0

International Conference on Advanced Computer Theory and Engineering, 4th (ICACTE 2011)

  • Author(s)/Editor(s):
  • Published:
    2011
  • DOI:
    10.1115/1.859933
Description | Details

Proceedings of the 4th International Conference on Advanced Computer Theory and Engineering (ICACTE 2011), December 28–30, 2011, Dubai, UAE. The theme of the 4th ICACTE is to discuss the new developments in computer theory and engineering, and to promote new applications. ICACTE 2011 brings together leading engineers and scientists around the world, to present their research results and development activities in Computer Theory and Engineering. This conference provides opportunities for the delegates to exchange new ideas and application experiences face to face, to establish business or research relations and to find global partners for future collaboration.

  • Copyright:
    All rights reserved. Printed in the United States of America. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher. ©  2011  ASME
  • ISBN:
    9780791859933
  • No. of Pages:
    840
  • Order No.:
    859933
Front Matter PUBLIC ACCESS
PDF
  • Session 1 Physics Science and Technology

    • Show Sections

      Hide Sections

      In the present work, composites were prepared by combining nano sized Co3O4 and poly (vinyledene fluoride) (PVDF), using spin coating technique. The surface of the PVDF/Co3O4 system characterized through Field Emission Scanning electron microscopy (FESEM) revealed a porous structure of the films. The nanoparticles tend to aggregate on the surface and inside the pores, leading to a decrease in the porosity with an increase in Co3O4 content. Co3O4 nanoparticles prohibit crystallization of the polymer. Differential scanning calorimetry (DSC) studies revealed a decrease in crystallinity of PVDF/Co3O4 system with an increase in the oxide content. Magnetic property studies of the composite films revealed that with an increase in Co3O4 content, the saturation magnetization values of the nanocomposites increased linearly, showing successful incorporation of the nanoparticles in the polymer matrix.
    • Show Sections

      Hide Sections

      Mass production of carbon nanotubes (CNTs) on an easy soluble support has been achieved by chemical vapor deposition method. CNTs have been synthesized using nickel formate as catalyst precursor at 700°C. The structure of the grown product was characterized by scanning electron microscopy, transmission electron microscopy, Raman spectroscopy and X-ray diffraction method. The purity of as grown product and purified product was determined by thermal analysis. The yield of CNTs was up to 8300 wt% relative to the catalyst have been achieved in the growth time of 15 mins. The purified product was decorated by palladium nanoparticles by solventless method. The palladium decorated CNTs were characterized by scanning electron microscope and X-ray diffraction method. The advantages of these routes are the simplicity and use of easily available low cost precursors.
    • Show Sections

      Hide Sections

      Experiments in the field of particle physics produce vast amounts of data which need to be stored and processed. Reliable and efficient data acquisition system is therefore an integral part of these experiments. This article presents the database optimization work that has been done on the COMPASS experiment operating on the Super Proton Synchrotron particle accelerator in CERN (European Organization for Nuclear Research) in years 2010 and 2011. Authors present the complex optimization methodology step by step, with the belief that such procedure can and should be successfully re-executed on any other complex database system, where enhancing speed and reliability of the data management becomes a task of extreme importance. The database service of the COMPASS experiment suffered from the overload during the 2009 run, thus it has been decided to update the entire database system in all aspects, from hardware improvements through new architecture and software upgrades to storage engine optimization, reviewing table structures and query performance tuning. In this paper, the proposal and the implementation of these new improvements is presented. The updated architecture employs replication, continuous monitoring, and regular backups to achieve high reliability and availability of the database service. Improvement process is described in detail and the performance of the new system is evaluated.
    • Show Sections

      Hide Sections

      Conducting particles in a coaxial duct are responsible for a large part of the failures registered in gas insulated systems. Electrical insulation performance of Gas Insulated Systems (GIS) is adversely affected by metallic particle contaminants. These particles get into the system accidentally during GIS assembly and they start vibrating during shipment. As free particles, they move under the action of electric field and then can adhere to the conductor or insulating spacers. These free conducting particles cause high field distortions. These particles produce surface charges due to partial discharge activities. Co-axial duct placed in a high pressure chamber is used for the purpose. This paper deals with the effect of Copper and Nichrome particles introduced inside the co-axial duct on the Partial Discharge characteristics of the co axial duct in SF6-N2 gas mixture in the ratio 10:90 at gas pressures of 0.1MPa. The discharge characteristics as a function of the voltage are discussed in this paper.
    • Show Sections

      Hide Sections

      Spin-down of a neutron star changes the relative equilibrium concentration and causes deconfinement phase transition as well. Thus, there are two channels through which the beta equilibrium is violated. One is the direct contribution of spin-down compression. Another is the contribution of the deconfinement phase transition. We study the direct contribution of the spin-down compression in chemical deviations and thermal evolution in stars containing mixed-phase matter. Results imply that the direct contribution of spin-down compression is not important for rotochemical deviations in stars containing mixed-phase matter.
    • Show Sections

      Hide Sections

      Set of W-doped Ga2O3 thin films were prepared by vacuum evaporation method on glass and silicon substrates. The molar ratio of dopant W to host Ga was measured with the X-ray fluorescence (XRF) micro radiographic analysis to be 9.6%, 13.4%, 18.2%, 22.7%, and 30.4%. The crystalline state of the oxide films was determined by the X-ray diffraction method (XRD). All the oxide films deposited on silicon substrate have amorphous structure while those deposited on glass substrate have crystalline - Ga2O3 structure, which shows that the WO3 material was totally doped in the lattice of Ga2O3 forming solid solution (SS). The electrical properties of the prepared SS's were studied for samples made in form of MOS, Au/SS/Si configuration. It was observed that W-doping with certain level reduces the dielectric constant of Ga2O3:W film to less than that of SiO2, i. e. the doping with W turns the high-k gallium oxide into lowk dielectric material. The dielectric relaxation of the SS was studied through the complex dielectric permittivity ε*; from which ε∞′ and the most probable relaxation time ( ) as a function of W-doping level was determined.
    • Show Sections

      Hide Sections

      Theoretical consideration of Collisional Electron Spectroscopy (CES) for gaseous media analysis and experimental results on CES sensor are presented. It is demonstrated that a diffusion path confinement for characteristic electrons provides a possibility to measure electrons energy distribution function (EEDF) and to find characteristic spectra of species at high (up to atmospheric) gas pressure. Simple micro-plasma CES detector of two plane parallel electrode configuration with current-voltage measurement in afterglow of helium glow discharge may be designed to operate at a high gas pressure up to atmospheric one. Experimental electron energy spectra of pair He metastables collisions in dependence of inter-electrode gap are discussed.
    • Show Sections

      Hide Sections

      The need for quasi-static indentation test method for modeling low-velocity foreign object impact events would prove to be very beneficial to researchers. In order to examine whether it is feasible, series of quasi-static indentation and low-velocity impact tests were carried out and compared. An analysis of the relationships between impact energy (or quasi-static indentation force) and damage area, dent depth indicates clearly that dent depth was selected as the damage parameter to set up damage relationship between the two tests. The knee points of dent depth appearing in the two tests curves were very close. The variation tendency of the dent depth, the process curves and the cross sectional damage views of the two tests were in similarity. Results show that no distinct differences could be seen between low-velocity impact and quasi-static indentation testing, indicating that quasi-static indentation testing can be used to represent low-velocity impact testing.
    • Show Sections

      Hide Sections

      A Monte Carlo model of Elekta iViewGT amorphous silicon electronic portal imaging device (a-Si EPID) has been validated for pre-treatment dose verification of clinical IMRT treatment plans. The simulation employed BEAMnrc and DOSXYZnrc MC codes to predict the dose deposition in the iViewGT a-Si EPID model. The predicted dose distributions were compared to the measured dose distributions obtained from the experiment. The measured EPID images were obtained by delivering a photon beam from Elekta Precise linac to the Elekta iViewGT a-Si EPID. The a-Si EPID was used as non-transit dosimetry with no extra build-up material placed above the EPID detector. The EPID images were acquired using frame-averaging acquisition and were processed using in-house application software. The agreement between the predicted and measured dose distribution was analyzed using the gamma analysis technique with the acceptance criteria of 3%, 3 mm. The results show that the predicted dose distributions of four clinical IMRT treatment plans have a good agreement with the measurement. Three prostate IMRT plans have the average gamma pass rate more than 95% and a spinal IMRT plan has the average gamma pass rate of 94.27%. Overall, Monte Carlo simulation shows a suitability to be implemented for pre-treatment dose verification, promising a better accuracy than the existing algorithms in Treatment Planning System (TPS).
  • Session 2 Physics Science and Technology

    • Show Sections

      Hide Sections

      Samand is one of the numerous vehicles in Iran. Also this vehicle is national vehicle of Iran. According to these it is necessary doing a complete research about slider-crank mechanism because of high expensive repair and replacement of these parts and their effect on the other parts like cylinder block and piston. In this regard, this paper presents the cinematic and kinetic analyses of the crank mechanism. Besides crank mechanism cinematic analysis, kinetic analysis of the connecting rod was done with regard to the forces resulting from ignition pressure, mass distribution in the crank mechanism as well as inertia forces (reciprocating forces and rotational masses). At the end, the graphs of displacement, speed and acceleration of piston, and also the graphs of ignition pressure, forces on piston, forces on connecting rod and forces on bears in one complete cycle according to the crank angle were drown by MSC/ADAMS/ Engine software.
    • Show Sections

      Hide Sections

      Protection of metal substrate from the severe attack by corrosion has been as a tough and challenging area of research for long time. However, there are different methods have been employed to prevent corrosion but the complete protection cannot be achieved for longer period. Combination of different organic resins can be a better choice for the improvement of anticorrosion property as such in this paper, two organic resins were chosen to formulate hybrid coating system. Different combinations of the resins were blended. Polyisocyanate was used as the hardener. The crosslink network formation between silicone and polyester resins was explained by Fourier Transform Infrared Spectroscopy (FTIR). FTIR results reveal the crosslink formation between the resins. NH bond, Si-O-Si, Si-O-C functional groups formations have been explained. The binder materials have good mechanical property which was studied by cross hatch test. The corrosion protection ability was evaluated by Electrochemical Impedance Spectroscopy (EIS) by exposing the samples to 3% NaCl solution. EIS experimental results show that the coatings could withstand the corrosive atmosphere for more than 30 days of exposure and having the resistance values more than 106 ohms.
    • Show Sections

      Hide Sections

      In this study, detailed load analysis under service loading conditions was performed for connecting rod of MF-285 tractor engine (by using the Mathematica software), followed by finite element analysis (FEA) to capture stresses and fatigue cycle (by using ANSYS software). The results of the study shows that maximum tensile stress occurs on the small end of connecting rod caused by inertia loads and friction between piston pin and connecting rod bush and equals 280 MPa, maximum compressive stress occurs on the big end of connecting rod caused by preload of screws and equals 165 MPa. In new connecting rods whit structure like structure of this connecting rod stresses are between 160 to 250 MPa. Fatigue cycle was calculated equal 108 cycles. Proper fatigue cycle for connecting rods equals 108 to 109. According to that maximum stresses was more than common rang, seems it caused to happen least fatigue cycle. According to results of this study, it could be proposed to lessen friction between piston pin and connecting rod bush, changing in manufacture process, changing in connecting rod material, optimization of reciprocating mass and increasing the diameter of small end of connecting rod to redesign and optimize the model for better resistance under hard loads.
    • Show Sections

      Hide Sections

      Samand is one of the numerous vehicles in Iran. Also this vehicle is national vehicle of Iran. Above reasons necessitate a complete research about different component of engine of this vehicle. In this study, detailed load analysis was performed for connecting rod of Samand engine, after that in order to calculate stress in connecting rod, the connecting rod was modeled then was meshed and finally calculated forces were exerted on connecting rod in ANSYS software. The maximum stresses in different parts of Samand connecting rod were determined. Results of this research can be effective for optimization of connecting rod.
    • Show Sections

      Hide Sections

      In this study a thermal Lattice Boltzmann model with nine velocities, D2Q9, was employed to investigate the effects of porous block and its location, and flow Reynolds number over flow pattern, heat transfer and entropy generation inside a T-micromixer. It was shown that higher values of effective thermal conductivity in porous media help to better thermal mixing of hot and cold flows entering from inlet ports. In models that porous block has more contact with horizontal walls, more heat transfer is acquired, also total heat transferred to horizontal walls increases when Reynolds number increases, which decreases the dimensionless entropy generation.
    • Show Sections

      Hide Sections

      A typical scheme of inspection for insulated equipment consists of ultrasonic thickness gauging (UTG) and corrosion under insulation (CUI) monitoring. There is an opportunity to innovate the conventional ultrasonic testing not only for thickness gauging but also for CUI detection at the adjacent area of the gauging opening. The objective was to modify the standard ultrasonic testing (UT) thickness gauging probe for CUI detection which involved the design and fabrication of the wedge to convert normal longitudinal wave into surface wave for 10 mm and 30 mm probes. The test was done on the surface of 2-inch carbon steel pipe with fabricated CUI defects using two types of UT mode which are single probe testing and dual-probe testing. The characteristics of signal produced were analyzed based on various corrosion profiles and probes distance. The modification to convert the longitudinal wave into surface wave was obtained by machining Perspex wedges with the incident angle of 57.7 o. In both single probe and dual probe testing, the reduction of signal height indicated the presence of CUI and the signal was influenced by the depth of corrosion profile and probe distance. In conclusion, the surface wave produced by the modification on the normal surface probe was proven able to detect CUI with some limitation.
    • Show Sections

      Hide Sections

      An earthquake location method should be presented by using historical earthquakes in the local area and search the nearest earthquake as reference earthquake with calculations between reference earthquake and unknown earthquake. The new method has less depend on station corrections and has less influence by distribution of station, focal depth and the time of earthquake occurrence. As abundance of historical earthquakes database, the precision of location will be improved.
  • Session 3 Information Security and Artificial Intelligence

    • Show Sections

      Hide Sections

      This paper presents a discussion of knowledge management performance evaluation index and evaluation methods for product innovation. Analyze the content of knowledge management and the flow of knowledge in product innovation process. According to the purpose of performance evaluation and combined with the characteristics of product innovation This paper established the knowledge management performance index for product innovation and describe the specific evaluation methods. The fuzzy comprehensive evaluation process is discussed.
    • Show Sections

      Hide Sections

      There is a large amount of illegal content being replicated through peer-to-peer (P2P) networks where BitTorrent is dominant; therefore, a framework to profile and police it is needed. The goal of this work is to explore the behavior of initial seeds and highly active peers to develop techniques to correctly identify them. We intend to establish a new methodology and software framework for profiling BitTorrent peers. This involves three steps: crawling torrent indexers for keywords in recently added torrents using Really Simple Syndication protocol (RSS), querying torrent trackers for peer list data and verifying Internet Protocol (IP) addresses from peer lists. We verify IPs using active monitoring methods. Peer behavior is evaluated and modeled using bitfield message responses. We also design a tool to profile worldwide file distribution by mapping IP-to-geolocation and linking to WHOIS server information in Google Earth.
    • Show Sections

      Hide Sections

      In this paper, the effect of Blind Channel Identification algorithm has been analyzed for OFDM system suffering from Carrier Frequency Offset (CFO). This CFO introduces Inter-Carrier Interference (ICI) problem which causes severe degradation of the Bit Error Rate (BER) performance of the OFDM receiver. Here, we have used Independent Component Analysis (ICA), a blind estimation algorithm along with Linear Minimum Mean Square Error Estimation (LMMSE) technique to estimate and compensate the inefficiency caused by CFO during LMMSE channel estimation. Simulation result shows that BER of the OFDM system reduces by applying ICA.
    • Show Sections

      Hide Sections

      Secure login is a counter measure for the shoulder surfing attack. Shoulder surfing is an observation technique of stealing the information by looking over someone's shoulder. Very often people are unaware of the presence of any external devices like the close circuit cameras and hidden surveillance equipment which are placed to capture their valuable information like the password etc. It is very easy to stand close to someone and look what the other person is typing on the keyboard. Secure login technique could be used in computers where confidential data are used, in highly secured nuclear servers authentication, ATM machines, Email login etc. The Secure Login will also consist of a RSA or MD5 encryption technique to protect the password. This counter measure helps in protecting the password from being stolen even if the password is typed in front of others.
    • Show Sections

      Hide Sections

      Tube-rail, as a new transport system, faced with the same problems as the current transport system. For numerous potential operation safety risks existed in traditional transportations at home and abroad, it is very necessary to study the safety risk of Tube-rail operation. After the field investigation and expert consultation, based on the analysis of domestic and oversea transport system operation safety risks, the paper established multi-stage operation safety risk evaluation index system, completed scientific safety risk evaluation using model of gray relative level, and provided exemplification.
    • Show Sections

      Hide Sections

      In this paper a dynamic optimization policy is proposed with the objective to obtain the optimal cooling temperature policy of a batch crystallizer, maximizing the total volume of seeded crystals. Owing to the complex and highly nonlinear behavior of the batch crystallizer, the nonlinear control strategy based on a generic model control (GMC) algorithm is implemented to track the resulting optimal temperature profile. Finally the developed control strategy is compared with a conventional PI control technique.
  • Session 4 Information Security and Artificial Intelligence

    • Show Sections

      Hide Sections

      This paper introduces the concepts, the origins and development trend of cloud computing on the basis of analyzing the electronic outsourcing models as a new concept, cloud computing has attracted the IT enterprise attention, especially the electronic outsourcing enterprise. At present, there is a great problem of environmental costs during the enterprises apply the electronic outsourcing, but with the coming of cloud computing, all of the problem will be solved. Therefore, On the other hand, from the characteristics of clouds, analyzing the network security problems and solutions.
    • Show Sections

      Hide Sections

      The combination of image features with singular value decomposition algorithm and digital watermarking algorithm based on wavelet transform respectively makes possible the advancement from pixel watermarking to content watermarking, which effectively solves the contradiction between perceptibility and robustness of conventional watermarking algorithm. This paper first gives a review on conventional singular value decomposition algorithm and wavelet-transform-based digital watermarking algorithm, and then makes a thorough analysis of their respective features, advantages as well as the similarities between the two. Improved feature extraction schemes of digital watermark which combine image features with the two algorithms respectively as well as the feature extraction scheme combining the two algorithms are put forward for the comparative analysis of corresponding principles and processing effects. The experimental results indicate that the content-based (instead of pixel-based) watermarking algorithm can better satisfy the perceptibility and robustness of digital watermarking, with huge application potentials and more development space.
    • Show Sections

      Hide Sections

      Online information dissemination networks evolve over time, driven by the attributions of the members affiliated to the online communities, by the attributions of the topics attached to the information dissemination networks, and by the relationships of the a2ctors. We analyzed an information dissemination network comprising four stages over time based on one online topic set and matched with members and topics. We found that network evolution is dominated by a combination of relationship arising from network structure. In the absence of global structure, the average differences of relationship are unstable. We take advantage of fuzzy decision tree to establish one method to define the degree of the relationship.
    • Show Sections

      Hide Sections

      This paper puts forward a kind of reliable end-to-end path routing protocol consideration, use PRR (packet acceptance rates) as a link performance estimate. The agreement is with the highest value PRR search path and the end-to-end data transmission of data packets. Reduce the cost control group, this paper puts forward a new mechanism, only a few suitable for deployment RREQ nodes can be rebroadcast bag again, not all of the node.
    • Show Sections

      Hide Sections

      With the proliferation of Internet, finding and feeding appropriate information from this mass has become an important topic of research. The main frontier of this huge source of data is finding web navigation patterns of users. Web usage mining is the application of data mining techniques to discover usage patterns from Web data, in order to understand and better serve the needs of web based applications. Web usage mining consists of three phases, namely preprocessing, pattern discovery and pattern analysis. Web usage mining has seen a rapid increase in interest, from both the research and practice communities for its application potential. A framework of web usage mining-web extractor is proposed which uses k-means algorithm based clustering approach to discover user's navigational behavior. The problem of clustering Web users and access sequences presents two unique challenges: the immense volume of data and the sequential user navigation patterns. Traditional distance-based clustering algorithms are ill-suited to solve the problem. The proposed framework which is k-means based clustering approach is capable to capture the sequential relationships inherent in user access histories. The simple k-means algorithm is has been adapted in the domain for clustering because of the speed that allows it to work with large database. We also introduce data preprocessing methods that enable us to handle large volumes of raw data to make the state space in the k-means clustering approach tractable. The recommended model is tested on several log files and is able to predict user's navigational behavior successfully.
    • Show Sections

      Hide Sections

      In this paper, a fuzzy-set based semantic similarity matching algorithm for Web Service is proposed, which can be used to support a more automated and veracity service-discovery process, by distinguishing among the potentially useful and the likely irrelevant services and by ordering the potentially useful ones according to their relevance to the developer's query.
    • Show Sections

      Hide Sections

      Based on PCA, the 2DPCA method is the widely used method for Facial Recognition. Aiming at recognizing the information of human face expression, the paper fuses the feature extraction methods with the Gabor Feature and 2DPCA and improves the 2DPCA method, first calculate the distances of the within-class samples and inter-class samples of the training samples. Then projected into the vector quantities so as to select corresponding favorable projected vector quantities and obtain the most important Gabor Features. In this paper, use the improved method for Facial Expression Recognition and compare the approach with 2DPCA and bi-directional 2DPCA. Experiments have proved that the overall recognition rate by using the improved methods is higher than by using the former ones.
    • Show Sections

      Hide Sections

      Wireless network characteristic is quite different from wired networks. It is more vulnerable to security disturbances. Furthermore, the convenience of the user in accessing network wirelessly could face the security risks against the intrusion of the possible Illegal Access Point (IAP), which is not legitimized and registered on a network. One of the serious problems is relating to the users who are not so aware and knowledgeable on how to protect themselves. A more proactive detection system to protect this kind of intrusion has become an important part in the development of Intrusion Detection System. This research aim is to develop a web based tool of proactive intrusion detection system to cover the weaknesses that exist in conventional Intrusion Detection System, especially in terms of protecting from the presence of illegal access point device. Using Proactive Protection tool with Web-based Applications on the server side could be benefit for the users to easily detect the presence of IAP without involving a network administrator.
  • Session 5 Advanced Computer Theory and Engineering

    • Show Sections

      Hide Sections

      Word Segmentation is an important task for the languages lacking delimiters between words. We early proposed an unsupervised approach to word segmentation, which is an iterative process. In this article, we present a non-iterative variation of the approach, and compare it with other similar methods. The experimental results show that the variation has better performance than others.
    • Show Sections

      Hide Sections

      Word segmentation is the crucial first step of natural language understanding (NLU) for Chinese corpora. The words are character sequences with different lengths. Therefore, a key problem is how to evaluate the words of different lengths and compare them with each other for statistical methods of word segmentation. Our early paper presented ESA, an unsupervised approach to word segmentation. The approach uses a simple process to solve the problem mentioned above, which is called Balancing. In this article, we analyze Balancing and compare it with Standardizing that is another algorithm to solve the problem. The experimental results show that Balancing is more effective than Standardizing for the task.
    • Show Sections

      Hide Sections

      Word Segmentation is the very first stage for processing some languages, such as Chinese. We early proposed an unsupervised approach to word segmentation. In this article, we analyze a part of the core algorithm of the approach to demonstrate how the part alleviates the sparse data problem. By experimental results, the data sparseness really does negative effect on the performance of the approach. Meanwhile, the results also indicate that the part of the algorithm has the capacity to reduce the influence of data sparseness.
    • Show Sections

      Hide Sections

      The existing texture synthesis methods can only synthesize texture with the same structure from the sample image. This paper presents a novel method to synthesize texture with different semantic structures. We focus on the analysis and processing for texture topology which is described with 2D mesh. First, the given topology is used to generate target texture mesh. Then the target mesh is used to constraint pixels synthesis. Our method can use one sample to synthesize textures with different topology, and is fit for both plane and 3D surface.
    • Show Sections

      Hide Sections

      Location technology is a support technology of the wireless sensor, which is studied by a growing number of scholars in recent years. Many classic location algorithms are proposed, such as centroid algorithm and DV-Hop algorithm. But they can't be applied to actual three-dimensional space. In this paper, focusing on the actual requirement, we make centroid algorithm and DV-Hop algorithm extend to a three-dimensional space. The communication overhead of 3D-centroid algorithm is low but its deviation of location is great, while the communication overhead of 3D-DV-Hop is great but its deviation of location is low. In order to integrate the advantages of these two algorithms, in this paper on the basis of these two algorithms, we propose a new 3D location algorithm-3D-CDHL. The experimental results show that the number of locating nodes of 3DCDHL algorithm is more than 3D-centroid algorithm and DV-Hop algorithm 10% and 3% respectively at every turn.
    • Show Sections

      Hide Sections

      Management in Iterative and Incremental Development projects supports the adaptive planning and adaptive development processes. The process of planning the remaining project in light of latest project data is termed as adaptive planning. In IID it has been encouraged to adopt adaptive planning as contrary to predictive planning. In IID projects, the output of project assessment of one of the iteration is used for input of the planning of next iterations. This paper proposes a probabilistic mathematical model for estimation of productivity of next iterations based on prior data of earlier iterations. The model is based on temporal modeling which can be further implemented in dynamic Bayesian networks, using Bayesian Networks development tools.
    • Show Sections

      Hide Sections

      This submission deals with the three-point boundary value problem for the nonlinear second-order systems with high-speed feedback. Especially, we focus on an analysis of the solutions in the endpoints of given finite length interval from an appearance of the so-called boundary layer point of view. Boundary layers correspond to the rapid region of transition in the exact solution. Singular Perturbation Theory is the mathematical framework that yields the tools, like the method of lower and upper solutions, to explore the complicated dynamical behavior of these systems.
    • Show Sections

      Hide Sections

      Simulation of the irregular objects is a challenging and attractive subject in the field of computer graphics. A variety of fireworks simulation algorithms are introduced, the advantages and disadvantages of various models are analyzed comparatively. And then, the basic principles of particle system modeling and the characteristics of fireworks booming are discussed in depth. With the relevant theory of OpenGL, a firework model, which gives full consideration to the involvement of wind and air resistance, is built on the platform provided by VC++6.0. Finally, various typical fireworks simulated effects are realized and evaluated, the advantages and disadvantages of fireworks model are summarized, and the future research prospects are proposed.
    • Show Sections

      Hide Sections

      Vibration analysis is essential in improving condition monitoring and fault diagnostics of rotating machinery. Many signal analysis methods are able to extract useful information from vibration data. Currently, the most of these methods use spectral analysis based on Fourier Transform (FT). However, these methods present some limitations; it is the case of non-stationary signals. In the present work, we are interested to the vibration signal analysis by the Wavelet Transform (WT). The WT is one of the most important methods for signal processing; it is especially suitable for non-stationary vibration measurements obtained from accelerometer sensors. The monitoring results indicate that the WT can diagnose the abnormal change in the measured data.
    • Show Sections

      Hide Sections

      As the internet evolves, servers encounter a wide range of internetworking problems such as delay and congestion. Replication is a special technique for reducing network traffic in large websites. An important problem is where to place web server replicas. In this paper we introduce an Artificial BeeColony algorithm for web server replica placement. We show that this algorithm is better than Greedy algorithm proposed by Qiu[1] and our results are more near optimum.
  • Session 6 Advanced Computer Theory and Engineering

    • Show Sections

      Hide Sections

      First the Smart home is projected we need to know user requirements (URS). This article deals with the support of the designer in defining requirements. The important role played the right selection of functions of Smart home. The main objective of this work is Smart home classification. This division helps in analyzing the security of comfort of the user in Smart home. Functions are divided into three levels. These are further divided into the subgroups. Each subgroup contains specific functions necessary for the comfort of the inhabitants of Smart home. In the classifying functions have been proposed selection criteria. After selecting each function, the designer will be able to compile a catalog of user requirements.
    • Show Sections

      Hide Sections

      In this article we present a model of a bimorph piezoelectric cantilever beam used for energy harvesting in micromechanical devices. The model is created in Simulink. Its parameters can be changed to find the best possible configuration of the beam. The outputs of the model are mechanical and electrical properties and the model can be tuned to the desired output variable. The model is divided into two parts. There is the vibration part and the mechanical part. This two parts communicate all together to allow proper functioning of the model.
    • Show Sections

      Hide Sections

      In cloud services, users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services. However, when something goes wrong - information leakage or incorrect computing results - it is quite difficult to find out which cloudlet (i.e., individual node or server) should be responsible for that and whether there's solid evidence to prove it. In this paper, we introduce iCloud, a mechanism that can identify faulty cloudlets in cloud services. iCloud ensures that Byzantine faults whose effects are observed by a correct cloudlet can eventually be detected and irrefutably linked to a faulty cloudlet. On the other hand, iCloud can prevent a correct cloudlet from false accusations. iCloud works by maintaining a secure record of the messages sent and received by each cloudlet. iCloud is easily applicable: it only requires that cloudlets can sign messages, that a correct cloudlet's behaviors are deterministic, and that each cloudlet is periodically checked by a correct cloudlet.
    • Show Sections

      Hide Sections

      In mobile ad hoc networks, mobile devices wander autonomously for the use of wireless links and dynamically varying network topology. AODV (Ad-hoc On-demand Distance Vector routing) and most of the on demand ad hoc routing protocols use single route reply along reverse path. Rapid change of topology causes that the route reply could not arrive to the source node. This increases communication delay and power consumption as well as decrease in packet delivery ratio. To avoid these problems, a Reverse AODV (RAODV) was proposed which tries multiple route replies. It reduces path fail correction messages and obtains better performance than the AODV. Remained energy in RAODV is higher than AODV; even it has sent more data packets to destination. A simulation study is presented to compare these two protocols. Results shows in RAODV the data packets meet fewer hops in chosen path and this will effect on remind energy in RAODV to be higher than AODV.
    • Show Sections

      Hide Sections

      Block truncation coding is one of the image compression algorithms that has lower efficiency in compare with some other algorithms, but also has low cost and complexity. In this paper, a new image compression algorithm is designed with two stages of BTC algorithm. The final compressed version has smaller size and a bit lower accuracy that can be used in many systems that do not require more accuracy and have small size memory. This algorithm has been tested on some of the standard images.
    • Show Sections

      Hide Sections

      Software industry is one of the most important development areas of information technology industry. Despite of all capabilities, Iran's software industry didn't accomplish its potentials and form a few portion of universal industry. This Study's objective is to identify and prioritize Iran software industry development policies and solutions. Exploring literature and deep interview with experts identified and classified domesticated software industry development solutions. Based on research community's opinions extracted Criteria were prioritized, it included 33 experts in software industry. Using interview and questionnaire data collection was accomplished. Collected data were evaluated by SPSS Friedman test function. According to accomplished surveys among different solutions establishing a unique authority in software arena amongst strategic criteria, respecting copy write and intellectual properties rights amongst policy criteria and reviewing software field courses amongst infrastructural criteria have the highest priority.
    • Show Sections

      Hide Sections

      This study deals with developing an artificial neural network (ANN) cutting force and surface roughness prediction model as a function of cutting parameters and vibration signals in the turning process of AISI 4140 steel. An experimental turning dataset is used to train and evaluate the model. Input dataset includes cutting speed, feed rate, depth of cut, vibration levels along the three axes on the tool holder (ax, ay, az). The Output dataset includes cutting force (Fc) and surface roughness (Ra). A comparison between the predicted force and, surface roughness with their experimental counterparts shows an excellent agreement. The accuracy between the experimental and the predicted values is as high as 99.95%. The results show that the model can reliability and accurately be used to predict cutting force and surface roughness as a function of cutting parameters and tool vibrations.
    • Show Sections

      Hide Sections

      In this paper, we present a smart monitoring system of vehicles using embedded controller, Global Positioning System (GPS) and Global System of Mobile (GSM). The system allows users to visualize and track the location of targeted vehicles on Google Earth. The system identifies the current position of the target using GPS and sends the location along with various parameters from vehicle's data port by Short Message Service (SMS) through GSM networks to a GSM modem that is connected to PC or laptop. The recipient of the data can view the current location and the status of each vehicle on Google Earth. This system is very useful for emergency services, i.e. crash reporting, engine status… etc, for fleet management, police vehicles distribution and car theft situations.
    • Show Sections

      Hide Sections

      Next generation sequencing technologies typically present high-throughput, short reader and high coverage. Large amount of data greatly increases the difficulty of the genome sequence assembly. So simplifying the sequencing data before sequence assembly can effectively improve the efficiency of sequence assembly algorithm. After analyzing the types of edges in the graph, we devise a simple transitive reduction algorithm in weighted bidirected overlap graph with O(n3) in this paper. A program is designed and realized to prove the effectiveness of this algorithm.
    • Show Sections

      Hide Sections

      Modeling and simulation of manufacturing technological processes in industrial operation make a significant contribution to simplification and economical favoring of the design, implementation, testing and putting control systems into operation.The goal of the paper is to give practical information about modeling and simulation of manufacturing technological processes in present-day automation and outline reasons of introduction of modeling and simulation into delivery of control systems.Capabilities of modeling and simulation are demonstrated by examples of cascade control, feed-forward control and control of the plants containing dead time.
  • Session 7 Advanced Computer Theory and Engineering

    • Show Sections

      Hide Sections

      Besides direct control, fuzzy approach can be also easily used for expert systems adapting parameters of conventional PID controllers. The paper deals with the knowledge adaptation of controller and its implementation by use of programmable logic controller. The article introduces concept of supervisor - an expert system which adapts PID controller parameters. The issue of control performance monitoring, setting the model of the regulated system, its verification, the process of identification and subsequent adaptation of PID controller parameters are discussed.
    • Show Sections

      Hide Sections

      There are many systems for entity extraction which have been designed for different purposes. Here, an entity extraction system will be introduced to compute semantic relatedness. The previous works in this field convert a text to a set of words by different methods, and then compute semantic relatedness between these words of texts. In this paper a different approach will be proposed in which any text converts to a set of semantic entities to compute semantic relatedness. For this aim, it will be shown that using YAGO ontology, as one of the best background knowledge resources, can extract these entities from texts. To do this, a new algorithm for entity disambiguation will be suggested. Comparing the results with the literatures shows that the results of this new approach can be sufficiently reliable.
    • Show Sections

      Hide Sections

      This paper focuses on the mathematical modeling and simulation of developing complex systems implemented in industrial applications with wide setting of parameters and limits, which depends on user type and requirements. The designed simulating application is given by structure, implementation of the model of turbine unit which is a part of Flexible Energy System with respect to parameters predefined by turbine producers. The advantages of this mathematical application are modeling of possible states for given input parameters, which enables defines process values of turbines parameters. The paper paragraphs describe a specification of turbines, structure and parameters important for turbine modeling and implementation with examples of given results. The developed mathematical model in application is implemented as graphical user interface in powerful environment MATLAB.
    • Show Sections

      Hide Sections

      Adaptive control has become a significant discipline in synthesis of control system. It dates back to already 1950s when arose an interest in aviation, particularly in control design of autopilots, but due to lack of success in practical tests the interest faded out, and experienced a renaissance in 1980s thanks to a rapid development of digital computers. Nowadays there are many approaches to self-tuning and adaptation, such as use of a self-tuning controller (STC), model reference adaptive controller (MRAC), expert tuning system (ETS). This paper deals with design and implementation of MRAC by use of MIT rule for a superheater which is a crucial part of a coal-fired power plant. The simulation in Matlab&Simulink environment is based on real data from technological process in power plant of Detmarovice, Czech Republic.
    • Show Sections

      Hide Sections

      In recent years, many studies have been conducted in Mobile Ad Hoc Networks field in order to make a virtual infrastructure consisting of nodes. The common goal of all was to select a node called cluster-head which guarantees relationships between nodes. In this paper, we have presented a new clustering algorithm in Mobile Ad Hoc Network based on nodes weight. For calculating node weight we present four new parameter, cluster density, consumed energy, stability and number of nodes moving towards a node. The goal of this algorithm is to decrease the number of cluster forming, maintain stable clustering structure and maximize lifespan of mobile nodes in the system. In simulation, the proposed algorithm has been compared with WCA, MOBIC and the Lowest_ID algorithm. The results of simulation reveal that the proposed algorithm achieves the goals.
    • Show Sections

      Hide Sections

      In this study, the laser sensors trace tracking systems have been developed. In welding applications, to make smooth welding and provide movement of torch and welding trace in determined position, a fuzzy logic controlled laser sensor seam tracking system was developed and a program has been prepared. In the study performed, welding with and without fuzzy logic algorithm were compared. It was observed at the end of study that welding especially made in nonlinear welding seam tracing system traced weld track in accordance with standards and centered the weld bend.
    • Show Sections

      Hide Sections

      This article investigates the routing problem in networks where edge lengths are independent stochastic variables. The fundamental concept here is that by taking his or her demands and routing objectives into account, a user positioned at a node is given an estimation of the travel time to reach the destination node from different paths. The advantage of this method over the previous works is that it is not limited to one routing objective and that different factors can be effective in computing the shortest travel time which include mean, variance, mathematical expectation, etc. The algorithm presented here has been written using MATLAB software, which presents different paths from the source node to the destination node in addition to the sum of means and variances of the whole path for series-parallel and non-series-parallel networks. The suggested algorithm has been tested on a sample network.
    • Show Sections

      Hide Sections

      In this paper, automatic parking system and electronic parking fee collection based on vehicle number plate recognition is presented. This work aims to develop an automatic parking system that will increase convenience and security of the public parking lot as well as collecting parking fee without hassles of using magnetic card. The auto parking system is proposed to have less interaction of humans and use no magnetic card and its devices. Furthermore, it has parking guidance system that can show and guide user towards a parking space. The system used image processing of recognizing number plates for operation of parking and billing system. Overall, the systems run automatically to make minimum human involvement in parking system and ensure access control in restricted places. This paper presents algorithm technology based method for license plate extraction from car images followed by the segmentation of characters and reorganization and also develop electronics parking fee collection system based on number plate information.
  • Session 8 Communication and Network Security

    • Show Sections

      Hide Sections

      With successful experience in dealing with the global financial crisis and international trade, Chinese government has started with the internationalization process of its currency RMB. The internationalization of RMB is quite different from other currencies like US dollars as its internalization is made before the opening of the capital market. The main step for internationalization of RMB is RMB cross-border settlement which is to have influential impact on China and the ASEAN trade. RMB cross-border settlement is to expand from close geographical areas to the international scope over time. China will see great developing opportunities as well as risks with the introduction of RMB cross-border settlement. At the same time, the ASEAN trade will be influenced by RMB cross-border settlement as most of related investments and trades will be based on RMB after that.
    • Show Sections

      Hide Sections

      Denial of service (DoS) is a significant security threat in open networks such as the Internet. IP traceback is one important tool proposed as part of DoS mitigation and a number of traceback techniques have been proposed including probabilistic packet marking (PPM). PPM is a promising technique that can be used to trace the complete path back from a victim to the attacker by careful encoding of each router's 32-bit IP address in at least one packet of a traffic flow. However, in a network with multiple hops through a number of autonomous systems (AS), as is common with most Internet services, it may be undesirable for every router to contribute to packet marking or for an AS to reveal its internal routing structure. Additionally, due to the unknown path length, it is not possible to determine an optimal packet marking probability. This paper proposes a marking traceback technique that probabilistically marks the packets by only one router in each AS by encoding the AS number instead of a router's IP address and thus determines the AS of the attack. Traceback on the AS level has a number of advantages including a reduction in the number of bits to be encoded and a reduction in the number of routers that need to participate in the marking.
    • Show Sections

      Hide Sections

      China has seen many food safety problems in recent decade and the paper is designed to analysis the food safety supervision system decision making in China. To make it clear of the system, the author has explored several aspects including external and internal factors influencing food safety supervision system, consumer decision making model, food producer behavior decision model, the game model and government supervision behavior model.
  • Session 9 Distributed Computing Engineering

    • Show Sections

      Hide Sections

      A sensor is a device that measures a physical quantity and converts it into a signal which can be read by an observer or by an instrument. The rapid advancement in computing has enabled the development of low cost wireless sensor networks (WSNs), and making WSNs one of the most important research areas. These are wireless ad-hoc network that connect deeply embedded sensors, actuators, and processors. This combination of wireless and data networking will result in a new form of computational paradigm which is more communication centric than any other computer network seen before. In the past few years, much research effort has been put forth to instrument the physical world with a large number of networked sensor nodes that are collaborating while self-configuring. Wireless sensor networks produce a large amount of data that needs to be processed, delivered, and assessed according to the application objectives. Data storage has become an important issue in sensor networks as a large amount of collected data need to be archived for future information retrieval. This paper review Sensor data Storages to find best of them and use it to control our physical world better.
    • Show Sections

      Hide Sections

      Wireless sensor networks are composed of tiny devices with limited computation and battery capacities. The role of Wireless sensor networks in modern technology is obvious; and this was the main idea for many researches in the last decade. The applications of these networks are becoming wider now days. As the use of wireless sensor networks expands, Millions of sensors around the sphere currently collect rushes of data about our world. The rapid development and deployment of sensor technology is intensifying the existing problem of too much data and not enough knowledge. In this paper we have done an evaluation of three proposed methods named SSW, SemSOS, and SHD that stored data and we can conclude that SHD stored fewer data that is good for some appropriate situations and SemSOS stores more data than SSW.
    • Show Sections

      Hide Sections

      With the advent of low-power microsensors, actuators, embedded processors, and RF radios, it becomes feasible to deploy large-scale networks of sensing devices. Since then a lot of research has taken place in the field of sensor networks which has dealt with various new issues such as power management, routing, naming, querying, aggregation, localization, time synchronization and more recently, Systems issues such as operating system support, programming language support, security issues, simulators, virtual machine support, and debugging tools. In this paper we evaluate two of the proposed systems for sensor data storage in total data parameter received by sink node names SSW (Semantic Sensor Web) and SemSOS (Semantic Service Observation). They represent and store their data in semantically form.
    • Show Sections

      Hide Sections

      In this study helical tubes are in constant wall temperature and the fluid flow is laminar. To analyze the heat transfer rate and pressure drop in helical coils, thermal-hydraulic parameter, JF factor, is used. Numerical simulation and Taguchi method are used to investigate the effect of fluid flow and geometrical parameters on JF factor. After simulations, Taguchi method is used for finding the optimum condition for the desired parameters. The results indicate that the most important design parameters for a helical tube with fixed tube diameter and longitude length are coil diameter, coil pitch, mass flow rate respectively.
    • Show Sections

      Hide Sections

      Now-a-days Service-oriented architecture (SOA) became more popular in distributed and parallel computing systems. The Availability ofWeb Services (WS) is very essential in order to increase the overall system availability. A slow service is merely equivalent to unavailable service. Enterprise Service Bus (ESB) provides message oriented, event driven and service oriented approach for integrating services. An ESB implements an SOA through middleware that offers management of service communication between client and services. In order to increase the availability of web service we proposed and implemented an architecture and evaluated its performance. In this architecture ESB act as gateway which multicast the client request to the service replication. The service gateway comprise of message collectors, processors and aggregators which help in arranging the messages in order. WS- Replication deploys services in a set of sites. The client send multiple requests to service gateway and the gateway broadcast these request to the service replicas waiting for the response from one or all of the services. The responses are collected by the gateway and analyzed for faults and a faultless response is returned back to the client thereby increasing the availability of the service.
    • Show Sections

      Hide Sections

      There is no doubt that companies of today are operating in socio-economic environments characterized by dynamism and increased turbulence, and Information systems as a consequence, are target of this change. Requirements Engineering (RE) process constitutes the earliest phase of the information system development life-cycle. And, requirements elicitation, first step of this process is considered as the most important and crucial step. Requirements elicitation is a task difficult enough when done locally, but it is even more difficult when stakeholders specify requirements across cultural, language and time zone boundaries. Very little research has been done to elicit requirements for an inter-company cooperative information system and usually without considering the above issues. This paper reports on the field study that investigated requirements elicitation of an intercompany cooperative information system challenges introduced by characteristics of this system and also by stakeholders' geographical distribution in a multi-site organization. Thus, In order to increase the quality of the elicited requirements and as result the system-to-be quality, these challenges must be considered when eliciting requirements in such environment.
    • Show Sections

      Hide Sections

      Power is a limited resource in AdHoc networks because most of the nodes are battery powered and continuous participation of these nodes in routing causes lowering its battery power. Topology Control based on localization maintains the topology with certain properties while maintaining power at an increased network capacity. Hence an asynchronous, fully localized topology control protocol in MANETS is proposed to enable the nodes to use their power efficiently. This protocol ensures network connectivity and extends the lifetime of the network. Here network dynamics is also considered.
    • Show Sections

      Hide Sections

      Many organizations usually have separate implemented GIS (Geographic information system), CAD (Computer Aided Design), business systems, etc.., and most of these systems has been developed by different manufacturers, that are difficult to integrate. The main aim of this paper is to present review of performed achievement in the field of access and exchanging of geospatial data. Today, one of the biggest challenges in dealing with data is interoperability between different heterogeneous systems. In order to increase productivity and efficiency of the organizations, it is necessary to remove barriers between different technologies, using method of interoperability and open standards. Solution of OGC (Open Geospatial Consortium) for exchanging geospatial information is based on the usage of web services, specialized for the processing of geographic data. Today, there are Open Source and commercial GIS servers that greatly facilitate the development of Web GIS applications, which represents major progress in the usage of geospatial data in relation to standard desktop GIS applications. With Web applications, geospatial data are considerably closer to a much broader range of users. The result of this paper is presented as an example of implementation GIS solutions module of fixed line access network using Open Source Server and OGC Services.
    • Show Sections

      Hide Sections

      The design of fuzzy controllers does not require the mathematical model of the plant, however a level of expertise and knowledge about the plant is fundamental, so the membership functions can be chosen and the rules to have control on the system can be proposed to obtain a desired behavior, where the mentioned knowledge can be gotten from mathematical analysis. Broadly, fuzzy controllers are used to control non-linear systems whose dynamics models are complex. This paper shows an alternative to learn about systems without having to make mathematical models and makes tests on a real rotary inverted pendulum.
    • Show Sections

      Hide Sections

      Expectation-Maximization (EM) Algorithm is an approach to iterative computation of maximum-Likelihood estimates when the observation can be viewed as incomplete data. This paper aimed to the convergence speed problem, presents a fast convergence method of phase estimation based on EM, which modify the priori probability with posteriori probability in the EM algorithm iterative. For the QPSK carrier phase estimation, compared with the traditional method that assumed the transmitted signals is independent and no prior information. Analysis and simulation results show that without affect the estimation performance, the algorithm convergence speed is faster. Meanwhile, the algorithm realizes the joint maximum-likelihood (ML) estimation of phase estimation and symbol detection.
  • Session 10 Computer Science and Logistics Engineering

    • Show Sections

      Hide Sections

      This paper presents a sale data decision support system in supermarket based on OLAP in order to overcome the shortcoming of the current supermarket management information system (MIS). Analyses the architecture of the system, the design of storage style of data warehouse based on information package and the implement of the online analytical processing. Then the paper describes the functions of the system.
    • Show Sections

      Hide Sections

      VRP is a typical combinatorial optimization problem, to overcome the disadvantages of premature convergent of traditional optimization algorithm, a PSO algorithm was put forward to solve the pharmaceutical distribution routing with time window. This paper combined the particular characteristics of medical logistics, established corresponding mathematical model. Through the experimental results showed that PSO algorithm had strong optimal search ability and could get optimal resolution of vehicle routing problem with window effectively and quickly.
    • Show Sections

      Hide Sections

      Solution equilibria of the binary and ternary complex systems of the divalent transition metal ions CuII, NiII, ZnII, and CoII with 1,2,4-triazole (TRZ), 3-mercapto-1,2,4-triazole (TRZSH), and 3-amino-1,2,4-triazole (TRZAM) and aromatic carboxylic acids (phthalic, anthranilic, salicylic, and 5-sulfosalicylic acid) have been studied pH-metrically at (25.0 ± 0.1) oC, and a constant ionic strength I = 0.10 mol dm−3 NaNO3 in an aqueous medium. The potentiometric titration curves show that binary and ternary complexes of these ligands are formed in solution. The stability constants of the different binary and ternary complexes formed were calculated on the basis of computer analysis of the titration data. The relative stability of the different ternary complex species is expressed in terms of Δ log K values and log X parameters. The effect of temperature of the medium on both the proton-ligand equilibria for TRZAM and phthalic acid and their metal-ligand equilibria with CuII, NiII, and CoII has been studied along with the corresponding thermodynamic parameters.
    • Show Sections

      Hide Sections

      To simulate a concrete exposed to chloride environment, this study uses a numerical solution for one-dimensional diffusion equation to solve a non-steady one-dimensional diffusion equation considering three different diffusion coefficients D(x), D(t) and D(x,t). These numerical results served as a handy tool to understand the actual influences of different types of diffusion coefficients on the physical diffusion process with chloride.
    • Show Sections

      Hide Sections

      This paper is aimed to review academic literature regarding RFID technology on a broad basis, in logistics and related fields, to analyze findings which impact on logistics and supply chain management, as an overall status of contributions in academic literature is lacking, and researches regarding RFID technology most on technology aspect, lack of research for RFID applications in logistics and supply chain management on integrative aspect from characteristics, applications to benefits of RFID technology. The paper analyses RFID technology developments reported in various industries, methods used, contexts covered, and main logistical and supply chain issues and areas dealt with as well as those which are omitted. The study constructs a RFID adoption model, and applies a case study methodology for data collection and analysis, finally, the paper implement case comparison and analysis. Based on the model and analysis of case study, this research constructs four practical propositions for future researchers and practitioners. The study is valuable as it presents a comprehensive picture of the current status of findings which affect logistics and supply chain management and which have been reported within RFID technology.
    • Show Sections

      Hide Sections

      The paper focuses on Supply Chain Risk (SCR) early-warning system design. Based on artificial immunity principle, a SCR early-warning conceptual model is established first. A SCR early-warning system is presented with detailed early-warning indexes and risk grading. The early-warning method is shown by a practical case. Applying the early-warning system to make cluster analysis for SCR grading, it provides a new perspective for study and application of SCR early-warning.
    • Show Sections

      Hide Sections

      Drug safety is a major event bearing on the national economy and the people's livelihood. The paper gives details about the general structure design and function design on the RFID-based drug distribution safety and quality monitoring control system to achieve the efficient safety monitoring on the whole life cycle of drug by adopting the fundamental data of every process of drugs collected by using the RFID electronic label in the supply chain operation flow and achieve to the follow-up and traceability in the whole process of production, circulation and use of drug through the monitoring control system. The system has been implemented and put into use by some enterprises under Nanjing Pharmaceutical Group and gained good effects.
    • Show Sections

      Hide Sections

      This paper mainly discussed the application of GPS technology positioning in mattresses laying under the marine water. This paper was taking the artificial island project in Nantong Yangkou as example, introduced the major tasks of positioning in mattresses laying under the water, the specific processes and the problems and solutions to problems which should be paid attention to in the course of job, and got some useful experience about application of GPS technology positioning in mattresses laying under the marine water.
    • Show Sections

      Hide Sections

      Prediction of strength propagation loss in forest is very complex, so it is difficult to use the mathematical model to describe their loss. In this study, an intelligent forecasting method based on genetic-support vector machine (GSVM) approach is presented of Prediction of Strength Propagation loss in Forest. An new way provides loss prediction. The test results show that this GSVM model is effective to loss.
    • Show Sections

      Hide Sections

      This study developed a fuzzy multiple objectives programming model to determine the optimal fire station location. Three objectives, rescue efficiency, service fairness for different areas, and maximum quantity of repeatedly serviced residents, were used as objectives in the model. Fuzzy theory, multi-objective programming, location theory, and relevant fire control concerns were integrated into the model to establish the optimal fire station location. In the empirical study, we allocated the fire station location for a densely populated area in Taiwan — the east, west, north and central districts of Tainan City. The model generated high satisfaction result for the three objectives. Our model also produced better results in fire-rescue efficiency and districts fairness than the present fire station location of the above districts.
  • Session 11 Computer Science and Logistics Engineering

    • Show Sections

      Hide Sections

      IEEE 802.16j standard defines two relay transmission modes to increase system capacity and coverage extension respectively. In this paper, we focus on non-transparent relay network scenario, and formulating the relay resource scheduling problem. The zone boundary placement has greatly effect to system throughputs; we propose the determination method in our algorithm. We propose a MRRS (Multihop Relay Resource Scheduling) algorithm to ensure the algorithm cans easily implements on IEEE 802.16j network. Our algorithm according to different user distribution and variety channel state information, MRRS can adaptively adjust zone boundary placement to improve the available slots utilization, and we strike a balance between network throughput and fairness index. Simulation results show that MRRS maintains good fairness index performance.
    • Show Sections

      Hide Sections

      Taiwan have integrated e-commerce systems into their logistics systems to develop a new retail delivery model in which consumers shop in an online store and pick up their goods in a convenience store. This model has had remarkable success. The objective of this study is to discuss the vulnerabilities of the retail delivery process using fault tree analysis. Firstly, we make an interview with business owner to understand whole process. Moreover, this study tries to figure out through the interview what the most important problem they need to improve. Secondly, we define the attributes and then map the fault tree. Finally, the research does qualitative and quantitative analyses to uncover vulnerabilities in the retail delivery process. We expect that the results can help managers formulate strategies and reduce the risks proactively as well.
    • Show Sections

      Hide Sections

      From strategy angle of the Sustainable development, this paper put forward the approach of evaluating collaborating and development, the Inner Mongolia road network from 2000 to 2008 was evaluated and analyzed by DEA method, the result show that Highway construction and sustainable development system in Inner Mongolia is the best only in 2008, In other years, the increasing returns to scale, increase the total mileage of road network and car ownership can promote GDP growth and the consumption level of residents in the Inner Mongolia.
    • Show Sections

      Hide Sections

      Internet of Things is a good enabling technology for logistics and supply chains which implements seamless, real-time tracking and monitoring goods at the level of items. In this paper, we propose a solution, which adopts RFID/GPS/3G/GIS technologies to implement real- time surveillance of logistics in transit. Based on the proposed solution, we developed an actual tobacco monitoring system for Wuhan Tobacco Logistics & Distribution Center of China, which successfully implements real-time vehicle tracking and cigarette packages monitoring. The outcome indicates that this solution minimizes missing goods and effectively reduces wrong delivery.
    • Show Sections

      Hide Sections

      For the rapid development of enterprise business, and modification or reconstruction of Enterprise Logistics Information System costly and time-consuming issues, proposed a model that SOA-based of 3PL enterprise information system architecture reconstruction, and take the Yuan cheng group for example, the establishment of SOA-based information integration platform, both conducive to resolving the “information island” problem, but also make full use of the “legacy system”.
    • Show Sections

      Hide Sections

      Based on the realities that China is now the world's largest log importer and the embodied transfer of ecological elements in the process of import can cause the spillover of ecological stress to the region of origin, the authors assessed the ecological effect of China's log imports on the source countries' forest sustainability. First evaluate the ecological footprint embodied in China's log imports from 1995 to 2010, and then introduce the model of ecological tension index to assess the ecological security status of the forests in major source countries. Results demonstrate that, overall, China's import of log has posed no serious threat to world forests. The forest ecological status of most of the major sources is at safe level, although China's log import has increased the forest ecological tension by more than 14%. While for the source countries with unsafe forest resources, China just had increased their ecological tension less than 1%.
    • Show Sections

      Hide Sections

      Taiwanese businessmen play a decisive role to achieve phenomenal Chinese economic developments in past decades, and Taiwanese NVOCCs are especially a motive power behind the scene to connect Chinese and the global market. In this article, we mainly probe into the differences of operating strategies and staff members' job satisfaction of Taiwan NVOCCs across the strait, and also explore the relationships between these two factors with their organizational performances respectively. Accordingly, the implications of our findings might meet the need of the both governments of Taiwan and China when they make their own marine policies.
    • Show Sections

      Hide Sections

      With globalization of the economy and trade, information networks and technology application trends, and the emergence of e-global logistic industries and integrated value-added services, the ability to apply technology to logistics talent has become crucial to vocational training. Faced with a logistics talent shortage caused by expansion of the logistics market, enhancing the quality and quantity of logistics talent is necessary. This research used the concept of originality planning to design and propose an integration of the application systems, such as ERP, WMS, FMS, CCS, TMS, and GPS, used by trade industries, shipping companies, airline companies, sea and air freight forwarders, customs brokers, container industries, and transport industries with the EIP service. Therefore, a global logistics management system framework is constructed according to the vocational training of logistics talent, providing practical operating procedures and a creative vocational training environment.
    • Show Sections

      Hide Sections

      The study is aimed at previewing the result after adding virtual objects to the real life space of consumers through the technology of augmented reality. Further, consumers can know the actual size and ratio of products by visualizing the virtual object through visual tag. The consumers can preview the matching effect of products and their life space to get more concrete information of remote products. In addition, a user-friendly interface display of interactive multimedia is applied to enhance the effectiveness of ecommerce interface and the integration of new media technology. The study may provide some references for the research of human-computer interactive interface and new e-commerce display design.
    • Show Sections

      Hide Sections

      Since 2008, many DSC manufactures in Japan, realized a new viewfinder technology (MILC), which could challenge the traditional camera market and create a new niche for small companies especially. Afterward. several brilliant products have been announced, such as: Panasonic Digital Camera Lumix G Series, Sony Nex-3, Nex-5, Nex-C3,and Samsung NX100 respectively. Moreover Sony launched brilliant ∂ 33, ∂ 35, ∂ 55 and ∂ 77 , introducing a new device for viewfinder: Translucent Mirror Technology or Single-Lens Translucent (SLT) in 2010, and attracted many photo-fans. In our research, we collect more than 300 cases from the telephone survey during March 2011 to June 2011. Total of 232 cases comply with the conditions. To probe mainly into the relationship between SLT Confidence level and 3 different potential customers: Amateur Photographer (AP), Senior Photographer (SP), and photo fans (PF). Theprofiles of contingency table were used to explore the potential preference for the camera with SLT device. That is the reason what we are probe into this highly competitively market with brilliant creative design, and hope to offer an objective suggestion for both industry and education administers.
  • Session 12 Computer Science and Logistics Engineering

    • Show Sections

      Hide Sections

      The causality relationship between defense expenditure and economic growth has caused attention and has been the subject of extensive theoretical and empirical work. In this article, using panel data analyze the causal related issue between defense expenditure and economic growth in the Northeast Asian countries. The results indicate that the economic growth has a significant positive effect on the defense expenditure of the four Northeast Asian countries. Therefore, the country would like to increase its defense expenditure; it should develop its economy first. The main policy implies that the increasing tense situation in recent years at this region, any solution to the economic growth problem in Northeast Asia cannot ignore the need of defense expenditure to ensure its national security.
    • Show Sections

      Hide Sections

      This study proposes a clustering method for effective customer segmentation. To select appropriate initial seeds, we propose the use of Taguchi Method as the tools. This study propose the results of the Taguchi Method for application to a real-world case of tea-beverage customer segmentation. The results show that the Taguchi Method may improve segmentation performance in comparison to other typical clustering method.
    • Show Sections

      Hide Sections

      Although market segmentation is very important for marketing management, it is difficult for marketing managers to segment an unfamiliar global market. Employing the artificial neural network technique, this study develops an approach that uses lifestyle variables to aid the attribute-based segmentation in a new market. The approach helps marketing managers quickly to analyze the preference of product attributes in the unfamiliar markets. Using the tea drink market as an example, this study demonstrates the implementation process of the model. This approach has the following strengths: (1) Insights gained from an existing market segmentation study can be used aid the segmentation efforts in a new global market. (2)Only lifestyle and demographic data are needed, eliminating the difficulty and unreliability caused by potential consumers answering unfamiliar product attribute question. This model has the potential to enhance the efficiency and effectiveness of market planning.
    • Show Sections

      Hide Sections

      This study took the initiative to forecast China's military spending based on a autoregressive integrated moving average (ARIMA) model and artificial neural networks (ANNs) models for predicting the short term (1 year), the medium term (3 years), the medium-long term (5 years), and the long term (10 years). The mean absolute percentage error (MAPE) index is applied to measure prediction accuracy. The results indicate that the single-variable ARIMA model shows more stability and higher accuracy across the four time periods, while ANNs models show only “good” accuracy. As to multiple-variable models, the prediction accuracy of different variables has advantages in the different time periods. Model 3 including variables of China's military spending, GDP, and inflation rate of the previous period shows the most accurate prediction to the next period of military spending both in short term and medium-long term, while Model 4 including China's military spending, GDP, inflation rate, and Taiwan's military spending of the previous period has the highest accuracy for medium term prediction. Meanwhile, Model 2 including China's military spending and GDP of the previous period indicates the most accuracy for the long term prediction. Overall, on the average of the four different time periods of ANNs models, Model 2 including China's military spending and GDP of the previous period proves most accurate prediction than that of others. This concludes the contributions of this study.
    • Show Sections

      Hide Sections

      This paper presents a fast channel assignment algorithm based on the well-known Left-Edge Algorithm (LEA) and the data structure of buckets for printed circuit boards, electronic design automation, and scheduling. Meanwhile, this algorithm can be applied to channel assignment with a minimal number of tracks. The time and space complexities are both thO(N), where N is the number of trunks.
    • Show Sections

      Hide Sections

      Based on characteristics which are unstable in essence, nonlinear and parameters uncertain of magnetic levitation system and chattering problems that exist in the conventional sliding mode control theory, this paper establishes a nonlinear and dynamics system model, using saturation function in place of switch function and designs a quasi sliding mode controller of magnetic levitation system based on combined reaching law. It demonstrates the system stability by using Lyapunov stability theory. From the simulation results, it can be proven that quasi sliding mode controller could effectively reduce chattering, with satisfactory static and dynamic performance and strong robustness.
    • Show Sections

      Hide Sections

      The problem of flexible distribution system's production decision optimization under demand uncertainty is solved using the operational research method. Objective function: minimization of distribution system's expected total cost; constraint condition: manufacturing flexibility; Decision model: flexible distribution system' production; through optimization analysis, the implication and economic significance of efficient frontiers of distribution system's production flexibility are calculated, on the basis of which the judgment criteria for minimization of cost flexibility factor are introduced, thereby obtaining a method to determine the optimum program. Finally the model is verified by calculations.
    • Show Sections

      Hide Sections

      The use of structures and techniques of relational data warehouse is a subject of redress for the optimization of these. It helps to reduce the response time caused by the large volumes of fact tables, as well as the multitude of joints between it and the dimension tables.Through our research, we proposed a new method based on ants. It consists to determine all the subsets of rows in the fact table that introduce the same predicates. These subsets are building the basis for partitioning the fact table.Our work has been the subject of an experiment on the benchmark APB1 and gave very satisfactory results.
    • Show Sections

      Hide Sections

      When it comes to hospital service quality, the processing time of prescription is always considered as one of the most obvious and important indicators, and has influenced the patient safety directly. The present situation of the prescription filling line designed for individual pharmacist without taking patient safety into consideration has existed in Taiwan for decades. Therefore, this study tried to focus on restructuring the picking process reengineering of prescription by doing a three-year research of defining the principles how the multiple pharmacists cooperate the prescription filling line together in the pharmacy department. Also, we tried to decrease the human errors of prescription filled by re-planning the layout on the drug cabinets with ABC classification method and re-organizing the pharmacists to pick out the same prescription meanwhile with line balance method. So, there will be less time to spend in searching and identifying prescription filled for both pharmacists and patients with ease and safety.
    • Show Sections

      Hide Sections

      Netflow, a network traffic statistical technique, is used to detect network's abnormal behaviors. With the growing utilization of internet, daily-generated netflow data have increased from megabytes (MB) to gigabytes (GB). The computation time required to filter netflow data is longer with asingle central processing unit (CPU). In this paper, we proposed a novel computation scheme to improve the efficiency of netflow data filtering with the integration of the computing capability of the graphics processing unit (GPU) and the central processing unit (CPU). In our scheme, we developed the optimization of the data arrangement onto the memory and adjust the memory access sequence. The experimental results showed that the computation performance attained by our approach was about 11 times faster compared to that attained by CPU-only architecture.
  • Session 13 Computer Science and Logistics Engineering

    • Show Sections

      Hide Sections

      In spite of applying modern management techniques, setup time still plays an important part in the production cycle time According to requirements of the market a great number of small companies are forced to offer a wide variety of products and to frequently respond to the market with customized solutions. In the examined companies, the relationship between changeover time and processing time was significant. The problem is not single change over time, but is in the quantity of changeovers required. The above research inspired the author to prepare an algorithm of setup time reduction by identifying and improving efficiency of bottleneck. Improving the efficiency of the bottleneck was performed through the appropriate arrangement of task. The appropriate arrangement meant considering the similarity of parts from the point of view of the operation carried out. The presented algorithm is one of the elements of a computer aided management system for high-variety production. High-variety production like mass customization is facing the challenge for SMEs. The method was validated in the conditions of best practice production for unit and small batch production.
    • Show Sections

      Hide Sections

      The paper is concerned with the new model of matching between load and limited executive resources of heterogeneous distributed components as basic condition of effective control and management of complex systems. Investigations show that optimal control and management of emergent complex systems in global scale is possible only in conditions of thermodynamic equilibrium of heterogeneous distributed components of complex systems. This means elimination of long-term processes and bottlenecks in the system. Then, the response time of system depends only on internal self-organization, is not sensitive on external limitations and self-stabilizes. Presented investigations can be helpful in design of multi-agents systems, control distributed systems and management systems.
    • Show Sections

      Hide Sections

      In order to improve the spatial layout of the logistics industry strategic planning system and thoroughly breakdown the previous logistics division based on administrative division boundaries, an improved logistics network model is presented in the article based on traffic accessibility. The model takes location of logistics node, economic ties among logistics nodes and transportation costs of the entire logistics network into consideration, which is effective and beneficial to optimize and integrate the logistics network.
    • Show Sections

      Hide Sections

      In this paper, the two-stage ordering decisions under partially observed demand is modeled, and other two benchmarking models are also proposed. Moreover, the existence of the optimal solution is analyzed, and the algorithm is discussed. In addition, a numerical example is provided. Further, the effects of mistaken treatment on the optimal decision and profit are analyzed; and some managerial insights are proposed to help supply chain practitioners to tackle with this challenging situation.
    • Show Sections

      Hide Sections

      This paper considers an interaction decisions between a manufacturer and a retailer. The manufacturer is the leader and provides a home delivery service, thus he could control the distributed lead time. First, a Stackelberg game model and a benchmarking integrated model with controllable service level and lead time are established; then some properties of these models are deduced, and algorithms are developed. Furthermore, a numerical example is presented to illustrate the models and the algorithms, and some comparisons with the existed model are given.
    • Show Sections

      Hide Sections

      In the logistics network, one or a few links of delay through the network node coupling relationship between other nodes to produce delay, and led to a chain reaction, causing a delay spread. This paper defines the connotation of logistics network delay, put forward measures, on the basis of the logistics network delays and diffusion process in various changes in the parameters of the system analysis, proposed the delay in the logistics network diffusion method for determining the critical value. This study can decrease due to the delay of the diffusion and transmission loss due to; reply as soon as possible logistics network normal function, has certain theory significance and the practical value.
    • Show Sections

      Hide Sections

      The previously developed LB-DF/FD method is used for the simulations of flow induced by a rotating circular cylinder in a Newtonian incompressible fluid between two parallel plane walls in the presence of two supplementary plates mounted midway between the walls. Fascinating structures composed of both streamlines outlining the axial plate and streamlines around two axisymmetric stagnation points have been obtained through computer simulations. Good agreements between the numerical results and the experimental results are observed. Moreover, flow structures with two supplementary short plates have been also investigated.
    • Show Sections

      Hide Sections

      It has been difficult, for low availability of traditional decision support system data, to meet modern enterprise need to data collecting, sorting and analysis. In paper, taking the Yuancheng group for example, a Business Intelligence solution of integrated logistics enterprise is proposed. It will help logistics enterprise turn data into information, and turn information into knowledge, then turn knowledge into profit. More importantly, it can improve the rational decision-making ability.
    • Show Sections

      Hide Sections

      The producer is always a leader in choosing its own reverse logistics system. In this paper, three reverse logistics models and their attributes are analyzed. The attributes show that in view of incomes the producer should always choose building its own reverse logistics system in which can be gained the maximum incomes and the minimum prices. However, the return rate in this system may be the least one. It is also shown that the more remanufacturing rate of returns, the more return rate can be got. Conclusion shows that the best reverse logistics system should be decided by considering of environment as well as the attributes of different models.
    • Show Sections

      Hide Sections

      Based on the key factors affecting innovation performance, pointed at the nationwide technology innovation system, this paper constructed evaluation index system, evaluated the effectiveness of technology output efficiency and technology achievements transformation efficiency of Hebei Province in comparison with 31 provinces (cities) of China by using the two-stage Data Envelopment Analysis.
  • Session 14 Computer Science and Logistics Engineering

    • Show Sections

      Hide Sections

      With the MIKE21-BW model, software for simulation of 2D estuaries and coasts developed by DHI, the wave mathematical modeling procedure was used to calculate the wave height near the breakwater. In the process of the general plan layout of the breakwater for a fish port in Fujian Province, among several design proposals, a rational one was then determined and in the meantime, some aspects that should be taken into consideration during a design were also recommended.
    • Show Sections

      Hide Sections

      The layout Planning of a logistics center can affect the region's economic development directly, and a good layout plan plays an important role in promoting the development of the logistics industry and economic. So it is necessary to make an objective assessment of planning logistics center's overall performance, and then choose an optimal scheme through a comprehensive performance evaluation. The basic idea to evaluate proposed layout planning of logistics center using the game theory is put forward .Then the player, strategy set and payoff function of the game are given to construct game model. At last specific algorithm and the calculation process are presented.
    • Show Sections

      Hide Sections

      With the implementation of the integrated operation of global economy, the integrated operation of global supply chain logistics services is becoming the key factors to developing global economy. On the premise of balancing the high service level of supply chain logistics operation, high response speed and low operating costs, people should integrate and optimize the supply chain logistics system, optimize the operational structure of supply chain from the integrated operation system of the supply chain logistics and complete the low-carbon emissions in the whole logistics process to improve energy transfer efficiency and achieve sustained economic development.
    • Show Sections

      Hide Sections

      The errors for the holidays in the short term load forecasting are known to be higher than those for weekends. Many studies have been done to improve the forecasting errors using various methods. This paper aims to find out which model would be a better model to estimate the moving holiday effects and therefore give a better forecasting accuracy for the peak weekly and daily load in Malaysia. Moving holiday effects in Malaysia are from the major festivals namely Aidil Fitri, Chinese New Year and Deepavali. Dynamic Regression (DR) or Linear Transfer function (LTF) modeling is considered and the final selection of the models depends on the mean absolute percentage error (MAPE) and others such as the sample autocorrelation function (ACF), the sample partial autocorrelation Function (PACF) and a Ljung-Box Chi-squared statistic test. The most appropriate non seasonal DR model for the weekly load to be used for forecasting would be the LTF (1, 1, 0) for the moving holidays and ARIMA(0, 1, 1) for the stochastic disturbance. ARIMA (1,0, 1) (0, 1, 1)7 is proposed for the disturbance in a seasonal daily model with a delay factor for the LTF model for Year 2004 which has overlapping moving holidays. Both models recorded 2.075% and 2.606% respectively as the lowest MAPE value and therefore, can be considered for forecasting any public holidays in Malaysia.
    • Show Sections

      Hide Sections

      This study extracted 12 quality constructs from a questionnaire with 18 assessment indicators on company PDDRO (Plan, Design, Do, Review and Outcome) in the context of the TTQS (Taiwan TrainQuali Scorecard). The questionnaires were issued to TTQS consultants, corporate executives who had been trained in TTQS and colleague lecturers who had used Internet learning platforms in their teaching activities, in order to evaluate the level of importance of their expectations for the quality constructs of online learning platforms. The questionnaire contained paired questions (one positive question and one negative question) to divide the quality constructs into the quality attributes of the Kano Model. The purpose was to compare the variances in the subjects' feedback concerning these quality constructs in the context of customer attributes. Finally, this model integrated the Kano Model and TTQS indicators in the R&D of a new online learning platform.
    • Show Sections

      Hide Sections

      There are some kinds of methods to determine attribute weights in the multiple attribute decision making. In fact, each method has its own advantages and disadvantages. An optimal combined weighting model is proposed by maximizing deviations in order to make full use of the information contained in these methods. We also discuss the solution to the optimal combined weighting model. Finally, an example illustrated to evaluate the effectiveness of electric vehicles and conventional vehicles from the perspectives of environment, social, economic, and health factors.
    • Show Sections

      Hide Sections

      In this paper, we focus on economic lot sizing problem with remanufacturing option (ELSR) in which demand also can be satisfied by remanufacturing returns items. We analyze the two dependent activities of recovery of returns and production for demand under the dynamic lot sizing problem and get the optimal solution property. GA (Genetic Algorithm) code was developed with combining the particularity of this problem. At last, we combine the property and characteristics to develop the GA code in GA algorithm.
    • Show Sections

      Hide Sections

      As governments around the world press ahead in their efforts to improve social and economic growth, they continue to turn to development of intelligent transportation systems. Lots of alliances occurred between technology vendors and car fabrication vendors in order to make the best use of both fields to enhance, improve and make the transportation systems along with cars smarter.There are many technologies associated with the intelligent transportation concepts, such as wireless communication, built-in vehicles' electronic devices, high speed broadband networks, cloud computing…etc. the combination of these technologies will add a great value to the intelligent transportation ecosystem. In this paper, we will present a novel architecture for connected vehicles system using cloud computing and Amazon web services along with the challenges associated with implementing such system and go through its layered architecture. And the focus will be on the cloud computing part of the system.
    • Show Sections

      Hide Sections

      The semiconductor integrated circuit (IC) foundry business had been remarkably developed for the past decade in Taiwan. The IC design house, wafer fabrication industries, and IC packaging/testing business had together formed a contiguous supply chain form material to system. Logistics management of the wafer is the key linkage in the IC foundry supply chain. The objectives of this paper include the system analysis, design and development for the information management system of global wafer logistics. The business operation model for the wafer logistics management is studied and the platform-independent solution architecture is constructed. Results of this research can provide the effectiveness and efficiency improvement in wafer logistics management of the IC foundry supply chain.
    • Show Sections

      Hide Sections

      Firstly this paper defines the activity integration and Quantity integration of the task activity matrix, and gives the integration conditions and integration discount function of the activity integration and Quantity integration; Secondly, analyses the characteristics of random solution/ideal solution/negative ideal solution with integration, and gives the expressions of the random solution/ideal solution/negative ideal solution with integration; once again, builds 4pl multi-attribute assignment and decision mechanism with integration, which is based on the target to make the relative proximity of the next biggest with integration. At the same time, it designs the corresponding genetic algorithm in the second 4pl multi-attribute assignment and decision mechanism with integration. At last, through one example, it solves/validates and analyses the 4pl multi-attribute assignment and decision mechanism with integration.
  • Session 15 Computer Science and Logistics Engineering

    • Show Sections

      Hide Sections

      The research is far from sufficient in the 4PL multi-attribute assignment and decision problem. This paper introduces random solution, ideal solution, negative ideal solution and other parameters based, and builds 4pl multi-attribute assignment and decision without integration, which is based on the basic idea of TOPSIS. At the same time, this paper designs the corresponding genetic algorithm for the 4pl multi-attribute assignment and decision mechanism without integration, which is based on the foundation of the model. Through examples, this paper solves, validates and analyses the 4pl multi-attribute assignment and decision mechanism without integration, which shows the validity of algorithms.
    • Show Sections

      Hide Sections

      The Information carrier of traditional JIT Production model is manual Kanban system. Such system transfers Information slowly and is not able to provide production information timely for the management. This paper presents a solution to these problems by using a JIT production control system based on RFID technology and the corresponding flows of work. The key problems of systematic structure, design of RFID tag and its data structure, material control method and traceability are introduced. Finally, an application example is implemented to demonstrate the feasibility of the proposed system.
    • Show Sections

      Hide Sections

      Most existing XML keywords search studies pay attention to the subtree rooted at LCA nodes, while the other nodes are treated as non-relevant. But the fact is that they may be relevant to user's search intention. This paper studies how to solve this problem by result expansion. Two challenges are figured out: (1) whether the result can fill user's information need and should be expanded; (2) if the results should be expanded, then which information should be provided. Based on analyzing query logs, a decision rule is developed to solve the first challenge and can also balance the efficiency and effectiveness problem of search engine. And the TF*IDF approach is employed to solve the second challenge. Extensive experimental studies verify the effectiveness and efficiency of our approach.
    • Show Sections

      Hide Sections

      With the high-performance and complicated structure of marine power plant, the safety reliability operation of marine diesel engine is paid more and more attention to considering security and economic benefits. Fault diagnosis technique has been developed rapidly in recent years. This article discusses fault diagnosis technique in detail from aspects of failure mechanism of marine diesel engine, fault signal acquisition of marine diesel engine, fault feature extraction of marine diesel engine, fault recognition and diagnosis forecast of marine diesel engine. The present situation and the existing problems of fault diagnosis technique on marine diesel engine are pointed out. Finally development direction of fault diagnosis of marine diesel engine is put forward.
    • Show Sections

      Hide Sections

      Rational selection of monitoring parameters is a key task of developing vehicle intelligent terminal for modern mechanical equipment. According to the fact of the existing problems in selecting monitoring parameters, a grey clustering model for optimizing and selecting the monitoring parameters is put forward. Monitoring parameters of a minitype hydraulic excavator are studied and the grey clustering model is established, discussed and verified. The results showed that the model meets the requirement of practicability and universality.
    • Show Sections

      Hide Sections

      Aiming at the lack of processing accuracy for reverse engineering software, a new method of reverse modeling of equipment parts is proposed by combining Geomagic Studio and Pro/ENGINEER. The scheme is designed for modeling by combining reverse and obverse modeling technologies. Taking a part for example, the application is carried out and proves the feasibility and practicability of the method in model reconstruction of equipment parts by applying reverse engineering.
    • Show Sections

      Hide Sections

      In the digital processing of OBI (Oracle Bone Inscriptions), the study threshold of OBI is high, the burden of OBI experts is heavy and the knowledge-sharing degree of OBI is low. In order to resolve these problems, proposed a solution of machine translation based on example and ontology. First, the processes of example library building and OBI ontology construction are analyzed. Second, the flow of example-based and ontology-based machine translation and its key technologies are introduced. Finally, further research work is prospected.
    • Show Sections

      Hide Sections

      With the intensive business competition, customers have more and more requirements for high-speed divery. Although airway cargo is more expensive than other transportation mode, it has also been adopted gradually by many express companies in order to improve their competitiveness in time-based competition. Air freight plays a very important role in modern logistics, it fills the need for time-sensitive deliveries over larger distances, especially where the alternative modes are considerable slower, such as ships. Compared with other transportation modes, airway freight has a higher increase rate in recent 5 years. And according to the statistics of World Bank, in recent 15 years, the geometric growth rate of air freight exceed the growth rate in GDP. Therefore, how to improve the accurate volume forecast and efficiency of airway freight are becoming a crucial issue for the development of express logistics. This paper uses symmetric and asymmetric conditional volatility models, namely GARCH(1,1) GJR-GARCH(1,1) and EGARCH(1,1), estimates the volatility in monthly airway freight volume. The volatility estimated results indicate that it has an asymmetric effect on risk from positive and negative shocks of equal magnitude. Moreover, there is a leverage effect in the monthly growth rate of airway freight volume, whereby negative shocks increase volatility but positive shocks of very similar magnitude decrease volatility. These empirical results seem to be similar to a wide range of financial stock market prices, so that the models used in financial economics are also applicable to airway freight volume. Volatility experienced by logistics transportation industry has significant implications for capital investment, resource allocation and yield management. The empirical findings of this paper provide useful insights which can be expected to be of interest to the private and public sectors in logistics management policy formulation with regard to airway transportation.
    • Show Sections

      Hide Sections

      Steady growth in cargo throughput coupled with infrastructural constraints has strained the freight networks and logistics operations in many developing countries. This has resulted into congestion at ports and higher logistics costs associated with port-hinterland connectivity. In turn higher logistics costs limit the competitive ability and effective participation of affected countries in the global economy. This paper proposes and presents a Co-modality Logistics Network Optimization Model based on LINGO Mathematical Modeling Language for solving container flow problem in multi-stage multi-modal transport corridors.
    • Show Sections

      Hide Sections

      This study compares the prediction performance of Taiwan's energy consumption based on a autoregressive integrated moving average (ARIMA) model and artificial neural networks (ANNs) models for forecasting the short term (1 year), the medium term (3 years), the medium-long term (5 years), and the long term (10 years) over the period 1965–2010. On the average of the four time periods, the results indicate that the single-variable ARIMA model shows superior performance than that of ANN1. As to multi-variable models, the prediction accuracy of different models has advantages in the different time periods. ANN4 model including variables of energy consumption and export shows the most accurate prediction in short term and medium-long term, while ANN6 model including energy consumption, GDP and export has the highest accuracy for medium term prediction. Meanwhile, ANN3 model including energy consumption and population has the best accuracy for the long term prediction. Overall, on the average of the four different time periods of ARIMA model and ANNs models, ANN3 proves the most accurate prediction in comparison to the others. This concludes the contributions of this study.
  • Session 16 Computer Science and Logistics Engineering

    • Show Sections

      Hide Sections

      Housing is one of the most important issues for people's livelihood. From the point of view of accountancy, the stable housing price and robust real estate market may lead to a harmonious society. Hence, it is critical to investigate the balance between people's livelihood and real estate market. In this paper, the game analysis for the balance of the people's livelihood and real estate market is carried out by the use of behavioral game theory and several proposals have been given to solve this problem. The analysis results demonstrate that the developers take much more advantage than the buyers in the housing price game, and thus the people's livelihood is not satisfactory. The house price regulation action should be taken, and the government should take plans to regulate the real estate market, and guide the marketing competition to balance the people's livelihood and real estate market.
    • Show Sections

      Hide Sections

      A good task scheduling algorithm can efficiently allocate grid resources and effectively reduce total task execution time, so as to enhance performance of the grid. Based on the fusion of genetic algorithms and ant colony algorithm, this paper combines the respective advantages of genetic algorithm and ant colony algorithm to produce one hybrid algorithm, which was applied into task scheduling in grid environment, simulation results show that the application of hybrid algorithm for grid task scheduling can effectively reduce total task completion time, and the system has good load balancing and efficiency of task scheduling.
    • Show Sections

      Hide Sections

      Aiming at problems of slow convergence and to easily plunge into one partial basis in basic ant colony algorithms, an improved ant colony algorithm is proposed in this paper. In this improved algorithm, the inspired route information strength changes according to the vehicles loaded rate. Both local information and global information are updated on the effective route. Achieving at local optimal basis ensures the best possible solution by means of 3-opt optimized algorithm. The example of 22-city vehicle routing is simulated by this improved algorithm, and it shows that convergence speed has increased by nearly 50% , which compared with basic ant algorithm. The algorithm has achieved significant results too, and needs less time to solve large-scale vehicle routing problems.
    • Show Sections

      Hide Sections

      To learn how the number of nodes, relaxation factor and terminate condition effect numerical result in numerical calculus, two common used differential equations and Laplace equation were solved while finite volume method (FVM) was used as discretization method. The study shows that there is an optimum number of nodes, the numerical result will be more inaccurate while the number of nodes is smaller or bigger, and that there is an optimum terminate condition, the numerical result will be more inaccurate while the terminate condition is smaller or bigger, and that relaxation factor usually is 1, 1.1 or 1.9 for linear equation, and usually is 0.1 or 0.9 for nonlinear equation.
    • Show Sections

      Hide Sections

      The production in steel plant is complex and special, there are many constraints and objectives to be considered in the problem of mid-term production planning, this paper developed a multi-objective and nonlinear model for this problem based on goal programming (GP) and constraint programming (CP), aiming at advancing the profit and productivity of the plant. For give a feasible optimized solution, it relaxed some hard constraints by GP, and did a piecewise linear approximation to the non-linear model with generate algorithm (GA) and linear programming (LP). To test the affectivity and flexibility, this paper did three groups experiments and showed that the method indeed could find the satisfactory solution in acceptable time.
    • Show Sections

      Hide Sections

      The SGA (Simple Genetic Algorithm) is said to be successful if the average fitness of the population after mating is better than the initial average fitness i.e. fnew > finit, where fnew is average fitness after mating and finit is average fitness before mating. The average fitness is defined as the average of fitness of chromosomes in the mating pool. The chromosomes are implemented as bit strings (i.e. 1001). These bit strings are represented using integers. The SGA performance is evaluated in this paper by varying the crossover probability and mutation probability.
    • Show Sections

      Hide Sections

      As an intermediate organization between bureaucratic organization and market, industrial cluster provides the firms in it with benefit for reducing transaction cost. Based on dividing the transaction cost into endogenous and exogenous transaction cost, this paper further separates endogenous transaction cost into internal endogenous and external endogenous transaction cost and subdivides exogenous transaction cost into market, management and political transaction cost. Then this paper constructs the models of each kind of transaction costs and analyzes the mechanism that how industrial clusters can help firms to reduce the endogenous transaction cost. This paper also proposes some suggestions for governments to help firms in the industrial cluster to reduce transaction cost.
    • Show Sections

      Hide Sections

      From the technology proceed of the method in revising kernel technology, through created the variable poreempt_count in the process control block and modified the strategy code, by used the functional properties of the SMP structure in Linux kernel, deprivable scheduling FCA was set in the µCLinux kernel, the CPU also could schedule the process when it returned from the system space, thereby it enabled that µCLinux had the ability of deprivable real-time preemption. Finally, the revisions of the kernel context switching delay before/after modified were tested and compared, which proved that a new preemptive kernel enhanced the real-time function of µCLinux system.
    • Show Sections

      Hide Sections

      This study focuses on inventory allocation of special manufacture enterprises that produce single kind of products. A goods inventory allocation strategy model was proposed, which properly take advantage of Fuzzy C-Means (FCM) clustering algorithm, and verified more valid and utility than other strategies through computer stimulation. The special innovation point of this study is to choose appropriate FCM clustering indexes from goods ordering information, so the clustering results of goods adequately face the order customers' demand, minimize logistic cost and improve overall logistical efficiency.
    • Show Sections

      Hide Sections

      A multi-objective job-shop just-in-time scheduling model is built with new evaluation function to deal with the optimization of machining parameters in multi-objective Job-shop just-in-time scheduling. Computational result with genetic algorithm realized by computer shows that selecting machining parameters and scheduling simultaneity is better than traditional fashion which divided them into two steps. Moreover, the new evaluation function can reflect the effect of change of weight numbers to scheduling result well.
  • Session 17 Computer Science and Logistics Engineering

    • Show Sections

      Hide Sections

      On the basis of analysis of apparel logistics network, the logistics network routes for apparel of different sales models and order types are elaborated and the component of costs generated on the logistics network routes is studied. As for the optimization of logistics network routes for apparel in different category, the 0–1 programming mathematical models are proposed and compendious solutions are provided. In a case study, the optimization models are used to optimize a company's logistics network routes.
    • Show Sections

      Hide Sections

      As secondary suspending system, suspending parameters and simplified model of air spring has important effect on vehicle dynamical analysis. Aiming at air spring system of low-speed maglev train, the dynamical model of air spring with auxiliary chamber was established. Based on amplitude-versus-frequency characteristics analysis of levitation system and air spring system, the air spring system was reduced to a second order oscillation system, the equivalent stiffness and damping of air spring system were obtained. The research results provided a theory basis for optimal design of air spring and vehicle dynamical analysis.
    • Show Sections

      Hide Sections

      This article proposes a VMI operation mode from the perspective of third-party logistics, in which the operator is TPL. In the previous researches, TPL has always been taken as a supporter in the implementation of VMI. However, when TPL provider carries out VMI strategy for suppliers and manufacturers, VMI strategy will maximize its strengths and minimize weaknesses. In this article, the concept of VMI service mode will be detailed including the operation mode and basic working flow. Moreover, we will discuss the advantages of this mode compared with the traditional VMI model.
    • Show Sections

      Hide Sections

      An intelligent module is designed to be applied to optimization and decision-making on the problem of dynamic location assignment for material in AS/RS. The problems on the area and storage location assignment strategy in AS/RS are discussed. The paper sets energy consumption and the operating time of the stacker as the optimizing control objectives basing on the random storage strategy for the area and location assignment. Then it puts forward the mathematical model on the storage location optimization in AS/RS. Furthermore, it constructs the intelligent module combining with the simulation software platform. At last, it carries out simulation test and analyses by example. The results have shown that the intelligent module can optimize the storage location assignment problems in AS/RS effectively and improve the loading-unloading efficiency. It has provided theoretical basis and intellectual support to the practical operation of the enterprises.
    • Show Sections

      Hide Sections

      This paper addresses the inverse dynamic analysis of cable-actuated robotic manipulators with non-negligible cable mass. The manipulator architecture is a simplified version adopted from the structure of the feed cabin to track radio source in 500-m aperture spherical radio telescope (FAST). In this paper first, the governing dynamic equation of motion of such structure is derived using the principle of virtual work and the Newton-Euler equation for a varying mass system. Next, the dynamic equations of the system are used in simulations. It is observed that the limb with variable mass does contribute to the dynamical forces required to generate a given trajectory.
    • Show Sections

      Hide Sections

      Established the performance evaluation system from project management point of view within R & D project environment, using the AHP method for the weights determination of index for KM performance evaluation. Performed a case study for R&D project within an enterprise for R&D and manufacture of large medical device. Also recommended for taking a step forward study on the periodical knowledge management performance review.
    • Show Sections

      Hide Sections

      In this paper, we propose IGFS (information gain based feature selection) method to speed up online SVM filter for spam filtering. Though online SVM classifier gives high classification performance on online spam filtering on large benchmark data sets, its computational cost turns out to be very expensive for other faster methods such as Naïve Bayes on large-scale application. We use information gain based feature selection method to reduce feature vector dimension of online SVM filter in this paper. Experimental results illustrate that the method improves the filter performance a little and greatly reduces the computational cost of online SVM filter.
    • Show Sections

      Hide Sections

      DEVS is a hierarchical and modular system descriptive method. However, it cannot describe dynamic process and relationship between system members. This article has proposed a way to extend UML using stereotype, making it suitable for simulation modeling. To build a modeling tool, we defined atomic model class and coupled model class, both of which are in line with not only DEVS's hierarchical and modular requirements but also UML's object-oriented characteristics. At last, we use the tool to analyze and build UML models for the container berths system, making it easier to implement on simulation platform.
    • Show Sections

      Hide Sections

      ISO18185 is the international standard of active e-Seals, which provides a system for the identification and presentation of information about freight container e-seals. The identification system provides an unambiguous and unique identification of the container seal, its status and related information. However, on the contrary, the standards of passive e-Seals are still undetermined. Due to the advantages of low-cost and low-complexity, the passive e-Seals are suitable for the one-time-use-only applications and anticipate being a replacement of active e- Seals in the near future. In this paper, a brand new, formal specification of passive e-Seals based on the EPC Radio-Frequency Identification Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860MHz to 960MHz is proposed.
  • Session 18 Computer Science and Logistics Engineering

    • Show Sections

      Hide Sections

      In this paper, though taking a container terminal in the Pearl River Delta Area as a case, a simulation model of the wharf apron is built. Handing efficiency and equipments capacity factors are the most important indexes of a port. The first function of this model is optimization of loading and unloading operation, though analyzing different handling planning and flows. And the other is partical optimizaiotn of the wharf apron operation, though adjusting the number and the speed of container trucks. Minimizing total handling time is the terminal goal. What we know from the analyzing result is, the simulation results are believable, and the model is corrective and of great practical significance.
    • Show Sections

      Hide Sections

      A two-level dual-channel port supply chain model was established. The performance of demand forecast information on the port enterprise and the third-party freight forwarder according to Stackelberg game was investigated. By comparing two cases (no demand forecast information sharing case and demand forecast information sharing case), the value analysis of information sharing was investigated.
    • Show Sections

      Hide Sections

      The quality and price competition between new products manufacturer and remanufacture have been studied in this thesis, and quality level selection strategy of new products manufacturer and remanufacture have been proposed as well. The results have shown that: In the first stage, the greater difference in the level of quality between new manufactured products and remanufactured products, the higher profit new product manufacturers get higher profit; in the second stage, the optimal price response functions change, specially, in the case of unconstrained, the remanufacture's profits higher.
    • Show Sections

      Hide Sections

      A common model is formulated for solving the winner determination problem of reverse combinatorial auction. A PRIM (Preprocessing Rules-Based Improved MMAS) algorithm is adopted for the problem. Three preprocessing rules was proved to be feasibility. By applying two of the preprocessing rules before searching begins, noncompetitive bids can be removed efficiently and the bid scale was decreased. By using the other preprocessing rule in every round of search, unnecessary trials will be avoid early. Simulation results show that the PRIM algorithm achieves good performance than MMAS in different size problems. Meanwhile PRIM performs more steadily than MMAS as the number of bidders increase.
    • Show Sections

      Hide Sections

      Position auction is an effective mechanism for search engines to determine the position of advertisement. The search engines let the advertiser specify a single amount as their bid in the auction. This amount is interpreted as the optimal tender price the advertiser is willing to pay per click on its ad. The optimal tender price allows the advertiser obtain maximum expected return in the generalized first price position auction. In this paper, the assume conditions are noted in the position auction base on the Friedman's model and the probability of winning bid model of the position auction is formulated. By the way of maximize the advertiser's expected return, the keyword bid prices selected model is formulated, which allows the advertiser to select the optimal tender price in the generalized first price auction. Simulation results show that the model for the problem of position auction let the advertiser get maximum expect return.
    • Show Sections

      Hide Sections

      This article discusses the key technologies of container terminal logistics system simulation based on Anylogic. After some fieldwork, data fitting and logistics process analysis, uses the Anylogic simulation technology on a port in the Pearl River Delta, to get the utilization rate of the berths. It provides the foundation and support to the terminal logistics process optimization in the future.
    • Show Sections

      Hide Sections

      Multi-Agent System (MAS) based computing is the most appropriate paradigm for the problem domain, where data, control or resources are distributed. The MAS has the hypothesis that the agent based computing offers better approach to manage the complex systems and process. Networked software system (NSS) for the complexity and uncertainty of its impact on system reliability, in this paper we assume the MAS consist of a number of independent agents to analysis NSS reliability. The aim of this paper is to provide methods to construct such the MAS based reliability modeling approach for NSS, NSS reliability design, and the coordination and interaction among agents.
    • Show Sections

      Hide Sections

      This paper try to combine intelligence risk evaluation with statistics decision method to research server optimizations strategy in M/M/1/∞/∞/PS distribute control system. It introduces how to induct uniformly minimum risk function into security evaluation, including M/M/1/∞/∞/PS queue distribution analysis and optimization decision with uniformly minimum risk function. Theoretically this method can be used to adjust service priority statically according to system environment.
    • Show Sections

      Hide Sections

      In this paper we examine the risk-pooling effect of demand substitution and its impact on selecting among various outsourcing strategies in the multi-layered supply chains. We develop a lead time model and a comparison framework to evaluate the two outsourcing strategies: consignment stock and competitive bidding, with possible demand substitution. Demand substitution by persuading customers to purchase the substitute item instead of the original item they had in mind has been frequently used to reduce the total demand variability and thus reduce the need for inventory. In our study, however, it is found that demand substitution will not always reduce the inventory holding cost. The cost benefit is expected as long as the demand for the product after substitution is not “heavy”. In addition, if the portion of switching customers is small or the products are originally negatively correlated in demand, “longer” supply chains may benefit more through the demand substitution. It is also interesting to note that the cost benefit from risk pooling decreases as the correlation between demands becomes more positive regardless of the number of supplier layers in the supply chain. Our numerical examples help gain the managerial insight of taking advantage of the risk-pooling effect, and illustrate the application of the proposed outsourcing comparison framework.
    • Show Sections

      Hide Sections

      Quality function deployment (QFD) is a planning and problem-solving methodology that is widely used for translating customer requirements (CRs) into engineering characteristics (ECs) of a product. Estimating the correlation measures among ECs for product planning house of quality (PPHOQ) is a crucial step of the QFD implementation process. This study presented a rough set based methodology for estimating the correlation measures by discovering the knowledge and experience of QFD team, with the help of introducing a concept of the category factor of a correlation. A case study of two-cylinder washing machine is used to demonstrate the proposed methodology.
  • Session 19 Information and Multimedia Technology

    • Show Sections

      Hide Sections

      Yan Xishan, one of the most influential figures in the modern history of Shanxi ruled the province for 38 years, during which period, the military and political power was totally under his control. The construction of his residence in the Riverside Village was initiated in 1913 and completed just before the Anti-Japanese War broke out in 1937. Nearly a thousand houses (now existing 18 courtyards, 575 houses) were built, including more than 30 courtyards such as Dudu Fu, Deyi building, the Manor House, Second Venerable Master House, Chuanxi yard (Old- fashioned bungalow), the East Garden , the West Garden and etc, covering an area of 33,000 square meters. Dozens of courtyards differ from each other, which results in the entire buildings of diverse styles, without losing its overall beauty. Among the buildings, both the traditional and western architectural styles can be found, most blending Chinese style with Western style. The spectacular momentum and the diversity of architectural styles make the buildings not only the valuable materials in studying the rise and fall of Yan Xishan families but also a significant living example of Shanxi modern architecture. With the distinctive combination of folk color and the fusion of Chinese and Western architectural styles, Yan Xishan's former residence has become a link between Chinese modern architectural style and western modern architectural style, displaying its unique aesthetic values and cultural values.
    • Show Sections

      Hide Sections

      The paper presents a cost-effective approach to automatic people detection, segmentation, tracking and counting, which is designed for a system with an overhead mounted (zenithal) camera. First the background subtraction is done using a running average-like background model, then k-means clustering with some constrains is used to enable the segmentation of single person and get his location, before segmentation a people number estimation in the scene is used as a priori. Tracking of segmented people is solved using motion prediction method. People counting system have been applied to people surveillance and management areas. Experimental results suggest that the proposed method is able to achieve very good results in terms of counting accuracy and execution speed. (F-score above 95% over 3 video clips, at full frame rate 30 fps).
    • Show Sections

      Hide Sections

      The advent of E-learning has brought considerable changes in the educational system of many countries and Iran is no exception. E-learning provides an opportunity for e-learners to learn at their own speed, and style of learning. The advantages of e-learning are clear, but the important issue is how to improve the effectiveness of this mode of learning and to the satisfaction of users. The objective of this qualitative study was to determine the opinions of students, administrators, instructors and staff working at e-learning centers in Iran's universities, regarding the effectiveness of e-learning at their centers. Interviews with key informants and a review oflibrary documents were conducted for this study. The findings showed that the administrators of E-learning centers should make known their expectations from IT staff before the latter started their work. Students should be provided with clear information of what they were expected to achieve at the end of each E-course. Students should be taught on how to study using the available system and how to fully utilize all facilities provided. Also, there was a necessity for sufficient communication and interaction between instructors and students; instructors and IT staff; IT staff and administrators. More results are subsequently explained in the paper.
    • Show Sections

      Hide Sections

      In this paper a new combined approach is presented known as PSO-Great Deluge; the main idea of this approach is to combine particle swarm optimization (PSO) with great deluge algorithm. In this approach, global search character of PSO and local search factor of great deluge algorithm are used based on series. At the first step, PSO algorithm is used to search around environment and its results are given to great deluge algorithm to search about taken results accurately. This approach is tested and its efficiency is compared with methods like Genetic Algorithm and standard PSO results. In this paper is shown that this approach has considerable results and usually has good stability.
    • Show Sections

      Hide Sections

      Perceptual image hashing is an emerging solution for multimedia content authentication. Due to most perceptual image hashing techniques focus on the robustness but ignore their sensitivity to trivial tampering area, such techniques might not work well when malicious attack is perceptually insignificant. Through experiments we found that some state-of-the-art image hash algorithms could not distinguish small malicious distortion and some authentic distortion. So we propose a novel method about detection of trivial image tampering via unmatched feature points clustering in this paper. First, we extract SURF (Speeded Up Robust Features) feature points but do not use its original descriptor, we use BRIEF (Binary Robust Independent Elementary Features) descriptor which is more simple and fast. Then we make a clustering to the unmatched feature points after matching, and analyze the density of the clusters. Finally, by comparing the density and a pre-defined threshold, we can correctly determine whether an image is attacked or not. The experimental results show that, compared to V. Monga's algorithm which the TPR(true positive ratio) reaches 89%, but the FPR(false positive ratio) reaches 50%, the TPR of the proposed algorithm reaches 88%, but the FPR is only 15%.
    • Show Sections

      Hide Sections

      This study seeks to test the applicability of selected e-government diffusion factors to South African municipalities. These factors were selected from existing literature under the guidance of the Theory of Planned Behavior (TPB). The research data was obtained through the completion of a questionnaire by a sample of 55 South African municipal heads of Information Technology (IT). This quantitative data was then subjected to reliability and validity tests prior to its descriptive and inferential statistical analyses. The analysis of descriptive statistics reveals the following trends on the perceptions of South African municipal heads of IT on the selected e- government diffusion factors: a high exposure of municipal citizens to IT security risks, a highly rated municipal e-government regulatory framework, and a positive perception of Information and Communication Technologies (ICT) as a municipal strategic tool. However, the perceived diffusion of e-government in municipalities and the perceived use of ICT by municipal politicians were rated as below average by the respondents. It was also found that the perceived diffusion of e-government in municipalities is associated with the perceived effectiveness of existing e-government enabling laws, with the perceived use of ICT by municipal politicians, and with the tertiary education field of municipal heads of IT. Other interesting findings include a perceived highteledensity in municipalities even thought these municipalities and their households are predominantly poor. The uniqueness of this study can principally be ascribed to its focus on municipal heads of IT from a less developed country.
    • Show Sections

      Hide Sections

      In mathematics, space filling curves are the curves whose range contains entire two dimensional unit square. These curves were introduced by G. Peano and D. Hilbert demonstrated a simple and fast way to visualize them. This paper briefly reviews main characteristics of the Hilbert curves and then proposes two new applications for them: visual symmetric cryptography using a color- mapping key, and a LSB replacement strategy using these curves in image steganography for embedding texts in images in a secure manner.
    • Show Sections

      Hide Sections

      The rasterizer unit is the most time-consuming architecture in 3D graphic pipeline due to its complicated computations so objects polygonal meshes rasterization is a significant bottleneck in software-based rendering. This unit is responsible for computing pixel values based on illumination, surface material, texture and ordering of the objects in scene. In this paper, we present an effective architecture for a hardware accelerator for rasterizing with Gouraud shading and perspective-corrected bilinear texture mapping features. We have synthesized and implemented the rasterizer on a FPGA PCI board for benchmarking purpose.
    • Show Sections

      Hide Sections

      Datasets are not always time independent and consequently both information retrieval and data mining should be rethought, e.g., to not report to the users the data clusters that may be obsolete in a near future. Also, discovering how a cluster evolves may help the users in studying the dynamics of complex phenomena. Therefore, aim of the paper is to propose a method to study time-evolving clusters from how the density of the data vectors belonging to each cluster changes in time. Data clusters and their evolution are visualized by tagging the data items, represented in their original space, with the clusters to which they belong to. The paper shows how the user should organize the data items along two dimensions suitable for the problem at hand if the dataset does not have a physical nature or if the physical localization of the items is not relevant for the study. A Parallel SOM is used to study the evolution of clusters derived from massive datasets. Some examples illustrate the proposed methodology.
    • Show Sections

      Hide Sections

      This paper proposes a system for automatic video analysis to detect events in video sequences with crowds of people. In detail, the proposed system consists of three subsystems: 1) the first identifies the motion areas, resorting to chaos theory using joint histogram between consecutive frames, 2) the second one creates a flow motion map that describes the behavior of motion pixels by using Lagrangian Particle Dynamics Theory and, 3) the last one uses self organizing maps (SOM) for segmenting the flow motion map in order to detect events.The proposed method was tested on a set of 30 videos, describing crowds in different scenarios, collected from the BBC Motion Gallery, achieving an average accuracy of about 87% in detecting events such as people stopping, people laying on the ground, group of people fighting, obstacles on the road and long queues.
  • Session 20 Information and Multimedia Technology

    • Show Sections

      Hide Sections

      Static scheduling is the important issue to manage resources of parallel system. Scheduling algorithms use the Directed Cyclic Graph (DAG) to represent tasks and their constraints to be parallelized. It has been shown to be NP-Complete problems. This paper proposes a method by effective task scheduling algorithm by using genetic algorithm. It provides nice result for applications represented by DAGs.
    • Show Sections

      Hide Sections

      Grid computing has emerged as an important new field, distinguished from conventional distributed computing by its focus on large-scale resource sharing, innovative applications, and, in some cases, high-performance orientation. QoS-aware service composition is a key requirement in Grid environments since it enables users to fulfill his/her required complex tasks while meeting different global Quality of Service (QoS) constraints. The problem of QoS-aware grid service composition is known to be a NP-hard problem. In this paper a novel Ant Colony Optimization (ACO) algorithm is proposed for QoSaware grid service composition to find near optimal composite service. This paper also presents a set of experiments conducted to evaluate the efficiency of proposed algorithm.
    • Show Sections

      Hide Sections

      We have described a distributed system independent source separation of form and position of each shy; Based on the ratio of energy value f-component sensors get clustering and optimization method. In the simulation conditions realistic with Doppler Effect is by and Rayleigh fading to illustrate how to realize the system problem is exercise more source orientation. The results show that the system will be low to high precision, need to communication cost for large data sets.
    • Show Sections

      Hide Sections

      Building information modeling (BIM) is a representative information technology application tool in construction project. Each element are designed by 3D object and each construction process is simulated by 4D or nD CAD system using virtual reality in BIM system. BIM should be structured basically around 3D-oriented object composition, but 3D object composition in civil engineering work includes landscape information and encompasses wide-ranging facility types (e.g., roadways, ports, airports and dams), thus requiring relatively more improvements of existing BIM system. This study suggests a method and an improved strategy that practical engineer can apply BIM tool to the civil engineering project.
    • Show Sections

      Hide Sections

      This paper aims of developing a relationship between the Lines Of Code (LOC) and the software complexity. As software complexity is supposed to be the indicator of software quality, reliability, maintainability and its development cost, so the correlation between the LOC and the software complexity can provide a feedback to the development team for making the software more reliable and maintainable. The paper describes the results of an empirical investigation which shows the relationship between the LOC and McCabe Cyclomatic Complexity (MVG) in the domain of Open Source Software. The software parameters namely LOC and MVG are discussed in theoretical point of view. Empirical data was collected for two Open Source Software namely Apache Web Server, MySQL Database over ten different versions in each category. The collected data is then analyzed using a software metric tool namely C and C++ Code Counter (CCCC) to get the values for LOC and MVG. Results shows that the LOC and McCabe Cyclomatic Complexity has a positive relationship which means that as the LOC increases then the MVG also increases and inversely if the LOC decreases then the MVG also decreases. However further empirical studies are needed before these results can be generalized.
    • Show Sections

      Hide Sections

      In today's world where organizations demand intelligent strategies to include efficiently sourcing, storing data and retrieving data need based. Data Mining has immensely helped in improving decision making power. Numerous data mining methods in the industries exists viz. classification, estimation, prediction, association rules, clustering, description and profiling. The empirical study suggested that classification method is the best data mining method followed by association rules. The classification method is highly appreciated due to its better handling of voluminous data, extraction of data, run time versus data base size, exact set of categorized data, organized data, and minimum requirement to predict a result.
    • Show Sections

      Hide Sections

      The aim of this study is to present the manner by which a distributer company's managers can recognize channel conflict and the measures to reduce the bad effects of channel conflict. To obtain the main method of data collection in this research, descriptive and qualitative approaches were selected on the basis of interviews (the conducted interviews were face-to-face and in-depth). A case study was also carried out in addition. The two companies under observation in this research are: a) ‘Chika Company’ and b) ‘Etka Chain Stores’. The study clearly indicated that the managers of these companies are quite aware of the channel conflict issue. Numerous conflicts by the Internet were also discovered. In each company well-functioning strategies were used for the prevention and decrease of the bad effects of channel conflict. These strategies varied due to companies' conditions variation.
    • Show Sections

      Hide Sections

      Video Summarization is currently the most researched area of Computer Vision. Researchers nowadays are trying to propose more intelligent and efficient solutions for problems related to summarization. The proposed system is an effort towards the objective of proposing an intelligent and efficient algorithm designed in order to summarize the video, based upon the detection of a human being carrying a specific object, captured by a video camera. Security cameras are widely used for security purposes and to detect any illegal movement inside or outside the campus. These cameras are backbone of modern security infrastructure in any critical or security sensitive organization e.g. defense sector, education sector, hospitals etc. The system being developed actually captures each frame from the video, then it processes the frame, it retains the frames of its interest, otherwise discards the frame, hence the resultant video is very short and it only contains those frames in which a human being is carrying an object of our interest, i.e. a Laptop, Projector and a PC in our case. The system also generate an alarm in the form of a beep whenever it captures a frame in which there is a person carrying a specific object which is basically an alert to prompt security officials about an illegal movement in the surroundings.
    • Show Sections

      Hide Sections

      Nowadays, enterprises are moving towards Knowledge Organizations, the need to stay competitive is a must. Businesses need to quickly adapting to changing conditions by being quick, resourceful and adaptable, in other words becoming agile. However, information required mostly comes from plurality of sources; across network, business applications and services from heterogeneous systems and sources. As such the users are required to launch and switch between multiple applications which can contributes to waste of resources resulting in low productivity, inefficiency in decision making process. In this paper, we propose an architecture of enterprise knowledge management which capable to handle collaborative mashup between business application. Goal of proposed architecture is to help organization to optimize usage of internal and external information and eventually improves decision making process. We also present a comparison between existing enterprise mashup with our proposed architecture in term of its features.

Sorry! You do not have access to this content. For assistance or to subscribe, please contact us:

  • TELEPHONE: 1-800-843-2763 (Toll-free in the USA)
  • EMAIL: asmedigitalcollection@asme.org
Sign In