0

International Conference on Computer Technology and Development, 3rd (ICCTD 2011)

  • Author(s)/Editor(s):
  • Published:
    2011
  • DOI:
    10.1115/1.859919
Description | Details

Proceedings of the 3rd International Conference on Computer Technology and Development (ICCTD 2011) held in Chengdu, China during November 25–27, 2011. The aim objective of ICCTD 2011 is to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results and development activities in Computer Technology and Development . This conference provides opportunities for the delegates to exchange new ideas and application experiences face to face, to establish business or research relations and to find global partners for future collaboration.

  • Copyright:
    All rights reserved. Printed in the United States of America. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher. ©  2011  ASME
  • ISBN:
    9780791859919
  • No. of Pages:
    2000
  • Order No.:
    859919
Front Matter PUBLIC ACCESS
PDF
  • Session 1 Computer Technology And Development

    • Show Sections

      Hide Sections

      To satisfy users' rapidly increasing demand for data storage, high performance storage architectures are being developed. This paper proposes a design of server platform equipped with IP storage capability based on Multi-core network processors. Running the iSCSI protocol, the server actually works as an iSCSI initiator when exchanging data with an IP-based storage area network, known as IP-SAN. To evaluate I/O performance of this platform's storage service, an Intel X86 based multicore server is used as a contrast. According to test results, this multi-core network processor based server platform exhibits good storage I/O performance.
    • Show Sections

      Hide Sections

      This article mainly introduces WinAC controller composed process control system and fully elaborate the system structure. Hardware configuration and process control program are realized by application of STEP7 software. This system integrates the merits of PLC and PC and possess high reliability, simple maintainance, expansibility, convenience ot re-development.
    • Show Sections

      Hide Sections

      This study attempts to clarify the evolution of innovation models in the context of information and communication technology (ITC) development. The frameworks developed for understanding the process of innovation consist of several major patterns in chronological order. From the 1970s, the transition of innovation models corresponds well with the development of ICT. This correspondence is essentially due to time effects, space effects and dematerialization effects induced by the ICT.
    • Show Sections

      Hide Sections

      With the development and maturation of the digital multi-media technology, digital multi-media copyright protection has become the hot spots. It thoroughly studies and discusses the application of the digital watermarking in multi-media copyright protection. According to the general framework of the watermarking, it has put forward the new method for protecting the multimedia products such as digital video and the digital image. It proposed the scheme and methods for the digital copyright's application. The results shows the new methods is feasibility and higher efficiency.
    • Show Sections

      Hide Sections

      Nowadays the computer crime has increased year by year around world due to the rapid development of computer technology. Consequently computer forensics has aroused wide attentions from scientists and government officials. In order to collect digital evidences which are supposed to be present in courts and maintain the integrality of evidence chain, crime scene protection is treated to be the critical factor during the computer forensics. This paper provides the foundation approach for initial computer scene investigation, outlines collection, documentation and electronic evidence storage.
    • Show Sections

      Hide Sections

      As the automated control systems have been applied to various aspects of everyday life including industrial control, oil mining, building automation and traffic scheduling, the strong flexibility and the high real-time performance of modern SCADA (Supervisory Control and Data acquisition) systems, especially their core — real-time databases, are in urgent need. In this paper, a practical architecture of the distributed real-time main-memory database is proposed, with the help of which, a modern SCADA system would be flexible enough to configure differently for different application, while still easily meet the requirements of the rigid time constraints.
    • Show Sections

      Hide Sections

      The speech signal is a complicated function influenced by factors such as the speaker, environment, etc. The artificial neural network (ANN) model carries on speech recognition with characteristics such as self-adaptation self-organization and self-imagination, suitable for speech recognition. This paper mainly studies the improvement scheme of traditional BP neural network in speech recognition. By making use of the scheme after improving, it can simplify network structure, accelerate operation, and shorten the training time.
    • Show Sections

      Hide Sections

      Internet technology is applied in daily life more and more extensively, thus, the corresponding security problems relating with internet are more and more serious. The attack to the web is now mainly from service software nowadays instead of WWW system structure. In this article, web service software and its threat to the security environment of the host computer are discussed, and the correct researching method to the problems pointed out above are presented.
    • Show Sections

      Hide Sections

      Taking university digital library as a case, this paper first constructs the model of services selection centering on the multi-objective features of library knowledge services selection. Next, it proposes the solution principle of the model based on the Genetic Algorithm. At last, with the help of Matlab Genetic Algorithm toolbox, it analyses and researches an example. This model can be used for reference and guidance for solving the problems of multi-objective knowledge services selection.
    • Show Sections

      Hide Sections

      This paper presents a survey on the Hop-constrained Shortest Path (HSP) problem. And a modified algorithm is proposed by analyzing the features of the optimal solution of the HSP problem. We apply bidirectional breadth-first search strategy to this algorithm, and try to reduce the number of vertices and edges involved in the computational process so as to reduce computing time. And the experimental results show the effectiveness of the proposed algorithm for large-scale network with fewer hops (around 6).
  • Session 2 Computer Technology and Development

    • Show Sections

      Hide Sections

      In this paper, The Dirichlet problem for a localized nonlinear equation ut−Δum = a(x)up(0,t)+b(x)uq(x,t) is investigated. In the case of p>q ≥ m, It is proved that the solutions have a global blow-up and the rate of blow-up is uniform in all compact subsets of the domain.
    • Show Sections

      Hide Sections

      The main results of this paper are the following: A sort of three-dimensional Hopf manifold is constructed by applications of linear matrix cyclic group action on Kähler manifold; A method which could be calculated the holomorphic automorphism groups of the three-dimensional Hopf manifold is provided by means of several complex holomorphic function and universal covering theory.
    • Show Sections

      Hide Sections

      Recently, there is an increasing concern about the research of the non-functional demand in the interactive system, and in many cases the emotional factors can decide other non-functional demands. Emotional factors must be considered in a successful interactive system as well as the traditional usability. This paper argues that the relationship between emotion and interactive design is mainly reflected in three aspects: layout and color in an interface; design and use metaphor; interactive method, and accordingly puts forward the corresponding principles of human-computer interaction design.
    • Show Sections

      Hide Sections

      Applied fuzzy inference theory to expert system is designed in the paper against the problems of grid fault uncertainties. Through information rationality of expert system judgment and reasoning faculty of fuzzy comprehensive judgment combined with fault information and uncertainty elements, used multilevel fuzzy comprehensive judgment's inference engine of the most reasonable fault situation .It is valuable in project application.
    • Show Sections

      Hide Sections

      In recent years, blog has gradually become a new form of mainstream media networks,it has become an important channel for people to obtain information.In paper, by analyzed the feature of the Blog, it proposed an opinionretrieval method based on the Blog, and developeda polarity detectionalgorithm based on Negative rule to improve the performance of polarity detection part. The experimental results prove the validity of the method,Itimproves the MAP values of the system.
    • Show Sections

      Hide Sections

      An algorithm for computing discrete singular points of an algebraic surface is proposed based on divide and conquer subdivision technique and interval arithmetic. The algorithm guarantee to find all discrete singular points of an algebraic surface with any degree in any given cuboid within any given precision that is allowed by machine precision limit.
    • Show Sections

      Hide Sections

      In this paper we present a multimodal biometric system based on ECG and Palmprint biometrics. In the proposed system we used MFCC approach in order to extract features of ECG biometric and PCA due to extract features of Palmprint. After feature extraction as illustrated by the portions given in this document.
    • Show Sections

      Hide Sections

      Influence of information technology on enterprises and the done development of this ground has caused that there have been software and information systems in the most enterprises having designed the base of enterprise activity on the basis of them. But most of the used application are designed and developed by different companies and have various technologies and platforms and in actually not designed for relation with each other. Interoperability between applications of the enterprise and integration between them have been in the most important needs of the enterprise and purpose developers application. With appearance of the Service Oriented Architecture (SOA) a new approach was created in the world of software which provides possibility of implementing Enterprise Application Integration (EAI) with removing the privious limitations and defects without depending on the used platform and technology. In this essay considered the methods based of the SOA for integrating the applications and also mechanisms of transferring legacy systems to the SOA is described.
  • Session 3 Computer Technology and Development

    • Show Sections

      Hide Sections

      The network intrusion detection system is based on the mechanism capturing network packets. Libpcap is one of the most popular packet capture library of the Linux operating system. In this paper, the working mechanism of Libpcap based on the Linux platform is analyzed in detail. In addition, building the experiment environment to test the performance of the typical multi-core MIPS network processor platform and multi-core X86 processor platform in high-speed network environment when capturing packets by Libpcap, finally come to obtain and analyze results of the test.
    • Show Sections

      Hide Sections

      The propitious culture in the architectural ornaments of traditional China mostly presents by the form of patterns, and is one important part of the Chinese traditional decorative arts. It is being beautified the Chinese traditional architectures, is the radiant jewelry in the traditional construction, also is the outstanding inheritance of the national culture. The propitious patterns design has the unique artistic expressive force by its profound meaning. In this paper the production of the propitious idea, design category of the propitious patterns, and the characteristic of the propitious patterns are described and studied in detail.
    • Show Sections

      Hide Sections

      This paper presents a survey of evolutionary approach for Clustering and how Genetic Algorithm is applied to different problem domains in the field of Information Retrieval. The paper is original in two main aspects first it gives an overview of evolutionary approach for clustering and information retrieval and second it suggests a novel evolutionary approach which serves both the areas of Clustering and Information Retrieval by developing a single Genetic Algorithm. Conventional clustering algorithms are sensitive to the choice of cluster center. Such a partition is insufficient to represent many real situations. To improve the performance of clustering algorithm, Genetic Algorithms is applied to clustering algorithms. Genetic Algorithms are robust in searching a multidimensional space to find optimal solution. This paper tries to reflect the research profile of this area by focusing more on how Evolutionary Algorithms can effectively work in forming clusters and improving retrieval performance.
    • Show Sections

      Hide Sections

      New possibilities in information technology and new challenges, in the higher education concept and method of stimulation earlier in computer system change in higher education based on process. As a contribution to these activities, this paper attempts to virtual classroom in the process evaluation results in the past ten years, to outline a concept for the next research direction in the future. The authors cited, and consider the new requirements and the trend of the solution to the problem of higher education project for the center. The following the change of the concept and related new and implementation method are introduced in this paper. Finally, solve the problem of the higher education for the center for the changed style draw engineering.
    • Show Sections

      Hide Sections

      The paper reports a study on computer and web-based college English teaching model based on questionnaire data. The subjects involved in the study were 124 second grade college students from Northwestern Polytechnical University. It is found out that most students are satisfied with the new teaching model. At the same time, they think the new teaching model needs improving and they suggested ways to improve it.
    • Show Sections

      Hide Sections

      The SGA (Simple Genetic Algorithm) depends on many factors and the two most important ones are Crossover Probability and Mutation Probability. In a successful run of SGA, the average fitness of the population after mating is better than the initial average fitness i.e. fnew>finit Where fnew is average fitness after mating and finit is average fitness before mating. The average fitness is defined as the average of fitness of chromosomes in the mating pool. The chromosomes are implemented as bit strings (i.e. 1001). These bit strings are represented using integers.The performance of SGA is evaluated in this paper by varying the crossover probability and mutation probability. The results are compared with the usual SGA.
    • Show Sections

      Hide Sections

      In order to measure the height of exploding object at low-altitude, a location method based on computer vision is proposed. A camera, with its intrinsic parameters calibrated beforehand, is used to take a picture of the exploding light and two point patterns. The two point patterns are used to calibrate the extrinsic parameters of the camera. Centroid method is applied to extract the centre of exploding light and the patterns in the image. The distance from the exploding position to camera is measured on the time difference of arrival of the sound and light generated by the explosion. Then the exploding position is determined on monocular vision principle. Experiment results show that the method has good accuracy and it is simple and convenient.
    • Show Sections

      Hide Sections

      This paper sets forth on the development and evolution of the pattern designs in the Tang Dynasty. In addition, it expatiates on the necessary relationship between the pattern designs and the Chinese modern landscape designs, taking the modern landscape designs as its carrier. It explains at some length the pattern designs in the Tang Dynasty' application as well as influences on the modern landscape designs. This paper takes the pattern designs in the Tang Dynasty as the breakthrough point, and takes the landscape designs as the research area. In this way, it expounds on the intercommunity and the adoptability of arts. Taking factual theory as the reality basis, this paper makes a conclusion through the field research. Meaningful exploration on the application of the art of pattern designs in the Tang Dynasty into the modern landscape designs are set foot in.
    • Show Sections

      Hide Sections

      Machine Readable Dictionaries (MRDs) provide a convenient and efficient base for systems that process natural languages. The contents in MRDs are vast and semantically linked in many ways. As new words are introduced or if semantics of existing words are altered in natural languages it becomes necessary to update the MRDs as well, to facilitate the natural language processing systems working on them. An automated system for enhancement of MRDs is a tedious task keeping in mind the vast vocabulary and word base in natural languages. This paper addresses these issues and discusses the various parameters that can assist in automating the process of enhancing a given MRD for English language.
    • Show Sections

      Hide Sections

      The teachers, who are newly employed by higher vocational colleges, are a preparation force for these schools to attain developments and expansions in the future, and also are a main force to train the high quality application-oriented talents. In this paper, the author makes the need plan through the analysis on the characteristics of newly-employed teachers and talent cultivation of higher vocational colleges, and then puts forward the training models of professional skills of the new-employed teachers of higher vocational colleges based on the PDCA cycle.
  • Session 4 Computer Technology and Development

    • Show Sections

      Hide Sections

      Almost 25% of the directors in a sample of 118 A-share companies in the Shanghai Stock Exchange IPO from 2003 to 2008 have government background. These bureaucrat directors have great influence in the state-owned listed companies. They usually play the role of government, reducing the board's professionality. Besides, they often put the political and social objectives upon the companies' profit target, making companies bear more social responsibility, such as increasing employment, etc. Although the bureaucrat directors also bring in government subsidies and protection for the listed companies, they still lead to lower accounting earnings in these listed companies.
    • Show Sections

      Hide Sections

      Teaching Reflection plays an important role in the teachers' improvement. With the right use of modern education technology and informational network tools when teachers doing teaching reflection, it can make well because this can break the limit of traditional teaching reflection. This paper mainly talks about the content of teaching reflection by using education technology.
    • Show Sections

      Hide Sections

      Network remote video pushes forward the rural health care, social security, agricultural production and education information service system vigorously, and it improves an important role. The use of online video, real-time Q, remote diagnostics and other means to enhance rural plant, pharmaceutical and other industries of information technology is conducive to agricultural development and rural health development in the pharmaceutical distribution market, the consumer interests are protected.
    • Show Sections

      Hide Sections

      The general problem of multiprocessor scheduling can be stated as scheduling a task graph onto a multiprocessor system to minimize the schedule length. In literature, many algorithms have been proposed for the problem, such as the list heuristic, evolutionary algorithm, combine the above two, and so on. But these algorithms not considered part of the tasks needed to be executed on more than one processor simultaneously, so the above algorithms cannot solve or solve not well to this class of scheduling problems. In view of this special class of multiprocessor scheduling, this paper will propose a reasonable genetic algorithm with rational designed encoding and genetic operations. From experiment, we will find the validity of the algorithm proposed in this paper for the multiprocessor scheduling problem in which some tasks need to be executed on more than one processor simultaneously.
    • Show Sections

      Hide Sections

      The china ancient thoughts of the Confuceanism, the Taoism and the Buddhism and their realationships of each other constitute the major parts of china traditional thoughts culture. As china traditional culture component part—china ancient sport of keeping in good health also has very important influence actually, In some words keep controling function. Although the thoughts of the Confucianism, Taoism and the Buddhism for keeping in good health has their characteristies and advantage and disadvantage,but the three thoughts are togethered has overall reflected china ancient sport of preserving one's health school having positive practice meaning and role of individual value for today.
    • Show Sections

      Hide Sections

      In this paper, by carrying out an analysis on the new changes of the library reader services and integrating the current conditions of the libraries of the higher learning schools under the current new economic situation, the author conducts a discussion on how to develop and innovate the library reader services, with the ultimate purpose of promoting them to adapt to the needs of the new situation.
    • Show Sections

      Hide Sections

      Software testing is considered as a significant process through software development life cycle that can be managed, measured and improved continuously. Test Improvement is often referred to as the continuous improvement of the quality, and the efficiency of the testing process. This approached raised on the basis that an improved test process leads to an improved quality of the product. ISTQB test suite is a well-known recent endeavor describes the process and included activities, furthermore, it introduces few test process improvement models. In the previous paper [1], we presented a new method to improve the ISTQB test process by mapping CTP and TPI NEXT models. In this paper we aim that to evaluate ISTQB test process with TMMI model to determine current maturity level and it's weakness points.
    • Show Sections

      Hide Sections

      WebGIS has become one of the primary research directions in GIS. It is an efficient approach for the socialization of GIS. So it is important to research the structure and realization of WebGIS which is interoperable, transplantable, expansible and fit for various platforms. After analyzing and comparing the WebGIS system structure development and its main realization technologies, a realization technology based on J2EE is proposed.
    • Show Sections

      Hide Sections

      Once the traditional Chinese graphics are mentioned, it is natural for Chinese people to think of the essence of the traditional Chinese graphics which are the decoration patterns on the potteries and porcelains, jade articles, bronze ware, lacquer ware, tile carving, wood carving, gold and silver ware and wall painting, etc. These graphics possess the unique characteristics not only in China and also in the cultural history of the world, and have their own systems naturally. Besides, they are the symbol and pride of the traditional Chinese culture beyond all doubts. The traditional Chinese graphics were refined and developed by the previous skillful craftsmen from the natural life, and are able to mirror the high-quality artistic works from the palaces to the folk world. In addition, their national meanings, decorative patterns modeling, aesthetic principles, picture compositions, colors and others are the indispensable artistic cultivation lessons. In this paper, the author mainly gives a discussion about the application of the traditional Chinese graphics in the modern logo designs. Therefore, this paper is of practical and guiding significance to some extent.
  • Session 5 Computer Technology and Development

    • Show Sections

      Hide Sections

      To shield the heterogeneity of home network for network convergence, it is important to provide architecture and QoS scheme of home network. We propose the universal network convergence architecture based on home gateway, to support interconnection between home network and external network. And we propose the dynamic QoS policy generation to shield heterogeneity of home network.
    • Show Sections

      Hide Sections

      Among the conventional algorithms of colorization, color transfer algorithm is the most common one. However, the traversal matching of each pixel is inevitable in the case of target color image. Though existing some improved methods of color correlation based, they make little sense on large resolution images and grayscale video rendering. This paper focuses on the use of CUDA, GPU general parallel computing platform, which is rapidly developed in recent years, accelerating colorization and adopting Secondary Coloring method to eliminate the effects of noise. The experimental results imply better acceleration.
    • Show Sections

      Hide Sections

      The scheduling problem is a typical time table problem in educational administration. For such a NP complete problems, when the genetic algorithm solves this problem, it has precociousness phenomenon and quickly converges not to the global optimal solution but to the local optimal solution. Therefore, we use the advantage of local search method and partial matching crossover operation to solve TTP problem with the genetic algorithm combining search algorithm. We do a lot of experiments and evaluate the performance of the improved genetic algorithm. The experiment results show that genetic search algorithm is a more superior algorithm to apply to the TTP problem.
    • Show Sections

      Hide Sections

      Just like building a house, learning music needs to lay solid foundation. The purpose of the piano teacher to teach playing piano is tell the students how to feel the beauty of music.
    • Show Sections

      Hide Sections

      Virtualization technology has provided customer with a more flexible, scalable and highly available infrastructure. Actually, the virtualization platform itself is heterogeneous, this leads major virtualization platforms lacking of interoperability, increasing the complexity of resource management, scheduling and load balancing. This article proposes a dynamic resource scheduling framework with heterogeneous virtualization platform supported to handle such issues.
    • Show Sections

      Hide Sections

      Based on Computational Fluid Dynamics (CFD) technique, the numerical simulation of T-hydrofoil was studied. The flow around the 2D hydrofoil was simulated by the modified RNG k-ε two-equation turbulence model. The lift coefficient, drag coefficient, lift-drag ratio and pitching moment coefficient of common hydrofoil and hydroflap on different working conditions were calculated and compared with experimental values after comprehensive analysis. The variation law of hydrodynamic coefficients with attack angle and flap angle were concluded by computing results, which provided basis in the application of trimaran.
    • Show Sections

      Hide Sections

      Higher education is an important special talent, cultural development of the science and technology, perfect modernization. It has two modes: higher education mode and the public welfare-public welfare model. The-public welfare pattern makes direct benefits, also have the opportunity cost of heavy losses, including education equality, education quality drop, expand unemployment, etc. Opportunity cost is the mode and aims at the higher education mode better election.
    • Show Sections

      Hide Sections

      A methodology of noise elimination in a gray image was tested and different parameters were investigated in order to estimate the noise level in a gray image. The estimated mean noise was calculated for variant values of the parameters and it was shown that only the number of orientation to use can affect the mean noise value, also it was shown that images with power to 2 size can optimize the noise processing.
    • Show Sections

      Hide Sections

      Information quality is one of the important indices in measuring quality of an individual in the era of information economy. This paper starts with an questionnaire survey conducted against campus college students, discusses the influence on students' information quality exerted by students' source conditions such as residence category, gender and parents' level of education, then puts forward some countermeasures based on these statistical analyses, intending to offer beneficial references for deeper research and practice.
    • Show Sections

      Hide Sections

      This paper presents the general methods of malware analysis on Symbian smartphone platform. The technical analysis undergoes in three phases: unpack the installation file, reverse engineering statically and trace dynamically (debugging). This paper gives a case study of a sample in the wild to prove the correctness and convenience of presented methods. It summarizes the behaviors of malware observed in our investigation. The result shows our methods for analysis is suitable and practical currently. The methods we presented have been used in real cases in forensic practice.
  • Session 6 Computer Technology and Development

    • Show Sections

      Hide Sections

      Apache is the most widely used HTTP server in the world. Requests per second, transfer rate, time per request is the widely used indices in benchmarking HTTP server. This paper used benchmark test program ab which is widely used compared the performances of Apache between the multi-core network processor OCTEON5860 and XEON E5506. The results show that the performance of OCTEON 5860 is better than XEON E5506. Finally, through analyzing the advantage of network processor OCTEON5860 explained the benchmarking result.
    • Show Sections

      Hide Sections

      Reverse logistics has been brought to the forefront of corporate agenda not only due to environmental concerns and the recent environmental regulations, but also because of its profound financial ramifications. Depending on the specific strategy that each enterprise follows, reverse logistics may constitute a profit center. The importance of reverse logistics to the overall profitability of manufacturers and brand owners is steadily increasing as companies learn how to better decrease returns and extract value from returned parts. Closed-loop supply-chain channels are distribution systems that include activities supporting both the forward flow of goods from the manufacturer to the consumer as well as the reverse flow from the consumer to the manufacturer. In this paper, we identify the reverse logistics supply-chain channels, identify problems that companies face when they handle product returns along these channels and present the critical role that information technology and collaboration can play to mitigate many of the problems and deficiencies. It is imperative that firms operating in the reverse supply-chain channels collaborate to integrate and share information in a timely fashion. In this paper we discussed on the benefits, issues of reverse supply chain management and also focus on the impact of IT on reverse supply chain management.
    • Show Sections

      Hide Sections

      Tablet relies primarily on multi-touch operation control. The current operation mode is lack of asymmetric hands considering human factor. This article is based on cognitive science and human engineering which have made the research on the interactive division of operations and raises asymmetric hands operation in application of multi-point touch computers. Supporting multi-point touch and hand gesture recognition system will further enrich the user's interaction and provide more human interaction platform.
    • Show Sections

      Hide Sections

      In this paper we describe a solution for conversion of direct speech to indirect speech using finite state machine [FSM] parser, which uses skip list as a data structure for syntactic analysis. FSM operates in a bottom up fashion by assuming that the sentence will follow the form identified in the grammar. It looks for words occurring based on the grammar and on reaching the final state a proper sentence for the grammar is identified. Skip list provide the full functionality of a balanced tree where parts of speech are stored in separate nodes that may fail at any time i.e. skip the nodes if not satisfy the grammar rules.
    • Show Sections

      Hide Sections

      Establishing reasonable measures for the management of science and technology innovation, not only can reduce equipment loss, improve equipment degree work efficiency, make use of each function of equipment, make the optimization of coal mining technology in underground development aspects, accelerate the progress of the mining, optimize the coal quantity, do improve cogent accomplish high yield and high efficiency, create profits for the enterprise and also can arouse the enthusiasm of the knowledgeable employees, promote the culture construction of the enterprise, and improve the social image of enterprise with tangible and intangible profits for enterprise.
    • Show Sections

      Hide Sections

      In this paper, efficiency of Support Vector Machine (SVM) and Artificial Neural Network (ANN) is analyzed using unbalanced dataset. The dataset analyzed in this study is obtained from COIL Challenge'2000 and it is highly unbalanced with 94% good customers' data and 6% bad or fraud customers' data. We employed balancing techniques and SMOTE to bring the balance in the data and analysis is carried out. We employed (1) Under-sampling, (2) Over-sampling and (3) Synthetic Minority Oversampling Technique (SMOTE) for balancing the dataset. Since identifying fraudulent cases is paramount from the business perspective, management accords higher priority on sensitivity only. Therefore considering sensitivity alone, we observed that SVM outperformed with original unbalanced data. It is also observed that NN performed better with balanced data compared to it performance using unbalanced data.
    • Show Sections

      Hide Sections

      Internet of Things (IOT) is known as the most influential technological revolution in this century, which is treated to change the world. Thus it is of great strategic, social and economic significance to conduct research about it, while the core of that is Common Platform of the Internet of Things (CPIT). This paper explains CPIT from the aspect of framework and hierarchy, while it concentrates on the researches regarding the sensor common management, data unification and common data interface, environment supporting, services providing and so on. Besides that, this paper provides the XML implementation to the key part of CPIT as well.
    • Show Sections

      Hide Sections

      Digital campus construction involves the analysis, classification, and integration of existing raw data. This article describes the process of data pruning using ID3 algorithm, for the purpose of eliminating redundant attributes in the data and avoiding bias due to excess values in the integration process. It offers practical implications in data integration for colleges and universities who are designing their digital campuses.
    • Show Sections

      Hide Sections

      To avoid the constraint of wires during data acquisition, a wireless data acquisition system based on MATLAB and MCU is designed. Firstly, MCU, wireless serial communication module and other hardware are selected for the system, and the connection and interface for the hardware is designed. Secondly, the software of wireless communication is programmed based on MATLAB. Finally, an acoustic signal data acquisition experiment is performed to test the system, and experiment result verifies the feasibility of the system.
    • Show Sections

      Hide Sections

      Web publishing for SCADA system is not new. Traditional way for web publishing uses polling mode to refresh data. This method works well in most situations, but it can not meet the SCADA system for real-time data update requirements. The solutions is plugins, but the plugins have its own problems, such as security, platform, and requires too more system resources consume to use in resource-limited devices. To improve above issues, this paper attempts to present a new way for data publishing with Comet. Our solution includes a frame of SCADA system web publishing and event triggering mode used in web communication.
  • Session 7 Computer Technology and Development

    • Show Sections

      Hide Sections

      with development of IOT (Internet of Things), a new architecture of home network is required. In the architecture, semantic description of services and devices is introduced. And hardware architecture of residential gateway is for the home network architecture based on the multi-core processor. At last software architecture of residential gateway is put forward.
    • Show Sections

      Hide Sections

      This paper presents the solution of economic dispatch (ED) problem of generating units with multiple fuel options based on the Lagrange multiplier theory (LMT). LMT is a conventional and efficient theory used to solve the optimal generation dispatch problem with only one fuel option for each generating unit. Finally, a simple and efficient method has developed based on formulating conventional Lagrange function to solve ED problem with multiple fuel options in this paper. The proposed approach has been examined and tested with the numerical results of ED problems with ten generating units with two or three fuel options. The test results compared to other methods and show the effectiveness of proposed approach for solving ED problems.
    • Show Sections

      Hide Sections

      This paper applies Robust Optimization method to optimize the public transport hub planning process. The Shortest-path Algorithm is firstly introduced to improve the initial solution and neighborhood structure. And the Robust Optimization method is applied to the problem of selecting the hub stations in the public transport network to help the decision making process. Furthermore, 8 hub stations are selected among 200 stations with the method application. The computation result shows its good usability in public transport planning. Consequently, the method can be used to instruct the public transport network in cities.
    • Show Sections

      Hide Sections

      In this paper, we propose a novel two-phase hybrid differential evolution (DE) algorithm with a variable neighborhood search method in order to enhance the exploitation ability of the algorithm. The algorithm is developed to solve a new NP-hard bi-objective parallel machine scheduling problem with earliness-tardiness and workload balancing as two objective functions. Due to the priority of the former, this paper attempts to apply a hierarchical approach for DE. Because of the discrete nature of scheduling problems, a random-key solution representation is used to encode solutions. The solutions provided by the proposed algorithm for 200 test problems with various sizes, outperform one of the state-of-the-art evolutionary algorithm, the two-phase genetic algorithm.
    • Show Sections

      Hide Sections

      In this paper an Artificial Bee Colony (ABC) Algorithm is employed for simultaneous coordinated tuning of two power system stabilizers (PSSs) to damp the power system inter-area oscillations. ABC is a population-based optimization algorithm inspired by the foraging behavior of bee colony and proven its superior capabilities, such as faster convergence and better global minimum achievement. For this, two conventional PSSs are designed in which a lead-lag structure is considered for each PSS and its parameters are tuned using ABC. A 2-area 4-machine system is considered as test system. To show the effectiveness of the designed PSSs, the study power system is tested by applying a three phase fault at a bus. Simulation studies show that the designed PSSs have good capability in damping the power systems low frequency oscillations.
    • Show Sections

      Hide Sections

      Computers have become an essential part of our lives. We use computer controlled equipment or computer software to complete our tasks easily. Computer can be divided into two parts. The first part, computer hardware, does the physical work while second part, computer software, tells the hardware what to do and how to do it. If you were to think of a computer as a living being, then the hardware would be the body that does things like seeing with eyes, lifting objects, and filling the lungs with air; the software would be the intelligence, interpreting the images that come through the eyes, telling the arms how to lift objects, and forcing the body to fill the lungs with air. Computer software or software is the collection of computer programs and related data that provide the instructions telling a computer what to do. Computer programmer using a computer programming language or coding and generate the computer software according to user requirement.
    • Show Sections

      Hide Sections

      In this paper, we investigate a supplier selection problem composed of single manufacturer and multiple suppliers under stochastic demand condition and quantity discount policy. The objective of this problem is to select the most economical set of suppliers and to allocate the ordering quantity among the selected suppliers to minimize total costs including selection, purchase, holding and shortage costs. Since the considered problem is NP-hard, this paper presents a novel hybrid algorithm (hybrid GA_VNS) that combines genetic algorithm (GA) with variable neighborhood search (VNS) to find near optimal solutions. This algorithm merges the explorative nature of GA with the exploitative nature of VNS to enhance the effectiveness of the algorithm. The performance of the hybrid GA_VNS is verified with comparing its results with the existing GA in the literature with 60 instances.
    • Show Sections

      Hide Sections

      Clustering analysis of data from DNA microarray hybridization studies is essential for identifying biologically relevant groups of genes. Partitional clustering methods such as K-means or self-organizing maps assign each gene to a single cluster. However, these methods do not provide information about the influence of a given gene for the overall shape of clusters. Here we apply a fuzzy partitioning method, Fuzzy C-means (FCM), to attribute cluster membership values to genes.Gene expressions are expected to vary not only in terms of expression amplitudes, but also in terms of time progression since biological processes may unfold with different rates in response to different experimental conditions or within different organisms and individuals. Any distance (Euclidean, Manhattan, …) which aligns the i'th point on one expression with the i'th point on the other will produce a poor similarity score. In this paper we use DTW distance to attain expression's similarity.
    • Show Sections

      Hide Sections

      The global exponential stability of a class of infinite-dimension stochastic interconnected large-scale systems with time delay was analyzed based on stochastic box theory, by constructing a vector Lyapunov function. A criterion was concluded for global exponential stability of the systems. t is independent of the delays and convenient of the computation, so it is easy for application.
    • Show Sections

      Hide Sections

      Based on the fuzzy control theory, this paper designs the roller press fuzzy control system through the analysis on Expert control experience and operator's operating. And then automatic system could be designed, which was used by industrial DCS system.
  • Session 8 Computer Technology and Development

    • Show Sections

      Hide Sections

      The blind increase in the CMOS scaling technology has brought us to a stage where it has reached its saturation point. In here, after laying the basis of this work by having a look at the technology trend, a rising problem is addressed that is faced in manufacturing an MPSOC. Than the discussion is switched at reconfigurable computing architecture and it is extended till run-time reconfigurable computing to lead us to the point that how this scheme can reduces the defect rate problem of MPSOC manufactures. Furthermore, the work concludes at proposing a run time reconfiguring technology for MPSOCs as a replacement technology to reduce defect rates and enhance reliability through fault tolerance. The point emphasized than is that why not the leading market vendors switch towards this technology instead of suffering from all the high defect rates in their fabrication. This paper is not only a research review and proposal of new technology but also another step in the efforts for laying basis of reconfigurable computing as a future of computing technologies in context with problem which modern technology is facing today.
    • Show Sections

      Hide Sections

      Every human being should have the opportunity to make a better life for themselves. Unfortunately, many children in the world today grow up without this chance, because they are denied their basic right to even attend primary school. Various reasons like ,the lack of infrastructure, unavailabilty of proper learning environment, social barriers etc develops such curcumstancs which the children cannot bypass. This has led to illetracy thus promoting poverty. It becomes an unanswerable question that, what system should be adopted to give education in such circumstances?. One answer that comes to mind is EDUPORT. It is a complete classroom system that can be installed anywhere and education can be given in any corner of the world.
    • Show Sections

      Hide Sections

      This paper proposes a new classification algorithm named the Attribute Value Dependant classifier (AVD). This AVD classifier mainly focuses on identifying the relationship between the attribute values in the training dataset and the class label values. The ‘Attribute Value Dependant’ is the value which determines the extent to which each attribute value has its impact in deciding the class label is identified; and the training model is built based on these values. The attribute values in the test dataset are compared against the ‘Attribute Value Dependant’ values and based on this comparison the test dataset is classified. Since individual attribute value dependency on the class label is found, the irrelevant and inconsistent data in the training dataset are ignored during the classification and consequently the classification accuracy is improved. The performance of the AVD classifier has been compared with seven traditional classifiers and has been proved to produce better results.
    • Show Sections

      Hide Sections

      Today, IT is an important part of human life and does things more efficiently with Lower costs, less time and More Quality. The purpose of this study the effectiveness of IT courses on employee performance Islamic Azad University-IAU (Qaemshahr Branch, IRAN). Statistical population of this descriptive study is 498people and the sample size based on Krejcie and Morgan table was 217. Because of different objectives and indexes related to performance effectiveness, we used Multiple Attribute Decision Making with TOPSIS method for data analysis in which distance of indexes from positive and negative ideal points were evaluated. The results show that in managers group relatively improving abilities, occupational knowledge and objective realization had the highest impact and planning and decision making had the lowest impact. In Staff's group relatively improving occupational knowledge, improving quality, skills level and abilities had the highest impact and reducing costs, typing letters, occupational motivation, planning, and access to scientific resources and organizing had the lowest impact. In comparison of these indexes and their impact on managers and staff, we can say IT course's implementation was effective on IAU workers and gender and organizational posts had no impact on IT training effectiveness.
    • Show Sections

      Hide Sections

      When Running Linux on a multi-core processor, all of the network processing is processed by the operating system and the processing efficiency is very poor. To solve this problem, we describe a Multi-core Network Processing System (MNPS) in this paper. The MNPS divides the cores of a multi-core processor into two groups. One group runs MNPS-Linux, which is a modified Linux only retaining the same socket interface to the user applications. The other group runs MNPS-Stack, which processes the network stack without operating system and directly operates the hardware resources. Because of the offloading of network processing and no interrupt in MNPS-Linux and the directly operating the hardware resources and no operating system in MNPS-Stack, MNPS is very efficient. We can see from the result of the experiment that MNPS can get high performance but consumes less CPU resource.
    • Show Sections

      Hide Sections

      Since 1999, the city residents' consumption level and consumption structure in Guangzhou have big development, paying more attention to improve the quality of consumption. This article uses extended linear expenditure system model (ELES) and from the angles of marginal propensity to consume, basic consumption demand, income elasticity and price elasticity to analysis on city residents' consumption structure in Guangzhou and to understand the consuming rules of Guangzhou city residents, thereby providing policy suggestions for Guangzhou government to expand domestic demand, adjust the industrial structure, optimize and upgrade city residents' consumption structure.
    • Show Sections

      Hide Sections

      Before the Intelligent Science is born, people have endowed the Robots with the Artificial Intelligence. Due to the infinite possibilities of reality, the Artificial Intelligence has showed its limitations, people can only achieve the fuzzy control and simulating control on Robots. To face the infinite possibilities of reality as well as to achieve the precise control, one can only fall back on the Intelligent Science, the foundations of Intelligent Science are the Chinese Alphabetic Passwords and the Consciousness Passwords. People adjust the hand forms through the Chinese Alphabets, look for the Consciousness Passwords through the hand forms, these patterns can solve the precise control and the infinite possibilities of reality, people can achieve the Man - Robot dialogue.
    • Show Sections

      Hide Sections

      A high speed data processing system has been designed based on NIOS II reconfigurable soft IP cores. The mainly task of the system is to process data at high speed meanwhile to ensure the correctness of data. In this condition, user-defined SRAM logic controller combine complex flash operate mode has been designed to deal with plenty of data at high speed take the advantage of the reconfigurable characteristic of soft IP cores. System signal bit is 16, update speed is 10MHz and signal enable period is 15.3ms. SRAM using pingpang change structure processing data. By generating SRAM hardware interrupt changing Avalon bus control right and adding user-defined information such as head, time stamp ,data length and so on to ensure the correctness of data. System resource usage condition and power consumption also mentioned in detail. Wideband input voltage designed adapted to remote system control requirement. Through long time use, system has high reliability and stability.
    • Show Sections

      Hide Sections

      This method refers to the analysis of handwritten image to extract the characteristics of the image. As a part of the preprocessing stage the image is checked for noise removal, skew correction and slant removal. After preprocessing stage the text line is detected and word wise character wise segmentation is performed. The integer to integer wavelet transform is applied to the segmented image to extract the characteristics of the handwritten image. The high frequency part of the wavelet coefficients denotes the image details, the features deduced from wavelet coefficients can be used to retrieve the texture image and this method is not sensitive to luminance, these virtues cannot be found in tradition.
    • Show Sections

      Hide Sections

      In this paper, we introduce our methods and techniques to build the Vietnamese query processing component of our architecture of natural language based bus routes searching system. To construct this component, we have to resolve the syntactic analysis and semantic representation of Vietnamese questions. We have built appropriate syntactic rules to analyze various types of Vietnamese questions which we hope our system can process in this bus routes searching application. A typical model and appropriate related-mechanisms have also been established to process the semantics of Vietnamese questions syntactically analyzed by the system. This Vietnamese query processing component has integrated and tested in a complete bus routes searching system.
  • Session 9 Computer Technology and Development

    • Show Sections

      Hide Sections

      XML has become the de facto standard for data representation and data communication over the World Wide Web. Due to the self describing nature of XML, it is accepted World Wide as a data exchange. But the same self describing ability makes it verbose and thus introduces redundancy in the document. This large document size also affects efficiency of time and efficiency of storage while transmitting, processing and storing the data. Therefore it is better to use efficient compression techniques for storage and querying. Several XML compression techniques have been introduced from past few years. However those compression techniques require decompression to query the XML document, do not support dynamic updating and also results in huge storage. In this paper we introduce a different approach for compression. Our approach exploits consecutive sub trees and tags for compression using pre order labeling scheme and stores it using indexers, thus resulting in an efficient query processing and reduced storage requirement.
    • Show Sections

      Hide Sections

      Web spoofing is a serious problem involving fraudulent e-mail and web sites that trick unsuspecting users into revealing private information. Phishing has increased enormously over the last years and is a serious threat to global security and economy. There are a number of possible countermeasures to phishing. These range from communication-oriented approaches like authentication protocols over blacklisting to content-based filtering approaches. Each month, more attacks are launched with the aim of making web users believe that they are communicating with a trusted entity for the purpose of stealing account information, logon credentials, and identity information in general. We hereby discuss the aspects of web spoofing and its unique solution: ‘Panch∼Vaktram’ which is a web browser with a spoof guard technology that provides a security guard to the users working online.
    • Show Sections

      Hide Sections

      Human over IP (HoIP) is a prototype implementation of a revolutionary idea of using IP as Human Identification globally, which will not only keep the individuality but will also govern all the communication. This paper not only represents the idea but also elaborate the successfully implemented model. HoIP gives the concept of one IP one human. It provides state organizations with some special privileges so that they can perform efficiently. The system gives the concept of Central Unique Database, and then providing different departments with the only information needed. So the different level of information has been introduced to provide the organizations with the data of their need only, nothing more or less. For security point of view, the data for every part is stored in encrypted form and decryption is performed while retrieving the data from server. Along with the encryption every part is password protected. Administrative unit is the power control of the system. This unit can modify the privileges of any HoIP Licensee such as “Disable all privileges”, “Enable all privileges” and to disable or enable some part. The reason for selecting IPv6 is not only to increase the efficiency but the numbers also as its pool is enough to cover the world population. The idea holds potential to leapfrog all the current human identification databases. Applications of this philosophy are beyond our imagination.
    • Show Sections

      Hide Sections

      Using thresholding method to segment an image, a fixed threshold is not suitable if the background is rough Here, we propose a new adaptive thresholding method using FCM. The method requires only one parameter to be selected and the adaptive threshold surface can be found automatically from the original image.An adaptive thresholding scheme using adaptive tracking and morphological filtering. FCM algorithm computes the fuzzy membership values for each pixel. Our method is good for detecting large and small images concurrently. It is also efficient to denoise and enhance the responses of images with low local contrast can be detected. The efficiency and accuracy of the algorithm is demonstrated by the experiments on the MR brain images.
    • Show Sections

      Hide Sections

      Finding the location of the mobile phone is one of necessary features in 3G/4G communication system. Nonetheless, for many practical applications, location estimation accuracy is not satisfactory due to the unavoidable non-line-of-sight (NLOS) propagation is spread in mobile environment. In order to address this problem, an efficient geometry-constrained based on Particle Swarm Optimization (PSO) algorithm is proposed. The PSO algorithm has high convergence speed and low error for nonlinear calculation in geometry positioning estimation. The simulation results demonstrate that the proposed location scheme can meet the demand of E-911 standard.
    • Show Sections

      Hide Sections

      Minimum Routing Cost Spanning Tree problem — MRCT is one of the spanning tree problems having several applications in network designing; this problem belongs to class of NP—hard. In this paper, we will apply Particle Swarm Optimization algorithm — PSO into MCRT problem, compare the effectivity of Genetic algorithm and PSO for MRCT problem and concurrently exploit the combining of PSO with other metaheuristic algorithms.
    • Show Sections

      Hide Sections

      With the development of technology, the Embedded System has come to the era of 32-bits. During the period of Late-PC, with the highly development of digital information technology and network technology, the Embedded System has widely immerged into every aspects, such as technology research, engineering design, military tech, kinds of products and commercial art, entertainments and personal life. With the deeper and wider development of world wide embedded products, the embedded technology has become more and more related with people's daily life. This article mainly introduces the hardware-software co-design of Ethernet ,Can and Serial communication system based on ARM9(EP9302) microprocessor and embedded Linux system.
    • Show Sections

      Hide Sections

      In order to solve the modeling problems of radar simulation. Started with the character of clutter, proposed the feasible plan to produces the clutter with specific frequency spectrum, its modeling and simulation was achieved through zero memory nonlinearity, the detailed steps for modeling the radar clutter with K Distribution is presented. The simulation program designed with Visual C++ was able to realize two things: one was that input the clutter parameter and output corresponding clutter sequences; the other was checking the distribution and correlated characteristic. Finally, it analysed the simulation result and points out the attention matters in the modeling process. The result of experiment shows that the method is precise, rapid and feasible.
    • Show Sections

      Hide Sections

      Fast trimaran holds excellent performance because of its high transverse stability, large deck, economy of fuel consumption and high speed. However, the highspeed craft can easily make “dolphin movement” in heading seas. The T-foil is the most effective stabilizer for alleviating the pitch and heave motions of fast craft. This work designs an autonomous trimaran motion control system utilizing a T-foil which can control the longitudinal motion of fast trimaran. Numerical simulation results show that the motion control system can satisfactorily improve seakeeping performance of fast trimaran.
    • Show Sections

      Hide Sections

      In real applications of speaker verification [1] based on GMM-UBM method, the size of training data varies from a speaker to another; the choice of a common threshold of verification will reduce the performance of the system when we only have short records of training data. In this paper we first describe speaker verification using adapted gaussian mixture models based on Reynolds works [2] and the performance obtained by this method. We then propose a new method to estimate a speaker-dependent threshold and the results obtained by this approach.
  • Session 10 Computer Technology and Development

    • Show Sections

      Hide Sections

      Waste thermosetting plastics are considered to be a difficulty of recycling of polymeric materials due to its three-dimensional reticular cross-linkage structure and the complexity of the types of materials. Take the hard thermosetting polyurethane plastic which is widely used in the market as the research object and deferent from the traditional methods, this paper puts forward waste thermosetting plastics recycling process based on mechanical and physical methods. Through strong shear, extrusion, grinding and other mechanical forces combined with the frictional heat generated, not only the physical properties and morphology of the material change, but also the molecular structure and chemical properties of the material change and produce degradation. The paper has analyzed the degradation mechanism of polyurethane and influencing factors based on mechanical and physical methods. At last the reasonable parameters of effective degradation are obtained, which are combined with the actual experimental results.
    • Show Sections

      Hide Sections

      Nowadays trust has become one of the main challenges in every online social network. In unstructured P2P overlay networks like Gnutella where trust isn't a defined feature, we have employed the idea of trust and with the aid of a neuro-fuzzy algorithm we have proposed a novel computational model to model both trust and reputation in these networks. In this paper we concentrate on the idea of fuzzy modeling of dynamic trust in Gnutella network using a control system which has been implemented for the first time on these kinds of networks.
    • Show Sections

      Hide Sections

      The paper recounts the integration and construction of inorganic and analytical chemistry curricula by “six improvements for one central goal” curriculum teaching mode (SIOG mode). “One central goal” is the high-skilled talent training goal orientation of biochemical pharmacy technology; “six improvements” are the pragmatization of the teaching materials, the dual qualified teaching faculty, the integration of the training and the learning, the project-oriented teaching method, the standardization of the basic operations, and the diversification of the evaluation mode. The cooperation of the “six improvements” completed the high-skilled talent training goal orientation of biochemical pharmacy technology. The teaching result of the SIOG mode was continuously surveyed for 4 years, and the result showed that the satisfaction degree increases steadily as SIOG mode teaching reform develops further.
    • Show Sections

      Hide Sections

      High power medium voltage drives covers power ratings from 1 MW to 100MW and at the medium voltage level of 2.3KV to 13.8 KV. They have been receiving greater attention in the past few decades for high power applications due to their high efficiency, high reliability, effective fault protection, high dynamic performance, regenerative braking capacity and four quadrant operation. This paper provides an over view on commonly used CSI topology in MV drives. In High power MV drives maximum switching frequency is limited due to thermal losses this leads to production of lower order of the unwanted harmonics in PWM CSI output current. The most effective modulation technique to eliminate lower order of harmonics is Selective Harmonic Elimination (SHE). Finally in this paper recent research progress in the area of SHE modulation technique is reviewed.
    • Show Sections

      Hide Sections

      An intelligent watermarking method based on particle swarm optimization (PSO) and wavelet domain will be mentioned in this paper. The PSO will be applied into the optimization of scaling factor, whose fitness function consists of the PSNR of the watermarked image and the NC of extracted watermark image after being attacked by some certain attacks. The experimental results prove that scaling factor optimized by PSO balances transparency and robustness very well.
    • Show Sections

      Hide Sections

      Wireless networks have been around for many years. satellite TV, remotecontrol services, radar, alarm systems and weather radios are collected to our everyday life. Nowadays wireless networks are playing increasingly important role in business and personal life. Wireless LANs are suitable for companies because there are no needs wired cables and fixed location. However, the wireless LANs are always in danger more than wired ones because the signals are broadcasted all around. In this paper, we describe the architecture of WLAN, security and its weakness. In addition, some solutions for security weakness are listed in this paper.
    • Show Sections

      Hide Sections

      In this paper, we propose a new approach which is General Tree (GT) model to be used to combine binary Support Vector Machine (SVM) classifiers for multi-class classification. In addition, the error probability of a tree is also introduced with purpose for evaluating the fitness of different General Trees.
    • Show Sections

      Hide Sections

      How to design and optimize a pipeline FFT Processor based on FPGA is presented. The architecture of FFT core is based on a new approach [1] using pipeline technique to increase the performance of the design. Following that, Radix-22 algorithm is chosen to implement the FFT processor. Some necessary techniques are mentioned. This is just the straightforward adjustment; however it improves the frequency, performance and saves resources considerably for the design.
    • Show Sections

      Hide Sections

      Many studies on traffic simulation models of vehicle traffic are carried on. However, attention on the modeling of uncontrolled pedestrian crossing is seldom paid. The paper summarizes the achivements of pedestrian crossing behaivor from several aspects: traffic characteristics of pedestrian flow, their decision behavior of pedestrian and vehicle, and the microscopic model of pedestrian crossing behavior, then analyzes the deficiency of the existing models, and illustrate the trend of modeling of uncontrolled pedestrian crossing bahaivor. The result aims at providing help or reference for pedestrian crossing modeling or crowd simulation in game.
  • Session 11 Computer Technology and Development

    • Show Sections

      Hide Sections

      Through the technology of symbolic execution, we can obtain the relationship between input and control flow easily, which is quite critical for the analysis of the program. In this paper, we propose and implement a method of software behavior detection based on dynamic symbolic execution. Through code instrumentation, we can get the context of a program execution, and collect the behavior information as well as path constraint conditions. After that we can generate a new set of constraints according to a certain path traversal algorithm, and construct a new input so as to drive the program to execute a new path by solving constraints. Experiments show that the proposed method can make an analysis of binary executable program, capture the context during program execution, and overcome the inconvenience effectively, which is caused by invisibility of the source code by analyzing binary executable programs directly.
    • Show Sections

      Hide Sections

      The Internet of things (IOT) is a new integrated system from various information techniques, till now, it is becoming a hot spot of present research and application. Furthermore, IOT has a good prospect of application and extension in the agricultural engineering field. This paper introduces common and key technologies, and proposes several applications of smart farming based on IOT— the plant factory automation systems, monitoring and control system of agricultural pest, supervision and management system of quality and safety for agricultural products.
    • Show Sections

      Hide Sections

      Considering the importance of careful segmentation of medical images for deleanition of unhelthy tissues or locating and tracing of the tumor growth, it has been the subject of interest in many medical researches. In this paper we propose a gossip-based region growing algorithm to extract more accurate spatial features. The features will then be imported to a random forest. The random forest classifier is an ensemble classifier derived from the decision tree idea but with accuracy rates comparable to most of currently used classifiers. Although being a very strong classifier, random forest has rarely been studied in the field of medical segmentation. The brain scans segmentation with random forest showed promising results using the gossip-based region growing algorithm.
    • Show Sections

      Hide Sections

      Along with the concept of “smart home” developed in recent years, utilize the energy with a more intelligent and efficient manner is one of its key issues. In this paper, we exploit the home energy management system and present a design solution of wireless based power outlet and control terminal which could measure the energy consumption and carry out control actions with adopted strategies through the wireless-based home communication network. The suggested solution can greatly improve the energy utilization efficiency at home with greatly flexibility.
    • Show Sections

      Hide Sections

      The process of inpainting is to reconstruct the lost or deteriorated parts of images. The reconstruction of missing data in very high spatial remote sensed image is of great challenge due to its complexity. Remotely sensed Very High Resolution (VHR) images may be partly contaminated by cloud and accurate reconstruction of such images is of great problem. In this paper two strategies were proposed one for cloud removal and other for reconstruction of missing regions to improve the accuracy. The cloud removal problem is achieved by means of bandelet transform and multiscale geometrical grouping algorithm. This algorithm aims at removing the cloud contaminated portions from the VHR images. Then Exemplar based inpainting strategy (approach) is used for reconstruction of missing regions. The two algorithms used here are very simple and efficient results can be obtained.
    • Show Sections

      Hide Sections

      Vehicle License Plate Detection plays a pivotal role in Vehicle License Plate Recognition for commercial as well as private vehicle for intelligent transportation system. This paper presents a robust method for Vehicle License Plate Detection in various cases. Here an algorithm is devised to detect Vehicle License Plate region using RGB (Red Green Blue) filtering, Optical Character Recognition (OCR) and Geometrical features of Vehicle License Plate. This method uses color information to approximate the region of License Plate and then utilizes OCR to eliminate undesired region. Finally geometrical features of License Plate are used to extract the actual License Plate. Experimental results indicate that the proposed method is robust, accurate and works well in various environmental conditions.
    • Show Sections

      Hide Sections

      Software testing is a method of determining problems before an application is promoted into production. It is the process used to measure the quality of the software developed. It is expensive, difficult, inaccurate, and time consuming to test an application using purely manual methods. As technology has developed there has been a desire to move away from manual testing and adapt automated testing. But finding a test tool that will meet our entire testing requirement is difficult, at best. Especially Graphical User Interface (GUI) tools that are available in the market is not very easy to use and flexible to perform stress automation. This paper looks at the problems persisting in on commercially available automation tools and describes the proposed new techniques and solutions which will be implemented on GUIRobo.
    • Show Sections

      Hide Sections

      This paper describes an algorithm which is used to efficiently transfer video over network. The algorithm can be useful for video conferencing systems in classrooms, groups and enterprises. It locates moving objects in order to reduce size of data must be sent between endpoints.
    • Show Sections

      Hide Sections

      The semantic web is a second generation of the Web and is a vision of information that is understandable by computers. The Semantic Web provides a common framework that allows data to be shared and reused across application, enterprise, and community boundaries. Ontologies are used to define the concepts in the domain of discourse and their relationships and as such provide the formal vocabulary applications use to exchange data. Besides the Web, the technologies developed for the Semantic Web have proven to be useful also in other domains, especially when data is exchanged between applications from different parties. The software engineering community has developed various tools to support the specification, development, and maintenance of software. Many of these tools use proprietary data formats to store artifacts which hamper interoperability. Software engineering is one of these domains in which recent research shows that Semantic Web technologies are able to reduce the barriers of proprietary data formats and enable interoperability. In this paper, we present Semantic Web technologies and their application in software engineering or ontologies developed for software engineering, review the current efforts on applying the Semantic Web techniques on different software engineering aspects, and present the benefits of their applications. We discuss the current status of ontologies for software entities, bug reports, or change requests, as well as semantic representations for software and its documentation. This way, architecture, design, code, or test models can be shared across application boundaries enabling a seamless integration of engineering results.
    • Show Sections

      Hide Sections

      Controlling a biped robot with a high degree of freedom to achieve stable, straight and fast movement patterns is one of the most complex problems. With growing computational power of computer hardware, simulation of such robots in high resolution real time environment has become more applicable. In this paper for first time we compare three approaches with together for solving the biped robot walking problem. In this scene, first we have used a modified Truncated Fourier Series (TFS) to generate angular trajectories, then to find the best angular trajectory we used three approaches. 1. Genetic Algorithm(GA) 2. Genetic Algorithm parameters adaption using Learning Automata(GALA) 3. Particle Swarm Optimization(PSO) algorithm. Evaluations performed on Simulated NAO robot in RoboCup 3D soccer simulation environment.
  • Session 12 Computer Technology and Development

    • Show Sections

      Hide Sections

      All countries, however, It is accepted that information technology (IT) is important to highlight the rapid expansion of power systems. The facility is expected to take some patience to install communication networks as a means to ensure the monitoring of power systems Can be more widely used in the system more stable and Reliable systems with sufficient power. Given that communication infrastructtures Generally have value, They can be used for purposes other than monitoring the power system. These new technologies bring new challenges to information and communication technology and organization structure in relation to the power companies. In this paper, The authors of the above problems And a discussion of methods to provide a solution that is feasible in reality. The authors would like to raise awareness among the owners of the power system for network security issues related to ICT. Examples are given to illustrate the challenges, And an interdisciplinary approach to ensure information security is recommended.
    • Show Sections

      Hide Sections

      There are many types of insects that affect agricultural fields. These harmful insects should be classified in a smart implementation for the rural fields. The main point to detect depends on their texture color. These textures are different from one insect to another. We propose a new hybrid method based on Gray Level Co-occurrence Matrix (GLCM) to detect the harmful insects in agricultural fields. The main idea shows that a tested image is composed of different texture regions of the insect and this will help to extract feature value. This paper consists of three steps: the first step extracts texture features using GLCM in four directions which are 0, 90, 180 and 270 degrees from the gray image. The second step trains the neural network depending on texture features in a large number of variety insect's images. The third step tests the unknown insect's image to classify it whether harmful or not. The purpose of this study helps rural farmers to detect the harmful insects and classify them to take care of their crops.
    • Show Sections

      Hide Sections

      Combining the minimum brightness variation criterion (MBVC) and the artificial neuron model, a color halftone watermarking algorithm which embedding the watermark information during the halftone process is presented. This algorithm uses MBVC in quantization rules and embeds the watermark information in the image by training and adjusting the weight. Through this algorithm a high-quality halftone image can be gotten, and experiments show that it has a good performance against regular attack and print-and-scan process.
    • Show Sections

      Hide Sections

      This research concerns active vibration suppression of composite cantilever beam configuration consisting of aluminum face sheets and a core composed of honeycomb Aluminum panels by using piezoelectric smart materials as actuators. MSC/MARC can be utilized in the numerical simulation of active feedback control for the purpose of vibration suppression of structural systems. The Positive Position Feedback (PPF) control algorithm is coupled with an MSC/MARC dynamical structural model. The transient response of the beam with and without the active control is examined. The MSC/MARC solution is found to be in good agreement with experimental values from previous work.
    • Show Sections

      Hide Sections

      With the promoting of education informationization process, more and more complex data is accumulated, the data mining techniques used in education. The work, that finding in hidden and useful information to guide education from large number of educational data, will be helpful to the education reform and development. This article proposes one kind of improvement ID3 algorithm, this algorithm simplified information entropy solution, which is the standard of attribute selection and reduced complication of calculation. Its application to analysis of university students performance will find out the influence of implicit factors, improve the quality of teaching.
    • Show Sections

      Hide Sections

      Finding the route in unknown environments is difficult and challenging, great attention is given to solve this problem by means of automatic path finding calculation. As small and portable technologies are developing and the technology of route guidance systems has increased these days, a new group of users that is, pedestrians are also added to the previous users of route guidance systems. Sincepedestrians are not connected to the routes network, new problems will occur in automatic guidance of computers. As a result the use of route guidance systems for pedestrians is not practical instead; Landmarks_preparing some recognizable and memorable guides through the route can be used to achieve this aim. The idea of this essay is to indicate; geographical data systems is graphically which includes, spatial data, non-spatial data and neighborhood connection among them, then we can use spatial outliers to derive Landmarks from graphs.
    • Show Sections

      Hide Sections

      Wind turbine installation is increasing rapidly. Especially, the behavior of wind turbines during a power system disturbance would affect power system stability and supply security. STATCOM unit is developed to inject reactive power to mitigate power quality problems and to get stable grid operation. Due to continuously varying wind speed components, the active and reactive power along with terminal voltage fluctuates continuously. By connecting STATCOM into the grid, the active power, reactive power and terminal voltage is maintained constant [1]. The STATCOM as a pure static device with no switched passive components provides outstanding performance for both steady state and dynamic operation.
    • Show Sections

      Hide Sections

      Texture retrieval is a significant branch of content based image retrieval (CBIR). In this paper, the nonsubsampled contourlet transform has been used for texture image retrieval. This transform is built upon nonsubsampled pyramid and nonsubsampled directional filter banks and provides a shift-invariant, directional, multi-resolution image representation. The statistical characteristics of these directional subbands' coefficients have been used as the feature vector for texture image classification. The performance of the proposed method is compared to other texture image retrieval methods such as Gabor filter, Contourlet and Complex Directional Filter Bank (CDFB) and the experimental results show that our proposed method improves retrieval rate and outperforms other approaches in this concept.
    • Show Sections

      Hide Sections

      This article offers tips for those with cyber security in the electric utility. Traditional mistrust between IT and SCADA engineer who has been broken. It is becoming widespread, and traditional information technology expert replaced by a range of specialists. The Internet and related technologies, it has allowed the use of information technology solutions such as SCADA e.g. Ethernet, IP suite of protocols. IT hardware and software is developed and improved their performance to the extent that specialized SCADA systems are Public information technology solutions to replace (e.g. SQL databases, PC's). The relative ease of the interface between the system allows data to be easily SCADA To other business applications has passed.
    • Show Sections

      Hide Sections

      The purpose of the automotive driving system is to understand the surroundings of the vehicle, evaluate potential risks, and help the driver to behave correctly, safely and efficiently. And for the purpose, we need the precondition that can accurately and precisely estimate the vehicle state. One key challenge is to design a data fusion method to fuse information from multiple sensors used in the automotive driving system. This paper introduces the automotive driving system with Robocar and also presents the method of adaptive particle filter to fuse different data from different sensors to estimate the vehicle state even in noise environment. We are trying to fuse data from different sensors in a probabilistic way. A particle filter with joint observation model will be adopted to fuse different observations according to accuracy and reliability of the corresponding sensor.
  • Session 13 Computer Technology and Development

    • Show Sections

      Hide Sections

      By introducing semantics to Web Services description, the precision ratio and the recall ratio of service discovery are greatly improved. But at the same time, the services query time is also increased by executing semantic reasoning. To shorten the service query time, this paper presents a preprocessing mechanism and a fast hybrid matching algorithm based on this mechanism which can retrieve services in an accurate and quick way. All the semantic reasoning will be pretreated in the service publishing phase, and only numerical calculation will be executed to get the matching results when querying services. A prototype named XSSD has been implemented and the experiment shows that our method outperforms existing methods.
    • Show Sections

      Hide Sections

      At present, Social Networking Services (SNS) mainly focus on people's information (e.g. interests and activities) and often provide a profile for each user. However, information of things, which is also very important for people, has not been involved in current SNS. In this paper, we present a novel social network framework called Thingsbook, which merges things of the real physical world into social network through our designed mobile terminals based rchitecture of Internet of Things (IoT). With Thingsbook, every user can take participation in sensing the states of things by ubiquitous mobile terminals in a Participatory Sensing way. This paper explicitly relates the concept and implementation of Thingsbook framework. We also conduct experiments involving 20 volunteers and show the evaluation. Whether the evaluation results from our testbed or positive responses from volunteers show that Thingsbook is a promising and interesting social network model.
    • Show Sections

      Hide Sections

      Electrolytic hydrogen offers a promising alternative for long-term energy storage of renewable energies (RE). The long-term excess energy with respect to load demand has been sent to the Electrolyser for hydrogen production and then the fuel cell has utilized this stored hydrogen to produce electricity when there were insufficient wind and solar energies with respect to load requirements. The RE system components have substantially different voltage-current characteristics and they are integrated on the DC bus through a power conditioning devices for optimal operation. The DC power required by the Electrolyser system is supplied by the DC-DC LLC resonant converter. The simulation and experimental results show that the power gain obtained by this method clearly increases the hydrogen production and storage rate from wind-PV systems.
    • Show Sections

      Hide Sections

      To achieve classified protection requirements of important information system and study high-level security operating system required in GB17859, this paper focus on the structured protection of the security operating system for high-level, based on the accumulation of existing security operating system, first with the current security features of the operating system architecture, research a new operating system security architecture based on micro-kernel and a security pipe model which built trusted interaction channels between entities in operating system, formed the theoretical basis and scientific support to the classified protection for important information system and the project for high-level security operating system.
    • Show Sections

      Hide Sections

      The suitable measures is discussed for the multimodal registration problem, and two approaches is presented by using different distance metrics. To minimize the distance functionals whose corresponding Euler-Lagrange equations are a coupled system of linear PDEs, an iterative method, which can be regarded as an explicit discretization of a classical gradient flow method, is put forward. Furthermore, an experimental results for a synthetic example is presented.
    • Show Sections

      Hide Sections

      Peyravian and Jeffries proposed a secure remote user access over insecure network in 2006. Shortly after, Munila and Peinada gave an off-line password-guessing attack to Peyravian-Jeffries's remote user authentication protocol. In the same time, Shim also presented a security flaws of remote user access over insecure network based on Peyravian-Jeffries scheme. In 2008, Holbl et al. proposed an improvement of Peyravian-Jeffries's user authentication protocol and password change protocol based on their finding which it immune against the attack. In this paper, we propose a method different from the previous attacks, the method is based on the mutually exclusive or among the fundamental problems in the computer system.
    • Show Sections

      Hide Sections

      Traditional reflection rendering methods have uniform sampling rate over the reflective objects, which cannot provide the surface information sufficiently when data importance and complexity of the surface is non-uniform. Besides, observing the objects, people have one or more visual focus areas. Considering these reasons, rendering reflection requires to highlight corresponding parts. In this paper, a new method for rendering the reflection of 3D objects is proposed, which is based on non-uniform sampling. Our method makes up the shortage of traditional reflection rendering. In the previous phase of rendering, we need to get the sampling map of reflected object image; then according to the sampling map we could gain the distort image of reflected object; finally, render the reflection with the help of reconstruct non-uniform image. Further, we explore the way of generating sampling map automatically. Therefore, it can render 3D object reflection in real time. The work of this paper enables less computation but better effect of rendering reflection in scenarios, using non-uniform image with totally lower resolution.
    • Show Sections

      Hide Sections

      Supervisor Control and Data Acquisition systems are Important Process Control Systems, designed to smart systems such as traffic control, power grid monitoring, waste processing . Customarily, SCADA is connected in a Confined Privacy network because SCADA is Intended a critical infrastructure, and Connectivity to The Internet may be placed in jeopardy, SCADA operators in connection it to the Public networks like the Internet. However, SCADA connection to the Internet can provide many benefits in terms of control, Viewing data generation. SCADA infrastructure such as electricity can also be part of the intelligent network. SCADA connection to a public network can bring a lot of security issues. This paper vulnerability assessment methods used in ongoing research and Assessment activities designed to identify and resolve security vulnerabilities to the nation's critical infrastructure.
    • Show Sections

      Hide Sections

      A high-resolution pollen-based bioclimatic reconstruction from Valikhanov section in Kazakhstan, supported by 6 AMS dates reveals vegetation and climate change history during last glaciations and Holocene. The vegetation probably was Artemisia arid steppe during ∼28,000 - ∼18,000 14C yr BP., then turned to be Artemisia steppe during ∼18,000 - ∼10,000 14C yr BP, an Atermisia-Chenopodiaceae desert steppe during ∼10,000 - ∼5,000 14C yr BP and a Chenopodiaceae-Artemisia steppe after ∼5,000 14C yr BP in this region. Climate is cold and slightly wet during 28,000–10,000 14C yr BP., dry and mild during 10,000–5,000 14C yr BP., wet after ∼5,000 14C yr BP in this region. Climate in the Central Asian domain was constantly wetter than that in the East Asian domain during MIS2. The Central Asian domain experienced a wetter climate in late Holocene whereas the East Asian domain expereinced a wetter climate in early Holocene. Climate in the Central Asian domain was constantly wetter than that in the East Asian domain during MIS2. The Central Asian domain experienced a wetter climate in late Holocene whereas the East Asian domain expereinced a wetter climate in early Holocene.
    • Show Sections

      Hide Sections

      Long Term Evolution (LTE) is an emerging 4G wireless access technology. It is showing a lot of promise in field trials and gaining acceptance among the major wireless vendors. The Long Term Evolution (LTE) standard for mobile broadband employs this MIMO technique in its transmission modes which were defined in release 8. The advantage of using MIMO is the improved performance in terms of coverage, spectral efficiency, reduced power consumption and peak throughput in LTE downlink, PDSCH channel can use several MIMO techniques which includes transmit diversity, spatial multiplexing and beamforming. The antenna configuration in transmitting and receiving side may be 2×2, 2×4 or 4×4. However the performance of transmission modes varies with the variation of multipath channel, UE speed and UE location within a cell. So, it is necessary to analyze their performance by considering the above facts. In this paper, the throughput conditions are investigated by changing the UE speed and also changing multipath channel in order to find out which transmission mode is best for which condition.
    • Show Sections

      Hide Sections

      Capacitive Differential Pressure Sensor (CPS) is extremely used in industries. However, CPS accuracy is limited because of the adverse effects of the ambient temperature on their output characteristic. In this paper fuzzy rules are employed to create a look-up table. The ambient temperature has adverse effects on CPS output characteristic, by using this look-up table we have access to compensated value of differential pressure ΔP.
    • Show Sections

      Hide Sections

      Digital signage as an emerging communication technology is playing a crucial role in today's digital world. In this paper we present SurePlay, a multimedia content management system (CMS) for digital signage. The system provides a robust and scalable platform for scheduling and transmitting multimedia content on display systems. The proposed system has client-server architecture and performs on a LAN/WAN environment. It's user-friendly, reliable, and costeffective. The conceptual and technical design of the system, software functionality and architecture, and several industry deployments are described in this paper.
    • Show Sections

      Hide Sections

      In this paper generation of 40GHz and 60GHz millimeter wave carriers using 20 GHz and 30Ghz local oscillators via optical phase modulator is presented. By exploiting the π out of phase nature of first order harmonics of phase modulator without suppressing the carrier we have successfully double the beating frequency and also up convert 2.5Gb/s and 622Mb/s data in mm wave band over these carriers through LINbO3 MZM modulator. Error free transmission up to 50km is successfully obtained. Millimeter wave generation and data up conversion is analyzed bout in electrical and optical domain.BER for different length of fibers and immunity of system against dispersion is also simulated.
  • Session 14 Computer Technology and Development

    • Show Sections

      Hide Sections

      Fingerprint image segmentation is an important part of fingerprint image preprocessing. It located in the front-end of preprocessing, aimed at separating the image area which is poor quality in fingerprint image and hard to recover in the subsequent processing, so that subsequent processing can focus on the effective area. Segmentation processing can not only improve the accuracy of feature extraction, and can greatly reduce fingerprint preprocessing time. Therefore, the quality of fingerprint image segmentation algorithm has a very important influence on fingerprint recognition. This paper presents a fingerprint image segmentation method basing on support vector which can block the fingerprint image, and according to the characteristics of image block contrast early split, in order to remove the relatively small change gray white background, using the RBF kernel SVM classifiers to classify, obtain a good segmentation effectiveness.
    • Show Sections

      Hide Sections

      To clone the INTS2 (Integrator complex subunit 2) cDNA segment in goose, we isolated total RNA from goose liver. The 488bp cDNA segment was amplified by the reverse transcription polymerase chain reaction (RT-PCR). The obtained segment had 3 open reading frames (ORF) and two of them are separately 100% and 99% relative to the sequences of chicken. One of the segment contains 113 amino acids, 63.7% of them form helix and 36.3% loop. And the other 45AA segment contains 22.2% helix, 17.8% strand and 60% loop. Comparison analysis indicated that the nucleotide sequence and amino acid sequence of INTS2 gene segment were highly homologous to some species reported, such as Gallus gallus, Taeniopygia guttata, Ornithorhynchus anatinus ect.. Homology between Sichuan White Goose and Gallus gallus was 94%, and Taeniopygia guttata 88%. We confirmed the sequence to be segment of INTS2 gene.
    • Show Sections

      Hide Sections

      Aiming at the temperature control problems of pressroom, using CAN bus as the core design a temperature monitoring system, and propose a communication protocol to apply this system. According to the system requirements, we can set the message frame format, identifiers assignment, communication mode and realization method, give the protocol of the hardware and software design and adopt multi-frame transmission and dynamic priority allocation mechanism to ensure reliability and real-time of data transmission.
    • Show Sections

      Hide Sections

      With the development of the information technology and the wide applications of Internet, library automation in China has achieved great development. Under the new tendency and request, the Construction of Digital Library is now faced with many opportunities and challenges. This paper analyses the Resource Service and developmental trend in Digital Library, makes the library more humane to provide better services to readers and society.
    • Show Sections

      Hide Sections

      Considering the insufficiency of clustering speed which exists in the selecting the initial centroids of bisecting K-means (BKM) clustering algorithm, the idea of selecting the two patterns with distance maximum as the initial cluster centroids is implemented. The results show that the clustering speed is better than that of BKM. An in-depth study and analysis is carried out on how to accelerate clustering in parallel computing system. According to the characteristics of BKM, the parallelism algorithm based on data parallelism is put forward. Undertaken experimental results show that the improvement of algorithm get ideal speed up performance and efficiency.
    • Show Sections

      Hide Sections

      Metapattern is an approach to conceptual modelling. It is technique for meta-information analysis and modelling that emphasizes reusabilty of software. It is a framework that is appropriate to represent the real world domain. It considers context as a fundamental concept. Context is an ordered collection of objects and relationships. An object for information modelling exists in one or more contexts. Another essential principle in information modelling is time. Time helps capturing the dynamic behavior of the real world. It represents changes in states due to an event. Objects in real world exhibit dynamic behavioral features by combination of attributes and values. It is a framework that includes the concepts of context, intext and time. These concepts are suitable to describe a domain under consideration. They are applicable to various application domains. It serves both as the basis for communication and domain understanding. It is in the form of tuple and describes the application domain at meta-level.
    • Show Sections

      Hide Sections

      The integration of Internet of Things (IoT) and Information and Communication Technology (ICT) has generated an inevitable trend to construct a digital ecosystem. Considering the importance of campus education, we think that it's very necessary to build a Digital Campus Ecosystem (DCE). The DCE we proposed focuses on the informatization construction with ICT and IoT. There are abundant resources which are useful to DCE in campus. After our survey, we found that the RESTful architecture has many advantages on the construction of DCE. Thus, this paper proposes a RESTful architecture for DCE. Then we introduce the detail architecture and related technologies. At last, some specific applications are evaluated based on the DCE.
    • Show Sections

      Hide Sections

      The extracurricular sport activities are aimed to promote physical culture and build up college students' health .The activities are out of class, but with specific plans and organization. An investigation is conducted through the random sample of 400 college students by questionnaires, who study in key universities of Shanxi Province like Xi'an Jiaotong University, Shanxi Normal University and so on. The research shows a large number of students do exercise as a main part of their lives. Nearly 80% college students have the habit of sports activities (Taking exercise 3 times a week can be considered as being active in sports.)Generally speaking, the number of students doing exercises is large but they don't exercise enough and there are great difference between males and females in choice of sports, the number and the time they spend on it.
    • Show Sections

      Hide Sections

      This research explores the potential influences of 4 variables on team learning in college students' team activities. The 4 variables are team motivation, team trust, team conflict and team leadership. Selected 73 college student teams as subjects, each member of all teams finished questionnaires. Results of unitary linear regression show that team motivation, team trust, team leadership are positive predictors of team learning respectively, team conflict have negative relationship with team learning. When putting 4 variables into regression equation simultaneously, team leadership, interpersonal relationship orientated motivation are positive predictors of team learning, regression coefficient of the rest variables are insignificant.
    • Show Sections

      Hide Sections

      This paper proposes improvements for the method of Latent Semantic Analysis (LSA). The method is used to grade the English text automatically. But, there are still many deficiencies to be improved. Firstly, one important factor that affects the quality of LSA is the weighting method to the term-document matrix. The weighted function directly influence the results of the final score which calculated by the computer. Secondly, Probabilistic Latent Semantic Analysis (PLSA) is also applied to the automated grading model (AGM). In contrast to standard LSA by Singular Value Decomposition, the probabilistic variant has a solid statistical foundation and defines a proper generative data model. The experiments indicate that the result of the improved model has proven to be more precise.
  • Session 15 Computer Technology and Development

    • Show Sections

      Hide Sections

      Theory for the construction of non-finite systems on finite platforms promises bright future for some scientific fields. Among them, are the Artificial Neural Networks — ANNs. These have found important obstacles to obtain representational and symbolic capacities. The new architecture proposed shows important advance (phase of mathematic modeling and prototyping) to surpass several of them. Relevant propositions on world representing and interpreting are displaced and might be solved by the Interactive Neural Networks — AINN. The first results from researches allowed attaining important probes of concept: selfmorphogenesis; singularity; autonomous expansion of world representation.
    • Show Sections

      Hide Sections

      In a specific domain, the attributes or mutual relationships connected with realistic objects are often variable dynamically and especially partially. For multi-objective categorization [2], it has been a research hotspot how to rapidly update the categorized result with the partial variations. Aiming at this problem, we propose an approach for dynamic multi-objective categorization based on the game theory, partially updating the influenced part, measuring the object's satisfaction degree by Shapley value, and improving the efficiency of calculating Shapley value by the concept of priority groups. The experimental results and the performance analyses show its better efficiency and effectiveness.
    • Show Sections

      Hide Sections

      The Enping Industry Transfer Park, at present, in the initial period of development construction, will be the local economic growth poles in the Enping City or the Jiangmen Zone. However, with so many problem, Keeping land use in the scientific and rational way plays an important role in The EITP development, and there may be issues of land use forecasting, analysis and research to guide reasonable and effective planning. Under the rule of “sustain development”, Land Administration and the other relevant development and planning units will try to make the EITP to be environment-friendly zone with the reasonable planning.
    • Show Sections

      Hide Sections

      Interaction is the key to the construction of elite courses in universities. It is one of the important methods to realize the participation of teaching as well as the participation of all kinds of elements in the study activities. There are existing problems during the interaction process when carried out the featured courses in universities. Make analytical study on the existing problems as well as the multidimensional interaction model of the featured courses in universities. In this way, it is able to raise the application efficiency of the featured courses in universities with a rapid speed. The construction of the featured courses can therefore get sustainable development.
    • Show Sections

      Hide Sections

      The traditional temperature measure methods of Overhead Contact Line (OCL) could not satisfy the requirement of measuring precisely and transferring rapidly. Thus, based on ZigBee wireless sensor network and GPRS communication technology, a new temperature monitoring system was presented in this paper. The system consisted of temperature collection terminal, routing concentrator and GPRS coordinator. According to the characteristics of connectors distribution of OCL, a three-layer network was proposed, which could transfer the collected temperature data remotely. The related hardware schemes and software flows were given. Test results showed that this system could effectively collect and transfer temperature data.
    • Show Sections

      Hide Sections

      Now a day we are facing the increase in the quantity of digital photos in the web further more numerous web sites hosting various images of individuals & groups, as an illustration we can point to the most popular ones like Flickr™ & the FaceBook™. But the drawback we are encountering is annotation of those photos which is done based on visual features of the issue. In this article we are proposing a new approach to use the existing images in Photo sharing & social networking web sites originated from human annotation which makes us capable of searching family member's pictures in the most possible efficient trend. The offered algorithm is based on the familial ties which make it possible to access distant members of an individual's family via his/her close relatives regarding the fact that the applicant must run his /her search through the cannel of close family members. Our empirical evaluation highlighted the fact that this approach can be considered as another step forward to help people in their search for their beloved ones.
    • Show Sections

      Hide Sections

      Nowadays, the global internet system affects human society in many ways since its information resources and services can be accessed from almost anywhere throughout the world. Many organizations worldwide carry on their business using the internet in order to easily connect with their customers and lead efficient operations. Electronic business or e-business seems to be popular for internet applications. Therefore, many software applications and information systems have been implemented on the internet to support e-business. However, e-business applications need to meet the rapid changes and requirements of internet users. Traditional methodologies of software development seem to fall short of satisfying the great need for e-business systems. In this paper, we propose a framework of an e-business system using agile methodology. On-line OTOP stores in Thailand were selected as a case study to demonstrate the implementation of our framework. The implemented system was tested and evaluated in our laboratory. The system evaluation by the selected subjects show the satisfactory results.
    • Show Sections

      Hide Sections

      The global network is being attacked in the first half of the year 2011. These events are happening with increasing frequency and arouse some thoughts of the author. This paper shows the reflections of the author on the effective way to counterattack the hackers.
    • Show Sections

      Hide Sections

      Modularity of ontology is currently an active research field. In order to solve the difficulties in maintaining and application in huge data structures course ontology, construct the ontology with the idea of modularization from software engineering. Modularization is a familiar notion, which widely used in e.g. software development. We integrate multiple distinct but linked ontology modules into an integrated ontology, construct modular data structures course ontology according to ε — Connections theory. The approach should enable effective knowledge reuse and share on the Semantic Web.
  • Session16 Computer Technology and Development

    • Show Sections

      Hide Sections

      After some embedded product sale, technical staff could enter into command line mode to debug when the device breaks down. Consequently, there is everything to prevent others entering into U-Boot. The paper analyzes the U-Boot startup process detailed and designs user authentication for U-Boot based on AT91SAM9260 platform. Analyzing the U-Boot startup process ensures that adding code would not affect the stability of U-boot. At last, paper shows the design of the operating results and illustrates the significance of adding user authentication to U-Boot.
    • Show Sections

      Hide Sections

      Photomosaic is a combination which consists of Art and Image Processing techniques. In which, the input image is divided into rectangular grid and replaced by thumbnail images while maintaining the overall appearance. The typical Photomosaic algorithm searches from a large dataset of images one image that best matches each tile of the input image. The quality of the output Photomosaic depends on the integrity of dataset which cannot be built conveniently. In this paper, we propose a strategy based on color simulation to create a integrate dataset with a limit number of thumbnail image. According to some experiments, the interesting Photomosaic-style images are generated with our proposed dataset.
    • Show Sections

      Hide Sections

      We present an algorithm for generating Poisson-disk patterns taking O(N) time to generate N points. The method is based on a grid of regions which can contain no more than one point in the final pattern, and uses an explicit model of point arrival times under a uniform Poisson process.
    • Show Sections

      Hide Sections

      The distributed search engine is the development direction of search engine technology. This paper introduces the Hadoop, which is a distributed system architecture of the open source, and introduces the process of deploying a distributed search engine, which is based on hadoop and nutch, a web search engine of open source.
    • Show Sections

      Hide Sections

      A traffic flow model for the city main road is established under the traffic light delay control, in which the dynamic behavior of the traffic flow is studied. The master expression of the arrival time is derived in terms of nonlinear maps with three dimensionless parameters: cycle time, offset time and acceleration. The impact of traffic lights delay control is investigated by analyzing the variation process of travel time. Utilizing the Matlab software, the nonlinear dynamic motion of a vehicle moving through the traffic lights is shown in the simulation. The results are explained reasonable in theoretically with real traffic flow.
    • Show Sections

      Hide Sections

      The influence of Aeolian vibration is a common problem in the overhead transmission line. It sometimes leads the conductor wire broken off. All of these will threat the safe operating of transmission line. Researching on fatigue property and Aeolian vibration performance, and then predicting the life of wire, provide a concrete support to formulate an effective measure of anti-vibration. Bending amplitude and Dynamic bending strain can be calculated and computed by our monitoring model depending on the generating principle combined with the bending amplitude method in this paper. A prototype monitoring system is developed to realize the effectiveness of our model.
    • Show Sections

      Hide Sections

      When the generator starts up in frequency conversion, there is high harmonic in electricity. The generator stator and rotor coupling rigid model has been established. In this condition, high harmonic magnetometive force has been expressed and the component parts of electro-magnetic have been obtained. Double resonance has been analysis using energy numerical method. The first approximation solution and the transient process curve have been acquired, as well as the effect of electromagnetic damping and electromagnetic force to resonance. There will be practical value to the investigation on low frequency resonance of generator,.
    • Show Sections

      Hide Sections

      Wireless ad hoc networks are very important in modern communication fields, in which routing protocols have been a hot research. AODV protocol has an important role in ad hoc networks. However, AODV uses flooding to find routes, and let the route from which receives the first RREP be the best routing, which means that the shortest time is the best. This mechanism is a reactive routing with expensive cost of time, and it does not have adaptive capacity to the network environment. In this paper, the solution of combining AODV with reinforcement learning is designed to make the improved AODV (which is called QAODV (Q-routing of AODV)) be adaptive to network environment. The node can reduce the frequency of finding routes by multi-path approach by QAODV. The simulation results show that latency and packet loss rate (PLR) of the improved routing protocol is significantly improved.
    • Show Sections

      Hide Sections

      The Social Force Model is one of the Microscopic Pedestrian Simulation Model that is used to study the movement of pedestrians. Many modifications have been proposed as improvements to this model. One of these modifications involves the respect factor which is a constant value that was incorporated into a self-stopping mechanism that allows a gradual stop of the pedestrian in a crowd. The dynamic respect factor which is an improvement to the respect factor is dependent on the density of the walking area of the pedestrian. In this paper, we study the impact of age based parameters to the dynamic respect factor. We increased the dynamic respect factor for elderly pedestrian which increases their respect area. The results obtained showed that the dynamic respect factor is able to modify the respect area which provides realistic results which conform to the real situation.
    • Show Sections

      Hide Sections

      Optimization of the pulping process without laborious modeling is crucial for efficient and economical designs purposes. In this study, wavelet neural networks (WNNs) were utilized in investigating the influence of the pulping variables (viz cooking temperature and time, ethanol and NaOH concentration) on the properties of the resulting pulp (pulp yield and kappa number) and paper sheets (tensile index and tear index) during the organosolv pulping of the oil palm fronds. The experimental results and the statistical estimators indicated that the WNNs fitted the underlying relationship between the dependent and independent variables well, where the prediction error less than 0.0965 (in terms of mean squared error) was obtained.
  • Session 17 Computer Technology and Development

    • Show Sections

      Hide Sections

      In this paper, the authors, by use of document consultation, comparative analysis and other methods, carry out an comparison on the development and course construction of physical and health education at Chinese and foreign schools, and discover that a systematic and coherent body and mind health education system from primary schools to middle schools has been formed within developed countries. However, compared with these developed countries, China is still relatively backward. In terms of the course construction, there is still a certain difference between China and developed countries in many aspects such as discipline position, course objective, course content, teaching materials, faculty and policy support, and hence impose restrictions on the development of physical and health education at Chinese schools. According to the conditions of China, the authors put forward the countermeasures of changing the backwardness of physical and health education at Chinese schools through the introduction of the successful foreign experience, including the establishment of health education discipline, the determination of course objective, the improvement of course content, the enhancement to teaching materials in health education, the establishment of course evaluation system, the reinforcement of the faculty quality, and the intensification of the supports by policies.
    • Show Sections

      Hide Sections

      Accelerated advancement in the field of System-on-Chip necessitates solving the bus contention in a most efficient manner. In any real time computing system, the major challenge is to reduce the latency of the system and to achieve a fair bandwidth allocation. Implanting processors according to their traffic behavior on to the Adaptive Arbitration architecture can be one of the feasible options to tackle the aforesaid problems to a remarkable extent. This combination of Adaptive Arbitration and the processors according to their traffic behavior has interesting advantages compared with other conventional arbiters due to its fair bandwidth allotment and low system latency. This article provides a comprehensive picture of the global scenario of Adaptive Arbitration algorithm for fair bandwidth allocation so as to enable researchers to decide the direction of further investigation. Some of the works published so far in this area are reviewed, classified according to their objectives and presented in an organized manner with a final conclusion.
    • Show Sections

      Hide Sections

      Markov Random Field (MRF) is known to be a fault-tolerance design technique that transforms simple CMOS to MRF-CMOS digital circuits. The transformed circuits are thus extremely noise-tolerant i.e. in presence of extreme noise interference; the output current levels have un-noticeable distortion. Although this technique has proved to be a solution for thermal noise only; we have extended the noise-tolerance capability of MRF circuits for flicker noise in this paper. The integration of thermal and flicker noise generates complex and time-consuming simulations that have been performed on Cadence-Virtuoso simulation software. Results show that the MRF design is elegant enough to cater both kinds of noise.
    • Show Sections

      Hide Sections

      With the wide endorsement of the Android intelligent terminal, Android platform has made a global fame, which has also urged all the major cell phone operators launch 3G Android phone. The highly-praised Android smart terminal has soon become a platform of Internet entertainment, television and online video viewing. However, the born frame of Android's Opencore is not easy to extend which leads to the inability to play the current mainstream streaming media and video format properly. The paper designs an RTSP streaming media player on Android platform based on Ffmpeg & Live555, which has inherited the advantage of Ffmpeg for supporting multi-format encoding, and meanwhile supports the standard RTSP services.
    • Show Sections

      Hide Sections

      Cai Dongfan is the most important novelist of historical novel in Chinese modern history, his “Popular Historical Novel of China's Past Dynasties” with 11 volumes and 7 million words has become a permanent best seller. But Cai Dongfan' thoughts and writings are always not regarded by the people, then many writings of Cai Dongfan in his life can not be ascertained.This paper carries out more complete combing on the writings of Cai Dongfan in his life from various aspects such as educational writings, historic works, short stories and miscellaneous literature.
    • Show Sections

      Hide Sections

      With Gaussian mixture autoregressive model, the probability density and power spectrum density of non- Gaussian colored processes can be fit. Its parameters can be estimated through the ML-DC algorithm. After descriptions of the model and the estimation problem, maximum likelihood estimation of autoregressive parameters and the dynamic clutter algorithm for Gaussian mixture parameters are deduced, respectively. Based on them, ML-DC algorithm for coupling estimation between power spectrum density parameters and probability density parameters is built up. Finally, a numerical instance in simulation is illustrated where performance of estimation is discussed in detail.
    • Show Sections

      Hide Sections

      with the rapid development of internet, planning the traveling online through travel e-commerce is accepted by more and more people. Traditional traveling company will mainly focus on the promotion and publicity of the tourism products, few attentions are paid on the customer preference analyzing, which hinders the further application of travel e-commerce. Regarding this problem, this paper presents a Bayesian network based user preference and profile analyzing algorithm which can be used to predict user behavior according to the model trained by history data. The simulation experiment can validate the validity of the method proposed.
    • Show Sections

      Hide Sections

      An extensive interest in the numerical simulation of supersonic combustion ramjet engine (scramjet) has been aroused among researchers at present. Nevertheless, the traditional serial simulation model cannot meet the requests of current researches, such as millions of computational grids and hundreds of reaction processes. In this paper, we study on a general algorithm for scramjet design, and bring about parallelization by using a two-level hybrid parallel programming model. The method includes message passing for inter-node communication (MPI) and compiler directives for intra-node parallelization (OpenMP). Finally, parallel efficiency on a China-made supercomputer with 4 to 256 cores is compared with pure MPI program. The result indicates that our hybrid parallel model is simple, effective and practical in scramjet simulation.
    • Show Sections

      Hide Sections

      As internet has become one of the most important access to information for peoples daily life, ensuring the authentication of the images transmitted in internet is of great importance. However, current image identifying technology can not satisfy the requirement on efficiency and accuracy of mass image authenticating in the internet environment. Regarding this problem, this paper proposed a SVM based image identifying algorithm which can be deployed in the network environment with the help of cloud computing architecture. With the algorithm described, mass images can be crawled from internet, the identifying model can be trained automatically and new coming image can be authenticated swiftly.
    • Show Sections

      Hide Sections

      Based on characteristics of data distribution in the low dimension nature, this paper studies the effect of manifold embedding technology used in typical industrial data set analysis, and manifold learning theory was introduced into the visualization data mining to help get quick effective information in a large number of data. Cognitive process with the help of that information reduces the difficulty of analysis and improves the data utilization efficiency, having a high value in engineering application.
  • Session 18 Computer Technology and Development

    • Show Sections

      Hide Sections

      Chuangtse's “Peripateticism” is designed to express the keynote by way of “gaming”, and its literary meaning can be described as “liberal gaming's activities” or “spiritually free roaming”. There exists comparability between Chuangtse's “Peripateticism” and Western “Gaming theory”. There is no fundamental clash between Chuangtse's “utility of futility” and Kant's aesthetics disinterestedness; and Chuangtse's “roaming beyond the mundane world” finds an echo in Schiller's “gaming impulse”.
    • Show Sections

      Hide Sections

      Ozone concentration and ultraviolet radiation intensity as the plants important stress factors are more and more widely applied in the study. But uv light continuously release ozone which can cause ozone concentration variable, this cannot satisfy the requirements of the single factor in some experiments. Therefore, the real-time measurement and control of the two environmental factors are particularly important. This paper designs a system based on μC/OS-II embedded operating system and chooses LPC2478 of ARM7 series as microprocessor. Through the fuzzy adaptive PID algorithm, ozone concentration is realized real-time control. Compared with the traditional PID, the control accuracy is improved.
    • Show Sections

      Hide Sections

      Contourlet transform is a non-tensor product special transform and has better performance in directional information representation than wavelet and superior to wavelet at retrieval application fields. In order to improve the retrieval rate further, we will propose a new contourlet transform based texture image retrieval system in this paper. In the system, standard deviation, energy, skewness and kurtosis of each subband coefficients in contourlet domain are cascaded to form feature vectors, and the similarity metric is Canberra distance. Experimental on a 109 texture image database from MIT results show that this contourlet transform based image retrieval system is superior to that of the contourlet transform with energy and standard deviations features widely used today under the same system structure.
    • Show Sections

      Hide Sections

      Let G(V,E) be a simple connected graph, and |V(G)| ≥ 2. Suppose k, β are both positive integers and f is a mapping from V(G)∪E(G) to {1, 2, …, k}, such that 1) uv∈E(G)(u ≠ v), f(u) ≠ f(v); 2) uv∈E(G)(u ≠ v), dG(u,v) ≤ β, where dG(u,v) denotes the distance between u and v, we have C(u) ≠ C(v), where C(u) = {f(u)}∪{f(uv)|uv∈E(G)}. Then f is called a k-D(β)-vertex-distinguishing EI-total coloring of G. In this paper we study the upper bounds for the D(β)-vertex-distinguishing EI-total chromatic numbers by the probability method and prove that χβvtei(G) ≤ 32Δ(β+2)/Δ when Δ ≥ 5, β ≥ 4.
    • Show Sections

      Hide Sections

      Formwork and scaffold system are particularly in the majority of hazardous sub-part and sub-tem projects. In the process of expert evaluation, many problems are found in the special construction programs established by the construction units, such as incomplete establishment contents of special program, calculation errors, etc. For these problems, the corresponding solutions are presented.
    • Show Sections

      Hide Sections

      The Internet is used by international insurgents, jihadists, and terrorist organizations as a tool for radicalization and recruitment, a method of propaganda distribution, a means of communication, and ground for training. Although there are no known reported incidents of cyberattacks on critical infrastructure as acts of terror, this could potentially become a tactic in the future. There are several methods for countering terrorist and insurgent information operations on the Internet. In this paper, the Terrorist Attack dataset using three-layer neural network trained and it is evaluated LBK method with the classification. According to the results which are obtained through three-layer neural network approaches to the methods it has better compare performance.
    • Show Sections

      Hide Sections

      Problem-Based Learning is an instructional method of learning that is widely acknowledged and applied in Higher Learning Institution. Problem-Based Learning is one of the pedagogy approaches that enable students to work in groups to solve real-life problems, whilst the lecturer takes on the role as a facilitator of learning. An effective assessment is one of the success factors for implementing Problem-Based Learning. A proper mechanism is required to identify the measure on which students will be judged aligned with the learning objectives. Thus, this study focuses on the formative evaluation in assessing the initial and ongoing activities in problem solving, together with result or outcome of the problem solution. Rubrics are the acceptable tools for formative evaluation process, but the manual rubrics process makes evaluation data collection, grading and summarization difficult to be implemented. Thus, a customizable rubrics tool should be developed to bear in facilitating these processes. In this paper, we present a design of customizable rubrics tool for supporting formative evaluation of Problem-Based Learning courses. The customizable rubrics tool enables the lecturer to customize their rubrics for any evaluation components. This core functionality allows lecturer to create the evaluation rubrics by defining the evaluation component, criteria or attribute, level of performance, weight, descriptors and other additional rubrics items. This will facilitates the lecturer to generate their own evaluation forms that correspond to any course contents. Design elements including Unified Modeling Language diagrams, Entity-Relationship Diagram (ERD) and tool interfaces will be discussed thoroughly in this paper.
    • Show Sections

      Hide Sections

      In dominant many-core system, NoC (Network on Chip) also requires fault tolerance configuration for dependable communication. Compared with payload error, transient routing error causes fatal problems, such as packets delivered to wrong destination, network deadlock due to routing algorithm or topology forbidden. We propose a light weight redundancy method to solve transient NoC routing error: 1) configuring routing information with TMR (Triple Modular Redundancy) only for head flits; 2) exploiting inherent hardware and time redundancy for reliable routing computation. And the simulation results from cycle accurate platform show that this method brings higher routing error recovery rate with less performance loss and overhead than other fault tolerant mechanisms.
    • Show Sections

      Hide Sections

      In this paper, the authors carry out an introduction to the principles and methods of implementing the three-dimensional (3D) scene rendering and interactive functions by the component technology under the .Net environment and give a detailed explanation to this implementation process through a case. In other words, under the .Net environment, C# is used to encapsulate the rendering and interactive functions which create all the graphics of the three dimensional scene into the different components, and subsequently the window procedures are used to call these components to implement the rendering and interaction of the 3D scene.
    • Show Sections

      Hide Sections

      Within social networks, the behaviour of one member regards the other members of the community as well. Their comportment can generate a relationship among the members that is based on trust [6]. Therefore, a trust-based behavioural evaluation model will be created, in order to establish the position of each member of the social network. This evaluation can result in earning rights or, on the contrary, in the loss of the membership status.
  • Session 19 Computer Technology and Development

    • Show Sections

      Hide Sections

      Multi-frame super-resolution reconstruction aims to fuse several low resolution images into one image with high optical resolution. In this paper, a new regularization-based multi-frame image super-resolution algorithm is presented. Utilizing the gradient directional information, the proposed algorithm uses the gradient vector flow to measure the gradient consistency between the high-resolution image and low-resolution images. Experiment results show that the proposed algorithm achieves better performance than other multi-frame image super-resolution methods.
    • Show Sections

      Hide Sections

      Steganography is the science of hiding information by embedding messages within cover medium so that the existence of the message is concealed. LSB is the most common method of image steganography that represents a high embedding capacity but it is detectable by statistical analysis such as RS and Chi-square analyses. Therefore, a novel LSB algorithm proposed that can effectively resist image steganalysis based on statistical analysis. This paper, proposes a hardware realization of this new algorithm which is designed for one to four bit insertion. Furthermore, a novel combinational message bit randomizer is designed for security improvement.
    • Show Sections

      Hide Sections

      In this paper, we proposed a novel application based on digital image processing model in Freight Train Inspection (FTI) system. Each wagon image of freight train is captured by enterprise Automated Train Scanning System (ATSS). The main challenge of this application is automatically detecting the appropriate region of interest on the image for inspection. To address this problem, the improved adaptive multi-scaled retinex (MSR) and K-mean clustering methods are applied for image enhancement and positioning techniques. In the experimental the proposed model were found to improve the segmentation efficiency, thereby the result of inspection is optimized. The evaluation result also demonstrated the good system performance when the application is implemented using Vision Services Oriented (VSO) framework.
    • Show Sections

      Hide Sections

      In this paper, the authors select the freshmen and sophomores, who are learning at the pilot college, as the objects of the empirical analysis, and then integrate the online self-learning listening with the teaching of the classroom listening skills. In other words, the integrated learning strategy is utilized to impart the English listening skills at the classrooms. Through this empirical analysis, the authors finally attained a result that that the application of the integrated listening strategy can exert an effective influence on the improvement of the English listening ability of pilots.
    • Show Sections

      Hide Sections

      In order to acquire selective pressure analysis of Leptospira_Interrogans_Serova_Lai using the concept of gene duplication, synonymous and non-synonymous substitution based on differential equation is used to analysis the selective pressure in this paper. By introducing the gene duplication, the model can rationally acquire the selective pressure of the duplicate genes, comparing the rates of synonymous and non-synonymous. The result shows that early in their history for Leptospira_interrogans_serovar_Lai, many gene duplicates experience a phase of relaxed purifying selection, subsequently selection constraint gradually increases and eventually tended to the stability.
    • Show Sections

      Hide Sections

      In this paper, we present a planar segmentation technique based on planar patches for 3D Registration. First, an existing neighborhood definition, which is based on the co-normality and co-planarity of the planar, is adopted. The neighborhood of a given point is defined as neighboring points that belong to the same planar segmentation. Then we compute the transformation using Quarternion between the two coordinate systems and achieve the registration of these two range images.
    • Show Sections

      Hide Sections

      The Physical aspects of any fluid flow are governed by three fundamental principles: Mass is conserved; Newton's second law and Energy is conserved. These fundamental principles can be expressed in terms of mathematical equations, which in their most general form are usually partial differential equations. Computational Fluid Dynamics (CFD) is the science of determining a numerical solution to the governing equations of fluid flow whilst advancing the solution through space or time to obtain a numerical description of the complete flow field of interest. The governing equations for Newtonian fluid dynamics, the unsteady Navier-Stokes equations, have been known for over a century. However, the analytical investigation of reduced forms of these equations is still an active area of research as is the problem of turbulent closure for the Reynolds averaged form of the equations. For non-Newtonian fluid dynamics, chemically reacting flows and multiphase flows theoretical developments are at a less advanced stage.The development of more powerful computers has furthered the advances being made in the field of computational fluid dynamics. Consequently CFD is now the preferred means of testing alternative designs in many engineering companies before final, if any, experimental testing takes place.
    • Show Sections

      Hide Sections

      This thesis will try to solve the problems of foreign trade development in Wuhan cities circle, and the countermeasures will also be mentioned in this thesis. This thesis will start with the analysis on status of foreign trade development in Wuhan cities circle. The Study shows that we should develop foreign trade of Wuhan cities circle from the structure of the industry chain and business chain, and the establishment of Wuhan cities circle which is established as the test region of comprehensive coordinated reforms of two-oriented society made a new stage of the strategic orientation of the central region in China, so Wuhan cities circle will be the base of shifting foreign trade industry in the ongoing industry shift of China.
    • Show Sections

      Hide Sections

      Web Quality Model (WebQM) is formalized and empirically studied based on Structure Equation Modeling (SEM) approach in this paper. By building the sample data set and constructing the structure equation model, the goodness-of-fit of WebQM is analyzed. The result shows that WebQM fits the real Web source quality data well and is feasible and effective.