this paper by using a thermal infrared imager. Thermal images at the end of regular charge and overcharge were obtained as well as the temperature rise rates during the two stages of charge. A line on battery surface from negative electrode to positive electrode was determined to study the temperature gradient. Thermal behavior during the stage of overcharge was analyzed. Results show that overcharge and increased charging rate will lead to various heat zones of different temperature ranges arise on battery surface. Increasing charging rate and overcharging will result in the increased temperature gradient on battery surface and the temperature rise rate during overcharging is far more than the value during charging regularly.
    • Show Sections

      Hide Sections

      The study about china cabin thermal Comfort is of great significance in the large aircraft market competition field. In particular, choosing a reasonable human thermal model is the key to analyze and evaluate. Therefore, in this paper, based on thermal characteristics experiment of human in the limited space, we will establish a kind of human thermal model with the behavior of thermoregulation, in which the complex heat transfer would be simplified into the heat transfer among three areas of high temperature core, blood perfusion and the equivalent tissue. This new model will not only overcome the limitation of the constant wall temperature or constant heat flux density, but in good agreement with the experimental results. Further, combined with PMV equation of thermal comfort without iteration proposed in this paper, we can analyze the comfort in crowded space under the premise of ensuring the calculation speed. Finally, simulation results show that the method can meet the speed requirement when the simulation calculates under the complex space environment, but also more accurately reflects the human physiological thermoregulation process, is a viable aircraft cabin thermal comfort analysis.
    • Show Sections

      Hide Sections

      In the large area μc-Si:H deposition process, the plasma spatial distribution has an important influence on the uniformity of films in PECVD. In this paper, the plasma fluid model was established and used to simulate the gas discharge of high H2 diluted SiH4 on μc-Si: H films deposition process. When the excitation frequency, electrode spacing, inlet velocity, and SiH4 concentration are 40.68MHz, 1.5cm, 1m/s, and 6%, respectively, the spatial distribution of SiH3, SiH2 radicals and electron are basically uniform, and the SiH3 radical has the highest number density at this time. The SiH3 and SiH2 radicals are main deposited precursors of microcrystalline silicon films. Our simulation results also show that with the increase of silane concentration, the SiH3 and SiH2 et al radical number density increase, but the inhomogeneity of SiH3 radical number density also increases simultaneously. For large area deposition process, the silane concentration should not exceed 10% generally.
    • Show Sections

      Hide Sections

      This paper analyzed the teachers' cultivation problems on fashion majors in vocational and technical universities from the points of the current vocational and technical teacher's cultivation fundamental objects and developments. It provided the originated teaching model of “Oriented Practice and Connected Cultivating” for fashion profession staff's cultivation. It also provided the suggestions on the requirements and the measurements of the establishment of the rules and the training bases.
    • Show Sections

      Hide Sections

      Course group is recognized as the carrier and core of tertiary education. Based on the research of International Construction Education and CDIO, this paper proposes constructive conception about how to set up course group within international construction management knowledge system and cite current situation of construction management in Zhejiang University City College as evidence. Therefore the establishment and implementation process of four-level course group has been planned. In attempt to propel development of operability-oriented and application-oriented talent-training in CDIO, and the progression of international construction education, this course group additionally includes general training objective, target-decomposition process, course-assembly process, and practical-education process.
    • Show Sections

      Hide Sections

      We try to figure out the complicated process of diagenesis by studying a whole diagenetic system, which are composed of the deeply buried (3100∼3300m) lenticular sandbodies and the surrounded shales. We used 141 core samples, including sandstones and shales, and the analysis of thin section, X-Ray Diffraction, Scanning Electron Microscopy and Cathodoluminescence Micrography to analyze those samples' diagenesis heterogeneity. We found the lenticular sandstones got high porosity (20%) at the interior and low porosity (4%) at the SSC. The reason for low porosity was the present of carbonate cements. Shale supplied the source for a portion of the diagenetic cements near the SSC in the whole diagenetic system. Within sandstones and shales of late-stage illitization, unequal amounts of reactive components can diffusive transport in the whole diagenetic system. The whole diagenesis evolution result proved that shales play an important role in the process and must be considered in to sandstone diagenesis.
    • Show Sections

      Hide Sections

      A method of leakage localization of water supply network based on DMA management technology was discussed in this paper. After having built the district metered areas of water supply network, the flow data was achieved by reading the metering devices. These data was used to identify the leakage district and determine the water leakage in water supply network. On the basis of identifying of leakage district, the possible leak position was located by using the microscopic hydraulic model. Finally, the leak position was located accurately by using the method of the artificial leak detection. A case study was conducted to verify the feasibility and effectiveness of this method.
    • Show Sections

      Hide Sections

      In this paper, we study quality-of-service (QoS) issue in multiple redundant trees based preplanned recovery schemes for a complete graph. Two types of basic recovery schemes, Hamilton-based recovery scheme and star-based recovery scheme, have been proposed to guarantee a fast recovery from multiple simultaneous link or node failures in a complete graph. Based on two types of basic recovery schemes, we develop matrix-based convenient algorithms for constructing improved recovery schemes with enhanced QoS performance, cost or delay reduction. Finally, we present numerical results to compare basic and improved schemes.
    • Show Sections

      Hide Sections

      The construction of quality course is the important part of the university teaching reform project, which is the key element to improve teaching quality. Since the construction of excellent courses was started by the Ministry of Education in 2003, excellent course resources website has also made a preliminary development. But from the overall situation, many problems still exist. This thesis investigates and researches on the website of national excellent curriculum resources, analyzes some existing problems and advances some corresponding suggestions and countermeasures to solve the existed problems.
    • Show Sections

      Hide Sections

      During the construction of national top-quality courses, more people have been attention to the construction of course site. However, the current curriculum of the course website often overlooked design of network resources, it is difficult to meet the needs of the users and restrict the construction and development of course website. This thesis analyzes the design process of course website from the functional position, the user analysis, course content selection and structural design, and proposed the corresponding system design.
    • Show Sections

      Hide Sections

      CAN controller's working process is to constantly operate on the relevant register, Driver program of CAN controller is compiled. It is a set of operation function for register of CAN controller so as to call the program by users. In this paper, LPC2300 CAN controller driver were completed with the standard C programming language, which including the hardware abstraction layer program description and user interface.
    • Show Sections

      Hide Sections

      Data mining technology plays a more and more important role in information usage and extraction. This article explores three aspects of data mining's application in digital library on the basis of describing data mining technology, elaborates the necessity of data mining's application in digital library and proposes a mining system model of digital library based on data mining technology.
    • Show Sections

      Hide Sections

      According to the stochastic property and complexity of the traffic flow evolution on the urban road and the uncertainty of traffic state discrimination, and based on the analysis of the mapping relationship between traffic state and traffic flow parameters, an algorithm of Logistic regression for traffic state probability forecast is put forward. The proposed algorithm explores the function relationship of traffic state and the influencing factors by means of Logistic regression and thus gives the probability prediction of the traffic state of the next time period. Finally, according to the proposed algorithm, the grading traffic state probability forecast experiments of different time periods is carried out using the field traffic flow data. The results of independent sample test indicate that the model has a finer precision and stability.
    • Show Sections

      Hide Sections

      Boost converter can reduce the output current and output capacitance with the rated power, which is applied widely in switching power supply. It has the advantages of zero-current turn-off characteristic, small inductance and simple control circuit when it operates in discontinuous current mode (DCM), and it is suitable for the miniwatt active power factor correction (APFC) circuit. Mathematic models of Boost converter operating in DCM and critical mode (CRM) are built up, the influence of the different inductance value on the DCM is analyzed, and the characteristic formulas are deduced. The DCM pattern electric circuit characteristic is simulated by Pspice software, and the correctness of characteristic formula is validated.
    • Show Sections

      Hide Sections

      The digital calendar circuits controlled by 80C52 have been designed based on Proteus simulation software. The whole design process is made of three parts: hardware circuits, software programming and software simulation. Finally, it shows that the circuit design of hardware and software is correct through Proteus software simulation. The method of circuit design is systematic and practical, which will provide certain design ideas and reference value for display circuit in the future.
  • Logistics, Informatics and Communication Engineering

    • Show Sections

      Hide Sections

      The paper presents the comparison of solution quality between Greedy Randomized Adaptive Search Procedure (GRASP) and Simulated Annealing (SA) +GRASP metaheuristics in solving of flexible job shop problem (FJSP). Each of the production problems have been tested with metaheuristics and have been run a number of times to get the best solution. All the results have been analyzed on certain parameter of performance for the metaheuristics - makespan. Overall, testing showed that the SA+GRASP algorithm was more competitive than the GRASP algorithm in the solution quality test. The solution quality of the SA+GRASP algorithm changed to a different degree depending on the task being solved.
    • Show Sections

      Hide Sections

      Privacy-preserving data mining has been the subject of substantial research, where data mining algorithms are analyzed for the side-effects they incur in data privacy. This paper highlights how data mining results cause privacy breach and proposes a new method to maintain knowledge privacy. We experiment our method using heart and spect datasets from the UCI KDD archive. We report the experimental results which show its effectiveness on categorical data.
    • Show Sections

      Hide Sections

      This paper proposes a high performance nonlinear fuzzy controller for a drying control process. The highly nonlinear characteristics of drying processes make classical control theory unable to provide the same performance results as it does in more well behaved systems. Advanced control strategies can be used to design temperature, relative humidity and air velocity nonlinear tracking controllers, in order to overcome its highly non-linear dynamics over the whole drying operating conditions. Open-loop experiments were carried out to collect experienced-based knowledge of the process. PID and Fuzzy logic (FLC) real-time-based controllers were designed to perform food drying tests, being compared without controllers' retuning. Absolute errors reached by FLC controller were 3.71 and 3.93 times lower than PID for temperature and relative humidity, respectively.
    • Show Sections

      Hide Sections

      The production of soybean (Glycine max L) requires that the product is collected healthy and in advance, to minimize losses caused by the attack in the field of insects, diseases and microorganisms. Therefore and due to high moisture content at harvest, drying is one of the operations of primary importance among the techniques involved in the conservation of desirable qualities of products of plant origin. The objective of this work is to obtain the drying curves of soya, in the range of drying air temperature between 45 and 90°C, for the initial moisture content between 0.13 and 0.32 and drying air velocity of 0, 0.5, 0.9, 1.5 and 2.5m/s to determine the influence of these parameters in the process. The experimental phase was performed using a prototype of which was a hair metal tube with 0.15m in diameter, insulated throughout its surface with glass wool and canvas. The air was heated by six electrical resistance with power of 600W, while the temperature was controlled with the aid of thermocouples connected to the drying equipment. Were also performed numerical simulations, where the mathematical model used was proposed by Khatchatourian [1], and this search has changed the equation that describes the flow of mass, it is entering the parameters of air velocity and initial moisture content, obtaining a good agreement between experimental and simulated data. Was observed that the drying air velocity presents significant influence on the process, there is an increased withdrawal of water during the first hours of drying. Note that the influence of air temperature on the rate of drying is higher at the beginning of the experiment, reducing the processing time. The higher the temperature and airflow, the greater the drying rate and lower the total time of exposure to heated air.
    • Show Sections

      Hide Sections

      A myriad of failed industrial machinery are being abandoned in many quarters due to inadequate technical know-how for restoring them to operative condition. There is need for effective management of maintenance facilities, including: tools and equipment, personnel, and other infrastructures for the attainment of sustainable maintenance operations in a competitive environment. For a good performance of maintenance centre in a competitive environment, a framework that allows dynamism in the development of maintenance resources needs to be put in place. The updating of maintenance facilities to meet varying technology-demand of defective machinery would minimize the problems of abandonment and will contribute to the growing economy, as well. Updating of maintenance facilities would be effective through installation of a proper information management system. A good information management system would prognosis into the features of emerging and new maintenance problems and the facilities required to solve them. Efficient interrelationship between maintenance activities and information management will promote agility in the system. In this study, a framework was developed to integrate maintenance activities with information management such that agility is created in maintenance system and the effect of competition is minimized. It was observed that there is substantial economic benefit in the areas of reduction in abandoned equipment and revitalization of production economy. The benefits from agile maintenance system have outweighed the cost of acquisition of the information. The application of developed maintenance system in industries has allayed the fair for survival from the threat of equipment abandonment due to failure.
    • Show Sections

      Hide Sections

      Magnetic precision stage is easy to realize micromotion with high resolution because a contact-free magnetic levitation technique is used between the moving plate and the driving part. The main parameters of drive circuit of a precision stage have been discussed. The power amplifier is designed based on L6234, the experimental results express that the drive method satisfied the demand of this stage's movement.
    • Show Sections

      Hide Sections

      Direct digital synthesis technology (DDS) is applied widely in synthesizing signal since it has characteristics such as high stability and wide frequency band. It is very important to calculate the phase control word when synthesizing dual signals with continuous tunable phase difference. Because there are shortcomings of large computation, low efficiency of phase setting, more storage space occupied or significant cumulative errors of phase setting when calculating phase control word with usual methods, three novel algorithms for calculating phase control word are developed in this paper. These new methods do not need large computation and more space and simultaneously they can decrease the error greatly, which play an important role in improving the phase setting speed and precision in dual signal generator.
    • Show Sections

      Hide Sections

      With the rapid economic growth of china, the issue of national petroleum supplyment security is increasingly focused on and many evaluation methods were used to analyze this problem. In this paper, the method of nonlinear fuzzy was applied to evaluate the security of national petroleum supplyment. Compared with tradition linear fuzzy method, nonlinear method takes into account the particular impact of special factors on evaluation result and promote the validity and rationality of the evaluation. The factors which can influence the security of petroleum resource were analyzed and divided into four classes to establish the factors' evaluation system. Then, the weight and special impact factors were determined. At last, comprehensive evaluation were made by using the concept of AHP method, the evaluation result shows that the security of national petroleum supplyment is dangerous. We need to improve strategic petroleum reserve especially.
    • Show Sections

      Hide Sections

      We select this peak as the basis of analysis of multiple data streams of a comparative analysis of trends. This paper analyzes the situations in which aspects or trends describe the use of peak stream trends in the raw data is applicable, the use of peak trends to describe trends in the raw data stream which aspects, such as the direction of change, change, and change the frequency range and so on. To this end, this paper is organized as follows: First, visually explore trends in the use of peak stream changes described in the original data trends applicability; then, the peak for the formal description of concepts such as; Finally, the direction of change describes the use of peak changes in the direction of the raw data for the applicability of strict proof.
    • Show Sections

      Hide Sections

      Virtual honeynet technology itself can trap more successful attacks to the network intruders, and analyzed and integrated to improve system security protection. But the deeper, the information from the intruders intended to (want to steal the exact information domain), still in the blind spot. In this paper, based on feedback information from the security model draws on the advantages of a virtual honeynet technology, natural language understanding technology, standards can ensure efficient use of honey to obtain objective information about the intruder , namely, data-sensitive. improve the system's high reliability and high credibility.
    • Show Sections

      Hide Sections

      Since impulsive noise in the application may usually appear, a novel adaptive impulsive noise cancellation approach (referred as LMPANC) is proposed based on Alpha stable distribution. In this proposed method, the adaptive filter is adapted. The impulsive noise is input signal of filter, and the useful signal with impulsive noise is the reference signal of filter. Both impulsive noises are relative. The filter coefficients are iterated under the least mean p-norm criterion. Upon convergence, the impulsive noise in the useful signal is cancelled mostly. Computer simulation studies show that the estimation performance of the LMPANC algorithm is excellent under non-Gaussian Alpha stable distribution noises, better than that of the traditional least mean square adaptive noise cancellation (referred as LMSANC) algorithm.
    • Show Sections

      Hide Sections

      In order to meet the needs of users' privacy preservation in personalized search, this paper proposes a ranking method of personalized search result for privacy preservation. Based on VSM (Vector Space Model), the method used secure dot-product computation to compute similarities in various search results. It aims at protecting users' privacy while improving the quality of personalized search service. The performance analysis result proves that the method can calculate faster and has lower communication overhead.
    • Show Sections

      Hide Sections

      The optical code-division multiplexing routing system allows the label and payload information to be processed in parallel. But going with the label converting, the payloads also accumulate in the optical buffering area, which causes Multi-access interference, when the light pulses of many users are simultaneously transmitted. The multi-user interference is the main noise factor of the edge router. In this paper, the performance of the system with and without Optical Hard-limiter on the impact of the multi-user interference is analyzed theoretically, showing that we can effectively reduce the influence of multi-user interference, increase the system capacity, and improve the bit error performance of the system by adopting an optical hard-limiter.
    • Show Sections

      Hide Sections

      A way of making the label and payload en/decoding separate is proposed, and a novel optical code-labeled router, of which routing information can be processed in parallel, is designed based on WDM/OCDM/MPLS technologies. The routing system is composed of 8 paths, and each of them is divided into 8 wavelength channels, being provided by 8 OCDM code words in each channel. The processing speed in every OCDM-path is 1.25 Gbit/s, so the throughout up to 640Gbit/s is achieved. As a platform, optisystem is used to simulate and analyze the routing system. The simulation results show that routing information processing in parallel is feasible. The payloads and labels encoded with two different code words can overlap with each other on the common wavelength. In the core router, the switch processing only includes the short label code recognition so as to increase its processing speed enormously.
    • Show Sections

      Hide Sections

      Aimed at the privacy problems generated in the process of association rules mining, this paper proposes a security data mining method of single-layer association rules, and especially focuses on privacy preserving of data mining based on the data with concept hierarchy. First, the paper layered the information which was automatically generated by data statistics on the basis of conception hierarchy to realize cross-layer analysis. Second, to ensure security in the mining, a method was proposed which applied a secure invertible two-party matrix protocol to the multilayer association rules mining. Finally, by an example, the method was verified that can not only acquire the across-concept information, but also effectively protect the security of privacy.
    • Show Sections

      Hide Sections

      The photon is an attractive physical system for representing a quantum bit. Single photons can be detected with high quantum efficiency for a wide range of wavelengths, using a variety of technologies. Three of the most experimentally accessible devices for manipulating photon states are mirrors, phase shifters and beam splitters. Arbitrary unitary transforms can be applied to quantum information, encoded with single photons in the dual-rail representation, using phase shifters and beam splitters. We have gained some valuable insight into the nature of the architecture and system design of a quantum computer, from studying this optical quantum computer.
    • Show Sections

      Hide Sections

      Fructus Cnidii (FC) is a traditional Chinese medicine, but it has mild toxicity. In order to reveal FC toxicity mechanism, we studied FC toxicity metabonomics in rats model with chemometrics methods. We used different chemometrics methods to select FC toxicity biomarkers. A new approach named stability-based biomarker selection (SBBS) for biomarker identification was used. We carried out it in package BioMark with R software. The result showed FC could mainly affect the metabolism of some micromolecules leading to toxicity. In this work, we firstly used SBBS type method with R software to discover FC toxicity biomarkers. SBBS is a powerful tool to find biomarkers in metabonomics study.
    • Show Sections

      Hide Sections

      In order to reduce the scale of the generated reversible network, we present the concept of effective complexity-equal exchanging POT and splitting POT, and propose novel techniques for the synthesis of reversible networks of Toffoli gates. The interchanging and merging gates strategies in reversible network and relevant proofs are given, furthermore, we put forward the valid simplification method of a reversible network. The experimental results on all 3-bit and part of 4-bit reversible functions show that the proposed synthesis algorithm and simplification method have better performance in reducing reversible gate count as well as control bit count compared to other heuristic methods.
    • Show Sections

      Hide Sections

      As a standard of describing the scheme information or structure information of XML document, XML Schema plays an important role in the building of XML indexing and improving of the query efficiency. Now most of the XML indexing structures focus on studying the structural query. Comparing the current region encoding and XML indexing technique, the paper brought forward a kind of XML indexing based on XML Schema SBXI (Schema-Based XML Indexing). SBXI made the most of the XML Schema to build the XML indexing to improve the efficiency of path querying and prospected the future research directions.
    • Show Sections

      Hide Sections

      Advances in distributed system technology have created new possibilities for innovation in simulation and the creation of new tools and facilities that could improve the productivity of simulation. This paper describes a multi-agents based collaborative simulation system for unmanned surface vehicle (USV). Multi-agent and the collaborative module of agents are used to resolve the problem of the existing simulation system. The detail of every agent in the system is described. In addition, the collaboration of agents and the decision rules are also introduced. The paper then presents results of USV simulation tests on the system.
    • Show Sections

      Hide Sections

      With the application of the computer aided process design technology, a great deal of process data has been accumulated by enterprises. Inherent linking with these data is found by exploiting Apriori algorithm, which will help enterprises with the process design. In this paper, the association rule model of operation sequence is introduced briefly at first. Then the bottleneck problem of apriori algorithm is analysed, on basis of this analysis, an improved apriori algorithm is provided. At last, combining with actual data, a detailed description of the improved Apriori algorithm's application in the discovery for association rules of operation sequence is put forward.
    • Show Sections

      Hide Sections

      The purpose of this research is based on JavaEE technology architecture of application systems, the use of artificial intelligence and reasoning mechanism of consultations, to establish a complete knowledge of learning model, the application of self-adaptive and learning to self-expansion, to adapt to changing and expanding application needs. The research project will be applied to Web-based application system, it has in consultation with users and improve self-learning knowledge base and database capabilities to better meet the increasingly complex enterprise application requirements. The main technique is the use of JavaEE technology and Agent System technology in the consultation mechanism, the use of appropriate development platform to study the adaptive learning model of knowledge in the application in consultation mechanism.
    • Show Sections

      Hide Sections

      As the outcome of Internet and auction, E-Auction becomes more and more popular. To ensure the security of it draws our attentions. In this paper, we analysis the situation and propose a new pattern of E-auction based on Secure multi-party computation and Data Encryption Standard.
    • Show Sections

      Hide Sections

      This paper first analyzes the travel agent questions (Travelling Agent Problem, TAP), and that it is a class of complex combinatorial optimization problems, mobile agent migration path planning is the most classic problems; Second, for ant colony algorithm to solve such problems requires a longer search time and ease into a local minimum shortcomings, the introduction of genetic algorithms and ant colony algorithm for global and local updating rules to improve, greatly reducing the travel agent ant colony algorithm to solve problems in the local minimum and cause the system to the possibility of stagnation; Finally, through simulation experiments verify the validity of the proposed algorithm.
    • Show Sections

      Hide Sections

      An edge-coloring of a graph G is equitable if, for each v ∈ V(G), the number of edges colored with any one color incident with v differs form the number of edges colored with any other color incident with v by at most one. By study the factorization, we prove that 1) every (k(f−1)+1,kf)-graph has equitable edge-coloring with k colors; 2) for any subgraph H with r edges of (k(f−1 ),kf −1)-graph G, there exist a subgraph R with an equitable edge-coloring orthogonal to H.
    • Show Sections

      Hide Sections

      To improve the speed of constructing triangle irregular network (TIN), We propose an efficient Delaunay triangle network construction algorithm. Firstly, we divide the discrete points set into blocks according to a certain threshold to construct sub-block index binary tree, then, Delaunay triangle network for each block is constructed with Graham scanning technology, finally, the sub-blocks which have the same parent node are merged bottom-up. Compared with other algorithms by the experiment, the high efficiency in network construction of the algorithm in this paper is verified.
    • Show Sections

      Hide Sections

      An event-based temporal logic (ETL) is presented in this paper, because there is no suitable temporal logic which can directly describe the properties of event graph models. ETL has the abilities to describe the particular properties of event graph models, such as event canceling edge, passing parameter values between events, time constraints and the priorities of coinstantaneous events. It can facilitate the specification of properties during model checking for event graph models. ETL is verified by the example at last, which show ETL has the expressive powerful to describe event graph models.
    • Show Sections

      Hide Sections

      Cloud theory is a new theory handling uncertainty based on the uncertain transition between quality and quantity. The theory includes cloud model, virtual cloud, cloud operation, cloud transform and uncertainty reasoning. It provides new solutions for many basic problems in data mining and knowledge discovery, such as concept and knowledge representation, transition between quality and quantity, concept synthesization and resolution, concept and concept hierarchy generation from data, etc. Clod model is a model of the uncertain transition between a linguistic term of a qualitative concept and its numerical representation. Cloud model represents a qualitative concept with three digital characteristics, expected value, entropy and hyper entropy, which integrate the fuzziness and randomness of a linguistic term in a unified way. This paper presents the fundamentals of cloud theory and its applications in spatial data mining and knowledge discovery, focusing on the cloud models and their algorithms.
    • Show Sections

      Hide Sections

      As an effective global optimization method, genetic algorithm has been used in real practice very widely. When it is used in real practice, its slow convergence and poor stability have become the main problems. In order to overcome these problems, from the creation of the initial population, immune selection operation, improved genetic operators, et al, an improved fast immune genetic algorithm is proposed. Through the simulation experiments of some hard-optimization functions, the proposed algorithm shows its faster convergence and better stability than a lot of existing algorithms'.
    • Show Sections

      Hide Sections

      Capacity planning in semiconductor manufacturing is very complex due to numerous variables and constraints. The identification of risk factors for capacity forecasting is a bottleneck of capacity planning. This paper describes key methodologies to solve the intricate problems. On the basis of the given tops event and bottom events, the fault tree of excess capacity forecasting was built. Then it was qualitatively analyzed with artificial deductive method, and was quantitatively analyzed with computer-aided method. Finally, the process of risk identification and risk factors of excess capacity forecasting were obtained, and the risk evaluation system of capacity planning was provided in semiconductor manufacturing.
    • Show Sections

      Hide Sections

      The joint row-column decoding algorithm for Low Density Parity Check (LDPC) codes is widely used in high-speed communications. However, the pipeline operation of the decoder may introduce memory access conflicts, which heavily deteriorates the decoding throughput. To essentially deal with the issue of memory access conflicts, we present a construction method of LDPC codes for joint row-column decoding algorithm. It can avoid routing congestion and reduce decoder pipeline delay. The LDPC codes constructed by the proposed method can greatly reduce the decoding iterations. Meanwhile, the performance of them is the same as the codes constructed by conventional Block Progressive Edge-Growth (Block-PEG) algorithm.
    • Show Sections

      Hide Sections

      Compared to traditional BFGS method, in this paper we present a new modified BFGS method for unconstrained optimization problems. If we assume the objective function is twice continuously differentiable and uniformly convex, we prove the iteration converge globally to the solution. And under some additional conditions the superlinear convergence is given.
    • Show Sections

      Hide Sections

      Minimum free energy method is adopted widely to predict RNA secondary structure. Based on the relative stability of the stems in RNA molecules, a heuristic algorithm is presented to predict RNA pseudo-knotted structure, the algorithm takes O(n3) time and O(n2) space, this algorithm not only reduces the time complexity to O(n3), but also widens the maximum length of the sequence. The preliminary experimental test on the RNA subsequences in PseudoBase confirm that the algorithm outperforms other known algorithms in predicting accuracy, time complexity and space complexity.
    • Show Sections

      Hide Sections

      Matsuo and Ogata proposed an electronic ticketing based on public key scheme for intelligent transport system in 2003. Later, Hsu pointed out that Matsuo-Ogata' scheme is insecure, and also gave an improvement in 2006. In this paper, we will propose an forgery attack based on Hsu's scheme and prove his method also insecure.
    • Show Sections

      Hide Sections

      In the paper, key technologies applied in design of a software system of GPS vehicle monitoring based on MapXtreme kit are introduced. In the system, software development tool C#, SQL Server Database and Global Positioning System (GPS) are utilized comprehensively to build a Geographic Information System (GIS) by using MapXtreme kit. Some main functions of the software system, such as the vehicle location, track playback, Hawkeye view, real-time alarm monitoring, scheduling and etc., are designed and realized. The experimental results show the system can be applied to fulfill real-time monitoring on the vehicle effectively with the electronic map.
    • Show Sections

      Hide Sections

      In this paper, we investigate the problem of how to conserve energy for the wireless sensor networks. By analyzing LEACH protocol and LEACH-C protocol, we proposed a new algorithm, Low Energy Consumption Cluster-Based Routing Algorithm (LECCBRA) to overcome the shortcomings of LEACH, LEACH-C protocols in cluster head selection and communication between cluster heads and base station. Compared to LEACH, LECCBRA protocol provides improvements in the selection of the next head cluster, re-partition of network and inter-cluster routing. Simulation results show that the total energy can be effectively saved, and the balance in energy consumption between clusters can be achieved with LECCBRA, thus the network lifetime is extended.
    • Show Sections

      Hide Sections

      The flexible and effective access control technology can solve security in the environment of service computing, so that the extensible access control markup language is analyzed and XACML policy model is proposed. The corresponding policy access control algorithm is described to support the architecture of policy. The technology based on policy can provide finegrained access control for service computing with an example and the XACML combination algorithm is also analyzed.
    • Show Sections

      Hide Sections

      To cope with the market and non-market uncertainties in the licensing process of a new product innovation, an option game model considering the geometric Brownian motion (GBM) involved in a Poisson jump-process is proposed. The equilibrium is searched by backward induction, and the value function and threshold for the follower and the leader are deduced, followed with the entrance equilibrium and optimal licensing fee. It is shown that the optimal licensing fee relies on the initial state of the uncertainty. A numerical example is analyzed with the effect of the initial state of the uncertainty on the optimal fixed fee.
    • Show Sections

      Hide Sections

      HACCP system has been applied in drinking water safety, feed safety, animal origin food safety, the risk management of securities companies and the logistics safety of dangerous goods. The application of HACCP system in safety control of well coal mine is to evaluate the potential danger and risk of each link in fact quantitatively , find out the critical control point (CCP) affecting the final production safety greatly, determine the key control limits (CL), take the corresponding prevention and control measures, control it before the hazard actively, minimize the risk of production safety accident and achieve the effective control of production safety.
    • Show Sections

      Hide Sections

      In this paper, a new distributed education resources recommendation system based on web mining is presented. The web mining technology and the mobile agent technology are simply introduced. The work process of this system is depicted in detail and the implementation scheme is given. The experiment shows that the accuracy, the precision and the recall of this system are high enough. Moreover, the effectiveness of this system is further increased with the system running. Compared with the non-distributed education resources recommendation system, the system execution speed is improved and the system load capacity is increased.
    • Show Sections

      Hide Sections

      Many users store their business data in the Excel spreadsheet. However, it is difficult for such files to be accessed on the Web. How to export excel data into the database conveniently is of great concern to users. In this paper, an algorithm is proposed to analyze the Excel header. The analysis result enables users define what columns will be extracted. User-defined template will be used in the future Excel data extraction. A prototype system had been implemented to verify the practicality and feasibility of this technical solution.
    • Show Sections

      Hide Sections

      The total flow-time problem of two machine open-shop is NP-hard in strong sense. The problem laying down restriction on machine dependent processing times has been researched in this paper. An explicit solution is designed and proved for the above problem when the numbers of jobs satisfy certain condition for the problem and some properties are proved.
    • Show Sections

      Hide Sections

      The paper investigates equilibrium policies of the players in two competing supply chains under incomplete information. The retailer of each supply chain has private information about market demand and has the right to decide whether or not to share the information with the manufacturer. We derive each player's equilibrium policies to maximize his own profit. We find that in high demand state, the wholesale/ retail price and the order quantity are not influenced by the information sharing. In low demand state, information sharing can pull down the wholesale price, but it may elevate the wholesale price of competing manufacturer. Additionally, information sharing can promote the retailer to order more items, but reduce the order quantity of the competing retailer when facing with the low demand. To demonstrate these findings, we illustrate our propositions by numerical examples.
    • Show Sections

      Hide Sections

      XML is rapidly emerging as a standard on the Wiki. How to rapidly search and query XML documents efficiently has received many attentions. To improve the efficiency of index bulk deletion on XML data, an optimization algorithm framework is brought forward to combine the ant optimization algorithm and index bulk deletion algorithm. In this framework, information collection model collects the information when the system is running, cost estimation model collects the cost information of all index bulk deletion algorithms, the optimization algorithm framework simulates the information collected by information collection model and cost estimation, and chooses the optimization bulk deletion algorithm, and the index model finish the index bulk deletion. To improve deletion efficiency, a vertical bulk deletion algorithm is brought forward in this paper. Experimental results from our prototype system implementation highlight the correctness and efficiency of our solution, and the framework can choose the optimization bulk deletion algorithm in all case.
    • Show Sections

      Hide Sections

      Good design work is often the goal of the designer and the results of the design process, starting from project concept to understand, through analysis, communication and positioning, and then into our professional solution phase, generally through illustration, photography, graphics, fonts. Graphic design art is a symbol of the strong kind of art, including the use of graphics, based on information for the purpose of communication is two-dimensional space in the location of the font, scale, relationship planning.
    • Show Sections

      Hide Sections

      The wireless fieldbus system model based on IEEE802.15.3a standard is established, and double scheduling mechanism for the wireless fieldbus system is present in this paper. The mechanism makes use of not only static scheduling policy but also dynamic scheduling policy. The scheduling and optimizing layer is introduced on top of MAC layer based on IEEE802.15.3a standard, and designed for dynamic optimizing to communication task at unstable wireless channel. At the same time, scheduling mechanism on the user layer is improved for adapting to characteristics of wireless communication. An application based on the presented model is evaluated. It solved problem of wireless communication on fieldbus system in part.
    • Show Sections

      Hide Sections

      The communication quality of existing wireless technology is very poor in the industrial environment. It is not meet industry on the real-time and reliability requirements. In this paper, taking advantage of UWB technical characteristics, the concept of the Internet of things based on UWB technology for industry and related design ideas are proposed. It makes up for real-time poor of wireless communication in industrial network control system. The research result is a theoretical basis for industrial network control system development to the direction of multifunction integration, the multimedia messaging and monitoring, control, fault diagnosis and so on. At the same time, it is a forward-looking research on implementation of the Internet of things based on UWB technology for industry.
    • Show Sections

      Hide Sections

      Features of supermodular widely exist in Bertrand oligopoly model. We can get more direct-viewing conclusions when supermodular game theory is used in differentiated-product Bertrand oligopoly model. When enterprise's strategy variable is only price, the sufficient conditions of single decision variable Bertrand oligopoly game to be supermodular and logsupermodular are given. And profit function can also be changed to be supermodular through monotonic transformation even if it is neither supermodular game nor log-supermodular game. When there are multiple decision variables for enterprise's strategy, under usual assumptions, Bertrand oligopoly game is supermodular, and the maximum and minimum Nash equilibrium exist.
    • Show Sections

      Hide Sections

      DDoS attacks are fatal to the survivability of internet services. Usually DDoS attackers send large number of packets to a victim and congest the victim's bandwidth. As a result, the victim can not supply services to other normal clients until some measures have been taken. Currently popular approaches to DDoS are based on anomaly detection correctly, however it is difficult to differentiate between attacker and normal client absolutely. We motivated this problem and propose a new method defending against DDoS called TBDT. The TBDT assumes that it can identify hospital client, and need not to recognize the attacker. The server will give more trust to hospital client and give less trust to hostile client. Once attacks happened, the server will only supply services to the client whose trust is above the trust threshold. We use simulations to show the effectiveness of TBDT at limiting DDoS floods. The simulation results show that the victim can survive the DDoS attacks.
    • Show Sections

      Hide Sections

      E-commerce based on Internet is gradually becoming a new mode for commercial activities and the greatest misgiving of enterprises to conduct e-commerce is “safety”. One-time password (OTP) scheme can help to solves password problems such as password conjecture and wiretapping, which occurs by repeatedly using the same password. The S/KEY one-time password system is one of most popular authentication schemes, however it can not withstand small integer attack. This work illustrates as well as discusses of the S/KEY based authentication schemes with their pros and cons. This paper suggests an improved one-time password system based on bidirectional virtual authorization in mobile application systems. Our proposed Scheme can defend copy attacks, replay attacks, integer attack and Brute-Force Attack.
    • Show Sections

      Hide Sections

      Education student is an indispensable pre-service teacher education is an important part of teachers and students of high ability is extremely important, good and bad effects of education student is directly related to high teacher quality teachers and thus affect the quality of education, This brief analysis of the student's educational content, substance and value of education student, details of the three education student's model and its implementation process, and to enhance the educational effectiveness of student activities and put forward specific measures.
    • Show Sections

      Hide Sections

      Power load forecasting is one of the important parts in power system planning. This paper focused on the research of load forecasting and proposed an improved fuzzy AHP for mid-long term load forecasting. Firstly, Triangular fuzzy number is introduced to the model for indicating the judgments of experts, and then entropy method was introduced to ascertain the weights of model-evaluation indexes; variance-covariance optimization combination method was used to ascertain the weights of each single model under each evaluation index respectively, and determine the combined weights of combination forecasting model. Finally, The experiment results shown that the presented algorithm could fit the medium and long term load forecasting better than other traditional approaches.
    • Show Sections

      Hide Sections

      The load forecast level in power system is a important symbol to measure operations and management of power system. This paper summarized the research conditions of the short-term load forecasting using artificial neural network method, and analyzed the characteristics of electrical load and factors of influencing power load forecasting accuracy. The paper used the particle swarm optimization neural network method in short-term load forecasting of power grid. Based on the analysis history loads in California power system, we established the load forecasting model considering the various affecting factors, and normalized the input load, meanwhile quantified date, atmosphere and other factors. The example showed that the model of neural network based on the particle swarm optimization algorithm can improve the prediction precision and speed, it's performance prediction is superior to the model based on BP neural network load forecasting.
    • Show Sections

      Hide Sections

      The difficulty degree of listening materials has a direct effect on students' listening comprehension. This paper provides a new method to analyze the difficulty degree of CET-4 listening materials quantitatively, an algorithm based on Sugeno measure. Two major factors— lexical complexity and syntactic complexity are selected as evaluation indexes, and weight parameters are given by experts. Then Sugeno measure is used to integrate them. The entire evaluation process is quantitative, standardized and objective.
    • Show Sections

      Hide Sections

      Coordinate transformation has been proved to be a correct solution when constant modulus algorithm (CMA) is used to equalizer the non-constant modulus signals in the digital communication systems. For the 16-QAM signals the CMA1-2 based on coordinate transformation is proposed. Compared with the traditional CMA1-2 and CMA2-2, the proposed algorithm has the fastest convergence rate and the lowest steady-state mean square error. The computer simulation results demonstrate that the significant improvements in performance are achieved with the proposed algorithm.
    • Show Sections

      Hide Sections

      Among online businesses in China, the third-party payment has its unique characteristics, but it is difficult for the companies to make their advantages in competition with other parts of value chain. Based on game theory, it was analyzed that the price competition among third party payment companies in China is inevitable. This paper suggests that the online payment platforms should improve their construction according to three different value chain layers. Furthermore, this paper presents some revenue strategies that can help online payment companies to improve advantages in competition and avoid the negative effects that the price competition brings.
    • Show Sections

      Hide Sections

      This paper introduces the concepts of feasible interval and the inclusion degree of interval number. We consider the multi-attribute decision making (MADM) problem with feasible intervals, and provide two kinds of decision methods. One is based on the idea of the inclusion degree, by calculating the inclusion degree between the interval value or point value of each attribute and the corresponding feasible interval. The biggest one among these weighted averages of the inclusion degrees for all the attributes is the optimal scheme. The other is based on the idea of similarity. The feasible intervals are seen as the ideal intervals, by calculating the relational degree of interval number between the interval value of each attribute and the feasible intervals. The biggest one among these relational degrees is the optimal scheme. In this paper, an example shows that the two methods get the same conclusion.
    • Show Sections

      Hide Sections

      This study is a productivity review on the literature gleaned from web of science databases concerning culture research in knowledge sharing. The result indicates that the number of literature productions on this topic is growing in recently 4 years, reaching max in 2007. The main research development country is UAS following by Taiwan, and from the analysis of the distribution of language, English is the most popular language. Moreover the research methodology is empirical study and research focuses touch upon industry, education, emergency management, police investigation, etc. Also the limitations and future research are discussed, so that the direction for future research work can be explored.
    • Show Sections

      Hide Sections

      To research the dynamics mechanism for knowledge acquisition via E-Learning of SNS oriented enterprise knowledge community in enterprise. Firstly, elements of knowledge acquisition via E-Learning of SNS oriented enterprise community were analyzed in- depth. Secondly, causal loop diagrams were made to make system analysis. Thirdly system dynamics model were established to describe development and changes of knowledge acquisition by modeling tools. Sensitivity analysis were made to explore the influences of parameters including, network size, E-Learning experience, knowledge demand and knowledge acquisition cost. By using system dynamics and sensitivity analysis, we can exploit the dynamic mechanism of knowledge acquisition via E-Learning of SNS oriented knowledge community in enterprise, so that strategy for knowledge community management can be proposed accordingly.
    • Show Sections

      Hide Sections

      Country by borrowing to increase investment in agriculture, which accelerate the development of the rural economy is important, but the first country debt has played a positive role in the same time has become a major socio-economic problems, this paper analyzes the social harm of rural debt, proposed to resolve the response of rural debt, hoping to provide for rural economic development reference observations
    • Show Sections

      Hide Sections

      This paper focuses on how to use set of analysis of multiple data streams to compare the relative trend analysis. Study, the main task consists of two parts, namely: data stream between the two trends and comparative analysis of multiple data streams, a comparative analysis of trends. Set of requirements for analytical methods for analysis of the set of related concepts and theories in the field of application-specific knowledge combined with its concept of a clear and specific definition. Finally, the introduction of multi-streams of a comparative analysis of trends between the two special algorithms for the analysis of multiple data streams with strong potential with the potential or with anti-relationship between the data flow.
    • Show Sections

      Hide Sections

      State promulgated the “long-term reform and development outline,”: 2020, pre-school education will be universal. In past two years, the Department of Education has issued a series of pre-school New Deal. If this new deal will impact and change our current status of pre-diverse school system, has aroused widespread concern. This paper reviews the diverse pre-school development process, our wide range of problems in school, and the corresponding countermeasures and suggestions to arouse the government on a wide range of pre-school understanding and support in order to facilitate promotion of our wide range of pre-school education development.
    • Show Sections

      Hide Sections

      This paper analyses data characteristics and storage requirements of E-Commerce System, finds that how to control the data storage has become an important security problem and summarizes technological characteristics, key technologies and implementation models of the current distributed data protection. Although the current research shows that using control concept and model apply to such problems, but its implementation mechanism research is still in the initial stage. This paper puts forward a kind of trusted computing-based distributed data protection technology, which provides a reference for the development of distributed data protection.
    • Show Sections

      Hide Sections

      This paper proposes an integrated methodology and its solution for logistics supplier selection problem. Logistics supplier selection is a multiple-criteria decision-making (MCDM) problem. This paper is aimed to present a intuitionistic fuzzy decision-making approach to deal with the supplier selection problem in supply chain system. First, we analyzed the factors for selecting logistics supplier based on some related literature. Second, we given the concept of intuitionistic fuzzy sets, defined the distance between two intuitionistic Fuzzy Sets, and proposed a new approach based on intuitionistic fuzzy TOPSIS to deal with logistics supplier selection problem. Finally, an example of a selection problem of supplier was used to illustrate the proposed approach.
    • Show Sections

      Hide Sections

      This paper researches and explores the theory and method of ontology. First, the method for structuring ontology about some domains by using the ontology of the knowledge library of the existing domain is proposed. Second, a possibility of new domain ontology is researched by fully using the semantic relevance between domain knowledge model and domain ontology, in the term of semantic match. Finally, the scheme is proved reasonable and valid by concrete tests and analysis.
    • Show Sections

      Hide Sections

      With the rapid development of remote sensing technology, more and more remote sensing image processing applications were developed. However, most of the legacy applications can only execute on the local host. In this paper, we proposed an approach to encapsulate and publish the legacy DLLs based on Web service. Through our published platform, users can experience each kind of image processing results online and decide which one is most suitable for them. As long as the DLL owners shared their applications, end users can upload image files to the platform and start the image processing. The platform provides an opportunity for the DLL owners to advocate and demonstrate their special programs; in the meantime it also provides more and better choices for end users.
    • Show Sections

      Hide Sections

      Environmental monitoring is required for understanding various kinds of phenomena and preventing natural disasters. Geosensor networks are employed for detecting environmental precursor conditions, context models for understanding phenomena, and computing technology for processing large volumes of data in real-time. In this paper, we present an SSI (Self-Adjusting Sampling Intervals), which is a scenario-based control mechanism for adjusting the sampling interval in a centralized system. We demonstrate SSI on behalf of an air quality monitoring systems; here, the sampling interval is changed based on the context of derived dangerous levels of air pollution. Whenever the level is low, sampling intervals are extended. It allows reducing collected observed data effectively and thus, save geosensor energy.
    • Show Sections

      Hide Sections

      Dairy product industry usually called sunrise industry is one of food industry of fast development speed and strong competitive power. Now the competitive presses coming from home and abroad are strong, and industry production technique homogeneity is high and demands to the information are very urgent. Under this environment adapting integrated management mode which taking processing enterprises as core conforms to the request of the times, and also meet the product features. Under this mode the downstream supply chain integration is by ways of “company+peasants”, “company+base+peasants” and “company+base+peasants'. The upstream supply chain is integrated by ways of “direct selling”, “network marketing” and modern “distribution”. This arrangement make the cooperative relationship among the not organization in supply chain more stable and also make them get more benefits.
    • Show Sections

      Hide Sections

      ELong.com, a Chinese travel e-commerce company to provide consumers with accurate travel-related information and high quality travel booking services, was built in May 1999. Now, ELong.com has been one of the most famous brands of travel e-commerce enterprises in China. This paper analyzes the running model of eLong.com comprehensively from the perspective of technology, management, capital, operation and cooperation. Based on the analysis and the case study, this paper attempts to unveil the application model of e-commerce and investigate how the ecommerce application influences the firm's growth in travel enterprises.
    • Show Sections

      Hide Sections

      In order to find out the better approach of safety management and main reasons of the boiler accident, we apply Pareto chart, one principle of the managements, to this analysis and research in which case we divided the accident potential into 9 phases: working conditions in low water, operate miss, poor maintenance, and burner damage and so on. Minitab software is used to analyze the reason of American steam boiler accidents, power boilers' and hot-water boilers' in 2007. The study shows that 80 percent of boilers accidents are caused by operate miss, poor maintenance and working conditions in low water. By controlling those accident potential effectively which obviously are the major reasons of the boiler accident, safety in production can be realized in an optimal state without any increase in safety input.
    • Show Sections

      Hide Sections

      In order to obtain competitive advantage as a strategic alliance system evolution or development direction, the coordination mechanism for strategic alliance is researched based on dynamic analysis from the perspective of self-organization. The networks of strategic alliances of industrial technology innovation mainly component by the core business, universities and research institutes, intermediary services organizations, professional marketing, business service centers, technical service platform. Coordination mechanisms of knowledge, technological innovation, the interests and relationship constitute a system of four-dimensional coordination mechanism for competitive advantage of strategic alliance. The alliance's competitive advantage also makes this four mechanisms upgrading and improvement, which is a benign cycle. In order to achieve coordination mechanisms of a strategic alliance, it is necessary to establish cooperative relations, and cooperation channels and informal networks of innovation among the alliance organizations.
    • Show Sections

      Hide Sections

      International supply chain security has gained great concerns from both customs and companies since Sept. 11, 2001. Now ten years have passed, most of initiatives enhancing supply chain security are emphasized in physical layer which is addressed in transporting cargos. The standards for supply chain security in information layer, which refers to communications between companies' information systems, are in preliminary stage. Because of the prevalence of Internet threats and viruses, especially in business information systems, the security of information communication in the supply chain has aroused wide concern in recent years. In this paper, the authors firstly introduce the present famous initiatives facilitating trades in different areas in the world. Then Draft NISTIR 7622 and the ISO new plan are described in detail based on the theoretical frameworks. Furthermore, the authors give the recommendations for enhancing the Information Communication Technology Supply Chain Security in China after analyzing Chinese distinctive Supply Chain Security problems compared to the US. These analysis and recommendation may not only be helpful to the undergoing Supply Chain Security work in China, but provide insights for related Supply Chain Security studies in other developing countries.
    • Show Sections

      Hide Sections

      In this paper, according to the distance between the two refineries on the same side of the railway and their distance from the railway, this paper gives out the design of the lest cost on laying pipelines, considering the cost of shared pipeline and non-shared ones is same or not. Considering the different cost of laying pipelines between urban and suburban, we establish a more realistic model and a multi-objective optimization model.
    • Show Sections

      Hide Sections

      In this paper, the designing thought of a parameter-driven teaching platform of ERP electronic sand table is introduced that established by Web Service technology under the network environment. At the same time, the architecture and main flow of this platform are described in detail.
    • Show Sections

      Hide Sections

      Favorable planed management is the base of software project succeed. In this piece aim at the present situation of software project management, comprehensive use the thought of software engineering and project management, explore process and method of project schedule planning control. On the base of analysis software project schedule planning control, put forward control mode of dynamic loop and process of closed cycle ceaseless operation, and express scheduled planning control flow through graph; through research on three key indicators and four evaluation indicators based on control method of earned value management, research based on the control method of PSP through the way of combinative graph and form. This paper studies the successful application of content; it can change insufficient plan in software project management process, the phenomenon of control adverse, improve comprehensive management ability and competitive power of project, creating Value for software company, improve high quality service for user.
    • Show Sections

      Hide Sections

      Operation of cascade hydroelectric stations is complex. Many dynamic factors such as cross-time, multi-constraint, multi-objective affect the optimal scheduling. An intelligent management information system is necessary to hydroelectric stations. And, software architecture is very important to intelligent management information system. This paper proposes an intelligent management information system model in software architecture aspect, which uses web-service for user, uses ontology for knowledge representation and uses agent for component. As circumstance of cascade hydroelectric stations are local changed, all information of the system is modified automatically by agents and new operation design is made based on ontology quickly. The system is developed in JADE and evaluated with Qinyijiang river data. The result shows that, the software architecture can meet cascade hydroelectric stations' operation better and help cascade hydroelectric stations getting optimal operation more efficiently. Furthermore, it contributes to optimize other MIS architectures of cascade hydroelectric stations.
    • Show Sections

      Hide Sections

      Ubiquitous learning has provided a broad and free learning environment for college students learning English. The ubiquitous English learning resources are the keystone in ubiquitous English learning environment. English learning resources must be allocated rationally by effectively using ubiquitous network technology. This essay puts forwards the idea of constructing the nationwide college English learning intelligence resources center, which has a positive meaning of improving the college teaching quality.
    • Show Sections

      Hide Sections

      To develop nautical education, according to the requirements of STCW78/10 Convention, taking account of the characteristics of seafarer assessment, combining with the development of E-Learning, the design scheme of seafarer assessment system based on E-Learning is proposed and preliminarily implemented in the paper by adopting the test paper generating scheme that is designed by region randomized algorithms. The trial results indicate that this system can satisfy the requirements of STCW78/10 Convention, make it easy for seafarer to engage in E-Learning and self-testing, and achieve the effective integration between E-Learning and nautical education.
    • Show Sections

      Hide Sections

      With the increasingly drastic competition in the consumer market, keeping loyal consumers has become the most important strategy for many business managers. This paper takes the “Daofeng Bookstore” for example, by AHP (Analytic Hierarchy Process) method, using the results of interviews and questionnaires as data source, construct an index system of consumer loyalty evaluation and index weight. Furthermore, on this basis, utilizing the results of investigation calculated and validated the hierarchical model which shows fine. The results of this paper will provide a theoretical basis as well as practical reference for the customer loyalty management of bookstore and also have a practical significance and promotional value.
    • Show Sections

      Hide Sections

      This use of literature, research methods, from the Chinese culture, “Silence” a big reality a study, and the phenomenon of Chinese literary theory outlined aphasia, cultural analysis and reflection on the causes. Concluded that: the Chinese culture, “aphasia” phenomenon worthy of our awareness, reflection, Chinese martial arts can gain such a strategy on cultural identity revelation: Chinese martial arts need to make their voices heard, to have its own set of language system; to work with all nation's fine cultural dialogue, and actively respond to cultural globalization; Chinese martial arts is needed to examine, not misunderstanding, should not nostalgic. The only way to make the martial arts world better get a person's identity, and on behalf of Chinese culture played its strongest voice of national sports culture.
    • Show Sections

      Hide Sections

      The paper first introduces the definition and necessity of the audit of e-commerce system, rolling out a detailed description about its coverage; then discusses the indexes, measures and implementation steps, presenting a full range of risks to enterprise managers for their adequate preparation for ecommerce activities.
    • Show Sections

      Hide Sections

      Enterprise practice and research indicate that interface management has a huge influence on enterprise's innovative performance. Based on the theory literatures, this paper brings forward a conceptual model of the impact of interface effectiveness on enterprise performance, carries on an exploratory empirical study on some large and medium sized enterprises in Dalian, verifies this model within certain range, and reveals that interface management combining with enterprise strategy and the marketplace environment can bring an efficacy into play.
    • Show Sections

      Hide Sections

      With the development of economic globalization and net economy, social capital becomes the first important factor for enterprise development and progress in the 21st century. This paper analyzes the relation structure in economic society, indicates the fact that social network analysis plays very important role in economic decision-making. We take the transmission of news as an example to illustrate the important function of central nodes during innovation diffusion and enterprise reform. The research shows that delve into social networks in the economic system, as well as take full advantage of the incomplete information to construct a relative complete relation structure as the enterprises decision foundation, are good to effectively promote the enterprise development and progress.
    • Show Sections

      Hide Sections

      In this paper, we research on how to distinguish activating point of contingency plan in disruption events. An activating point identification method based on Rough Sets (RS) and Support Vector Machine (SVM) is proposed. Firstly, according to the supply chain links affected by disruptive events, we take vulnerability of several nodes as recognition indexes of activating point; then, we construct the recognition model based on RS and SVM; finally, we select index data of historical disruption events to input the support vector machine to recognize four typical disruptive events. The results show that the activating point recognition of contingency plan is crucial to controlling the impact and costs of emergency events on supply chain.
    • Show Sections

      Hide Sections

      A model of military operation plans (OP) based on ontology for intelligent entities of Computer Generated Forces to support decision-making is presented. Firstly, current researches about ontology-based OP modeling in military are analyzed. The formalization with description logic of the OP ontology is defined to a five tuples including concepts, relations, functions, axioms and instances. The ontology meta-model of the OP model with UML is advanced, and the concepts, attributes, relationships and axioms of the ontology are analyzed. We create an OP ontology of an surface confronting an aircraft formation as examples using protégé finally.
    • Show Sections

      Hide Sections

      Water is one of the most critical factors of maintaining and improving ecology environment, retaining ecological balance, at the same time it is also the important supporter for energy flow and substance flow in city ecology system. The reasonable measurement of substance quantity and value quantity of city in restraining water source is also the important basis of green GDP calculation; it is also the important basis to realize ecology civilization and sustainable development of city. Currently, there are fewer research of calculation methods for substance quantity and value quantity for restraining water source of urban greenbelt, it has not formed assessment calculation method with popular meaning, comparatively uniform, suitable for water conservation suitable for urban greenbelt, this article will develop discussion and propose the corresponding suggestion and calculation method, provide lesson and reference to scenically and reasonably carry out the effective calculation and management optimization of water conservation in urban greenbelt.
    • Show Sections

      Hide Sections

      Providing the efficient financing channel between capital-constraint small-medium enterprise (SME) and finance institute is one of the important aspects of the supply chain financing. Risk control of financing for SME is crucial for finance institute. Meanwhile, order-lead time also plays important role in SCM. Based on the considerations, the paper extends the optimal order quantity and order time of traditional newsvendor model with comprehensive capital constraint and risk control and time-sensitive factors. Further, the paper analyzes the equilibrium and the best response function of the loan rate and the owned capital via numeric example. It proves the intuitive fact that higher salvage value or lower holding cost leads to less loan rate and less owned capital. Last, the paper points out the mathematical- analysis direction for future research.
    • Show Sections

      Hide Sections

      Considering characteristics of dynamic backhaul problem in B2C Electronic Commerce, the paper converted this problem to special static backhaul problem and constructed corresponding mathematical model. It used time division adaptive method to solve dynamic backhaul problem and designed a two-stage algorithm. In the first stage, it used adaptive memory programming algorithm to solve static backhaul problem at the end of each sub-time interval. In the second stage, it used saving insert algorithm based on evaluation to insert the new appeared pickup demand points into the later routes of all vehicles' key points at the given time. It used local optimal method to optimize the later routes. Altered data of relevant paper was used to emulate experiments. Experiment results proved rationality of the given model and effectiveness of the algorithm.
    • Show Sections

      Hide Sections

      This article from the university to create learning the meaning of party starting on colleges and universities how to create a learning party about a few ways to own humble opinion, that the party of universities in creating a learning process, learning to build long-term education mechanisms, innovative forms of learning and carrier, and create a standard evaluation system, and actively play the role of public opinion and propaganda to make universities Dang Zuzhi in the process of creating a learning party full of vigor and vitality, as the school's construction and development play an exemplary role.
    • Show Sections

      Hide Sections

      Manufacturing Execution Systems (MES) are the core of an automated petrochemical enterprise supply chain management system. The main elements of MES are sensors and instrumentation, regulatory and advanced process control, real-time process optimization, blending and oil movements and storage and lab information system. Potential benefits of MES are discussed.
    • Show Sections

      Hide Sections

      Tourist is the strategic resource of tourist industry because the loyalty and reputation of tourist is very important to the healthy development of the tourism industry. This paper introduces the psychological contract into the tourist industry of Qinhuangdao, discusses the influence of tourist perceived value on the psychological contract by constructing a psychological contract influence mechanism model, points out the problems in Qinhuangdao tourist industry and puts forward solve strategies based on improving tourist perceived value then establishes a stable psychological contract between tourist and the Qinhuangdao municipal government. It can help Qinhuangdao to get the trust and loyalty of tourist.
    • Show Sections

      Hide Sections

      Loyal customers provide firms with a consistent source of revenue and cost reduction, which leads to increased profits. In this case, managers pay more and more attention to online customer perceived value. They use various methods to improve online customer loyalty and to maintain them. Beginning with the basic theory of online customer loyalty, this paper lists out the impact factors of online customer loyalty and its measure standards. In order to finding out ways to improving customer loyalty, the paper analysis the successful case of Taobao. Through the example, the paper comes up with the five capital ways to improve online customer loyalty, such as strengthening communication with customers, effectively meeting customer needs, enhancing customer satisfaction and so on.
    • Show Sections

      Hide Sections

      The paper aims at establishing a new software reliability model, and using two data sets to verify the software reliability model. In the testing process, test coverage, debugging time lag are important elements which effect the software reliability. The paper introduces the two elements, and establishes a new model by considering test coverage and debugging time lag. The final numerical examples show that this new model has a better estimated effect.
    • Show Sections

      Hide Sections

      With the social reforms and accelerate the development and deepening of reform of higher education, especially in recent years, most colleges and universities began to implement the credit system, the traditional concept of higher education in the education, professional settings, training goals and methods, and ideas for college students, group composition, individual learning, the pursuit of life goals such great changes have taken place. We must continue to think and explore new mechanisms for student work force, the establishment of ideological and political education, the training base, focusing on counselor and teacher selection, training, exercise, practice and other key aspects of student work force to further strengthen the political right direction, a strong sense of social responsibility and historic mission, improve the overall ability to work and level of expertise and to build a combination of both ability and integrity, multi-skill work force of students.
    • Show Sections

      Hide Sections

      From listed companies in China's home appliance industry of 2010, based on the financial indicators, It is starting to build a scientific and rational system of performance evaluation of listed companies. Using the factor analysis on 22 appliance listed companies to empirical analysis, which come to a comprehensive evaluation and analysis results. It is important to determine the competitiveness of companies for business managers and investors.
    • Show Sections

      Hide Sections

      Revenue sharing in the supply chain containing one manufacturer and N competing retailers was researched under the basic Cournot oligopoly model. Based on presenting the equilibrium price, output and profits when supply chain members come to an agreement, in the case of different combinations among competitive retailers, how the unit production cost of the manufacturer to affect allocation policy in members of the supply chain was discussed. And the approach of finding out the optimal allocation strategy was obtained. The results were that the manufacturer in the core of supply chain should make an appropriate cost planning to ensure the expected revenue of each member in the supply chain.
    • Show Sections

      Hide Sections

      With the rapid development of network technology, network-based exam has become an important feature of the modern examination, Proposed to build an open network of Web-based test platform. And on this basis, the use of new Web technologies: Use SQLserver2005 and Visual Studio. NET as a development tool, As a web server with IIS6.0, the examination system to achieve.
    • Show Sections

      Hide Sections

      Currently teaching resource library there are many problems and shortcomings, is not conducive to the teaching resource library construction and use. In order to really make use of resources in teaching and learning, truly reflects the value of resources. In this paper, with e-commerce model in building a quality teaching resource library, by the way they operate to achieve a large library of teaching resources sharing, high utilization and high participation, avoid duplication and analyze the feasibility and implementation modalities.
    • Show Sections

      Hide Sections

      Objective: To investigate the status of psychological stress of female college students. Methods: 622 female college students in Henan Institute of Science and Technology were investigated by using the self-designed “female college students' Psychological Stress Questionnaire”. Results: Psychological stress from high to low is personal development, academic stress, economic stress, physical and mental image stress, health stress, others, stress from family relations and friends and family misfortune, environmental stress, interpersonal stress, stress from opposite sex and love; the stress of arts students is the largest, followed by agricultural students, and then, female students in Polytechnic, Economics and Management, Arts; stress from large to small is rural students, students from towns, students from cities; students with minimum stress are from cadre families, followed by the working families, and other types endure maximum stress; as the grade increased, stress of female college students also increased linearly, the 9 types of stress except for overall stress, physical and mental image stress have significant grade differences (P<0.05). Conclusions: Female students face many sided stress, which needs to relieve in many ways. It is necessary to give more care and guidance to girl groups with greater stress such as higher grade girls, rural girls, liberal arts girls, single-parent families, combination family girls.
    • Show Sections

      Hide Sections

      Through the analysis of GPS nature and function, we proposed the question of how to use the measurement method of GPS for high-altitude wind, and discussed how to establish measurement station of GPS altitude element.
    • Show Sections

      Hide Sections

      With the development of communication technology, computer science, image compression, and other modem information technologies. ADSL system for domestic use becomes a possibility; it brings about social progress while enabling people to communicate with each other more easily. This article expounds the composition ills well as features of ADSL. and explores the key technologies and methodologies of ADSL system for domestic use.
    • Show Sections

      Hide Sections

      In this paper, “Modern Educational Technology” course in The production of multimedia courseware to Flash design and development, for example, instructional design and programming from two dimensions to display Flash multimedia courseware design and development of ideas.
    • Show Sections

      Hide Sections

      Researchers put forward many knowledge representation methods according to specific problems for different domain. These methods according to their respective domain problem has different characteristic, each has its own strong points, suitable for different questions. This paper is research on a knowledge representation method based on matter-element. Through the analysis of organizational knowledge system, the paper puts forward the related theory of knowledge set, and with the matter-element theory gives the extension representation and the correlation analysis of knowledge set.
    • Show Sections

      Hide Sections

      At present, studies on evaluation of regional logistics system are inclined to care more about the results but the corresponding processes, which makes the related departments not well recognize the main problems in operation and causes some mistaken decisions. The research aims to propose a simple, intuitive method of diagnosis for regional logistics system. Through analyzing literature of system theory and operation, the study made clear three levels of connotation of regional logistics system diagnosis. On this basis, a diagnosis index system was presented. An improved radar chart was developed to calculate the barycenter and monitor the indices. Through the “analysis of barycenter offset” to the “analysis of indices smooth” , the method can reach a diagnosis from shallow to deep for regional logistics system .Finally, a simple example was given to illustrate the feasibility of the method.
    • Show Sections

      Hide Sections

      Based on the efficient co-op advertising between a manufacturer and a retailer, Rubinstein Bargaining Model is applied to discuss distribution of the joint profit in supply chain between the manufacturer and the retailer in consideration of the influence of bargaining capability by discount rate and breakdown risk. And the paper also presents how discount rate and breakdown risk affect the final distribution of the joint profit in supply chain between the manufacturer and the retailer. In view of the manufacturer, its power of bargaining reduces with increase of its discount rate or breakdown risk, while increases with the retailer' discount rate or breakdown risk increasing.
    • Show Sections

      Hide Sections

      The stock investment is one of the most common forms on capital investment, and short-term investment is effective for improving income. The paper, using hierarchy analytical technology, structures the factors which influences the investment, and forms the primary elements for AHP(the Analytical Hierarchy Process),then quantifies the short-term investment elements, finally realizes the effective decision making for short-term investment.

Sorry! You do not have access to this content. For assistance or to subscribe, please contact us:

  • TELEPHONE: 1-800-843-2763 (Toll-free in the USA)
  • EMAIL: asmedigitalcollection@asme.org
Sign In