Skip to main content

2009 | Buch

Applied Computing, Computer Science, and Advanced Communication

First International Conference on Future Computer and Communication, FCC 2009, Wuhan, China, June 6-7, 2009. Proceedings

insite
SUCHEN

Über dieses Buch

The International Conference on Future Computer and Communication was held in Wuhan, China, June 6–7, 2009. The following topics are covered by FCC Conference: agents, knowledge-based technologies, bioinformatics engineering, computer architecture and design, computer networks and security, data mining and database applications, high-performance networks and protocols, multimedia and web services, network reliability and QoS, neural networks and intelligent systems, software engineering and agile development, antennas and propagation, information theory and coding, multiple access techniques, optical communications and photonics, RF and microwave devices, satellite, space and wireless communications, signal and image processing, 3G, 4G mobile communications, communications IC Design, instrumentation and control, and VLSI design. The purpose of the FCC conferences is to bring together researchers and practitioners from academia, industry, and government to exchange their research ideas and results and to discuss the state of the art in the areas covered by the conference The conference included invited talks, workshops, tutorials, and other events dedicated to this area. FCC 2009 provided a forum for engineers and scientists in academia, university and industry to present their latest research findings in any aspects of future computers and communication. The conference was co-sponsored by the Engineering Technology Press, Hong Kong, IEEE SMC TC on Education Technology and Training, and the Intelligent Information Technology Application Research Association, Hong Kong. Much work went into preparing a program of high quality. We received 110 submissions.

Inhaltsverzeichnis

Frontmatter
The Model of the Statistical Geography Information System in Grid

Nowadays many statistical geography information systems (SGIS) have been developed with different languages and platforms. The various origin and diverse structure of the statistical resources make users share them and operate these systems mutually difficultly. To solve these problems, we should take into account many aspects, such as operating the database mutually, compatible operating systems and balancing the internet load and so on. While the traditional GIS technology can not solve these problems perfectly, the grid can do it well. Based on OGSA structure, a SGIS model using grid middleware technology is proposed. This paper discusses its infrastructure characteristics and explains how this model solves the problems. Then a specific example is proposed and discussed its implementation process .Considering several key problems needed to be solved in the construction of the system, this paper gives its resolvents. It points out that SGIS based on grid is the best way for digital statistical information.

Xincai Wu, Ting Wang, Liang Wu
Line-Scan Camera Control Pavement Detection System Research

The paper designs the pavement detecting system, which is based on GPS and the serial port communication technology of the SCM (single-chip microcomputer) used to control the line-scan camera. The paper focuses on GPS and the serial port communication as well as the control programs of single-chip microcomputer .By comparing and analyzing large amounts of experiments’ data and the serial images which are obtained in the high-speed vehicle moving by using this system, it shows that this system design satisfies the requirement of external trigger control in real-time line-scan camera for the pavement detection system. The result shows that the images obtained in high speed are much clearer.

Zhao-yun Sun, Ai-min Sha, Li Zhao, Chang-rong Xie
Emergency Command System Based on Satellite Link

In the project of monitoring, warning and geologic disasters prevention in the Three Gorges Reservoir Area, the emergency command system is an important part for it can provide a reliable technical guarantee. This paper describes a multimedia

emergency

command system based on satellite link. The characteristics include an on-the-spot information collection and transmission, an integrated emergency communications, an emergency commanding, an emergency dispatching and strategic decision analysis. The system can meet the need of emergency mobile command and is effective and practical. It enhances the efficiency of working for establishing interconnection of the discrete resources and realizing the commanding of emergency.

Wenbiao Peng, Junli Wan, Chaojun Yan
SLA Monitoring Based on Semantic Web

This paper proposes SLA monitoring based on Semantic Web to realize automatically service quality monitoring according to different services and consumes with syntactic information and necessary semantic description with explicit meaning and machines dealing with service level requirements. SLA monitoring ontology is constructed based on RDF Schema step by step based on SLA monitoring requirements, ontology theory, ontology knowledge for Semantic Web. Monitoring process is build based on OWL-S benefiting for automation, coordination, and collaboration between monitoring entities.

Wenli Dong
Research and Application on Bloom Filter

A Bloom filter is a simple space-efficient randomized data structure for representing a set in order to support membership queries and has a false prediction. Bloom filters and their generalizations, weighted Bloom filters and compressed Bloom filters have been suggested as a means for sharing web cache information. In this paper, a summary about the current research and application on Bloom filter will first be given, and then Bloom filter was tested via simulation. The simulation results showed that Bloom filter is useful for space savings and it is easy to implement. The results also showed that the optimal number of hash function minimizes the false prediction.

Jing Chi
Research on the DDS to Generate MSK Signal

This paper introduced the working principle of Minimum shift keying(MSK) and direct digital frequency synthesizer(DDS),and realized the MSK modulator by AT89C51 and AD9862,The result show that it’s feasible to realize the digital modulation meeting the needs of phase requirement using DDS technology.

Wenbiao Peng, Chaojun Yan, Lihua Deng
Establishment and Application of GIS Database in Urban Heritage Conservation

This paper is about the establishment and application of GIS database in urban heritage conservation. It first mines the needed data for database establishment from literature review. Then, a series of GIS database will be designed for urban heritage conservation, which integrates three parts: one is for Urban Heritage Inventory; another is for Urban Visual Management, and the other is for Evaluation of Historical District Renewal. Finally, a case of Hankou Historical District in Wuhan, China is applied to show the application result of the GIS database.

Rui Li, Jinghua Song
RFID Middleware Design Research

The proliferation of RFID tags and readers will require dedicated middleware solutions that manage readers and process the vast amount of captured data. In this paper analyses the requirements and propose a design for such an RFID middleware. We argue that an RFID middleware should not only focus on the application needs, but must also consider the constraints imposed by passive RFID technology.

Xin Chen
RFID Applications of Consumer Perceptions and Privacy Concerns

This paper discussed the applications and implications for consumers of RFID, and focused on consumer perceptions and privacy concerns, including three fields: consumer survey results, RFID and consumer privacy, database security issues.

Xin Chen
RFID Application of Addressing Consumer Privacy Challenges

This paper discussed the applications and implications for consumers of RFID, and focused on addressing consumer privacy challenges, including three fields: existing industry practices and standards, regulatory approaches, technological approaches.

Xin Chen
Retracted: New Interleaving and Forward Error Correction Strategies for Streaming

If the frame size of a multimedia encoder is small, Internet Protocol streaming applications need to pack many encoded media frames in each Real-time Transport Protocol (RTP) packet to avoid unnecessary header overhead. Forward Error Correction (FEC) can be used in order to minimize the probability of packet loss in bursty loss environments such as network congestions. FEC is one of the techniques used to tackle loss problem by adding redundant data to the flow and helping receivers to recover missed data. In this paper, we present an approach for interleaving packets optimized for different situation of networks. Considering time constraints in multimedia streaming, we change the number of redundant FEC packets according to the condition of network, so that the experienced frame loss rate does not vary greatly under different packet loss rates. We present the results of simulation using NS2 simulator.

Mahila Dadfarnia, Majid Noorhoseini
Retracted: Adjusting Forward Error Correction for Media Streaming

Considering time constraints in multimedia streaming, multimedia applications use UDP protocol which does not guarantee data arrival. However, UDP flows often have a high data loss rate that needs to be dealt with. Forward Error Correction (FEC) is one of the techniques used to tackle this problem by adding redundant data to the flow and helping receivers to recover missed data. Another technique used is Interleaving improves the chance of recovery particularly during data burst; however it causes delay at the receiver side. This paper is proposing a new data transfer protocol that combines the two techniques in an adaptive fashion to improve data loss recovery by explicitly adapting the amount of redundancy and interleaving to the measured burst loss. a new parameter “recovery depth” is defined and controlled according to the transport media condition. Using higher recovery depth values in bursty loss increases the recovered. The adaptive scheme using the recovery depth parameter is discussed and the results of network simulations are demonstrated. We demonstrate that overall network performance for multimedia streaming application is improved using the new scheme.

Mahila Dadfarnia, Samaneh Khakbaz
AR RAAM: A Reliable Routing Algorithim Using Ant Agents for Manets

A mobile ad hoc network (MANET) is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration or standard support services in wide-area networks to which the hosts may normally be connected. In such an environment, it may be necessary for one mobile host to seek the aid of others in forwarding a packet to its destination, due to the limited propagation range of each mobile host’s wireless transmissions. The biggest challenge in these kinds of network is to find the correct and optimal path between the communication end points, which is aggravated through the node mobility. This paper presents a comprehensive study of the impact of mobility and proposes a way to determine route stability using ant.

M. Nisha, M. Ganesh Kumar, N. Hemachandar, D. Manoj Prasadh, K. R. Ramkumar, M. Ravichandran
Traffic Video Based Cross Road Violation Detection and Peccant Vehicle Tracking

For the requirement of monitoring cross road violation in intelligent traffic system, a method to recognize and track the peccant vehicle is presented. The static background is modeled by mixture Gaussian model, and the location of lane line is detected by Hough transformation, thus, coordinated series can be obtained from the monitor image. Information of vehicles can be obtained by background-frame binary discrete wavelet transforms (BDWT) method, and according to the distance between the vehicle and line, the peccant vehicle can be detected. An improved mean-shift method is used to track the peccant vehicle, and a close range camera is used to snapshoot the license plate according to the center of tracking window. Actual road tests show that the work efficiency of this method is high, and the accuracy is up to 80%; run-time of mean-shift tracking system is about 0.085s for each frame. So it has a certain practical value in the field of intelligent traffic.

Tao Gao, Zheng-guang Liu, Jun Zhang
An Anomaly Detection Immune Model Inspired by the Mechanism of DC- T Cell Interaction

Artificial immune systems (AISs) inspired by the biological immune system have been successfully applied to a number of problem domains including fault tolerance, data mining and computer security. The aim of the research introduces the mechanism of DC-T cell interaction in danger theory into the research of anomaly detection. In danger theory (a recently developed hypothesis in immunology), DCs (Dendritic Cells) within innate immune system are sensitive to changes in concentration of different signals derived from their tissue environment. DCs combine these signals internally to produce their own output signals in combination with related antigens. And then DCs present the “signals-antigens” to T cells in adaptive immune system. The role of T cells is to confirm and assess anomalous situations and then either respond to or tolerance the source of the effect. We extract several key features of the mechanism and map them into the anomaly detection domain, then propose a artificial immune model for anomaly detection. The paper illustrates that the novel approach shows considerable promise for future anomaly detection.

Junmin Zhang, Yiwen Liang
Design and Realization of Encoding Module for UHF RFID Based on FPGA

Radio Frequency Identification (RFID) is an identification technique such as the barcode or magnetic strip technology. And it is a new automatic identification technique, which widely used in many aspects such as transportation systems, military and other fields. Physical data coding module is an important part for RFID systems. ISO18000-6C provides a new air communication interface protocol of RFID systems. ISOl8000-6C is after l8000-6A, B and modifies and extends A, B’s content. ISO l8000-6C greatly improves the key technologies such as the physical data encoding, modulating type, anti-collision arithmetic and so on. This paper realizes data encode based on the ISO18000-6C standard and validates with FPGA.

Chao Li, Yu-lin Zhang
FPGA-Based CMOS Image Acquisition System

This paper provides a plan about the high-speed acquisition and real-time process of image data based on FPGA (Field Programmable Gate Array). This design manages to acquire digital image data and store them into SDRAM with FPGA chips which belongs to Cyclone’s series of Altera Company, and sends them to VGA display in the end after the real-time process of image data using FPGA. This design is distinguished from traditional image acquisition system, and provides a universal solution that implements image acquisition with logic controlling based on FPGA. The system designed by above-mentioned way achieves a satisfying effect by experimental verification.

Chao Li, Yu-lin Zhang, Zhao-na Zheng
Parallel Implementation of A5/2 Algorithm

A high-speed parallel implementation method of A5/2 algorithm is proposed by improving the conventional architecture in this paper. The operating parallel design of A5/2 algorithm is exploited in initialization, clock controlling stream generation, clock controlled stream generation and key stream generation to enhance the operating speed and the throughput rate of key stream with no increasing of complication in circuit and no decline of the clock frequency nearly. As to the different high-speed methods, this paper performs detailed comparison and analysis. The design has been realized using Altera’s FPGA. Synthesis, placement and routing of this parallel design have accomplished on 0.18

μ

m CMOS process. The result proves the critical throughput rate can achieve 1.06Gbps.

Longmei Nan, Zibin Dai, Wei Li, Xueying Zhang
The Study of Model for Portfolio Investment Based on Ant Colony Algorithm

The risk and benefits are consided synthesizely in portforio investment based on the Markowitz portfolio theory. A multi-objective programming model of portforio investment is established and studied the model solution with the ant group algorithm, then obtained a better result compared to using the Lingo model. Unified the ant group algorithm and the modern computer’s formidable operational capability, making the investor to be more convenient in the actual operation.

Wang Ting, Yang Xia
Design of Embedded Network Interface Controller Based on ARM9 and ARMLinux

With the development of industrial Ethernet technology, Ethernet has infiltrated into the control layer and equipment layer of control system network. However, a large number of industrial site equipment is not equipped with network interfaces, and they perform communication through serial ports, so they fail to be connected to Ethernet directly. With the development of technology, 32-bit microprocessor has become the mainstream of embedded market application. In the article, the 32-bit microprocessor S3C2410 is chosen to be the embedded interface controller developed as main chip to realize the conversion between serial port data and Ethernet data. Without changing the original equipment, network interface is added so that the conventional serial port equipment can be connected to the Internet through standard TCP/IP protocol.

Shaoke Chen, Shaojun Jiang
The Design of Body Welding Line Base on the Virtual Manufacturing and Assembling Environment

The intensive market competition requires the automobile industry to spend much less time develop cars of high quality at lower price. So we promote the design of body welding line base on the virtual manufacturing & assembling environment technology. In order to provide more information to designers or researchers in the phase of product development and design. Then optimize the design process through simulate assembly performance and process ability. This paper introduces the virtual design in the body welding line , discusses the feature and key technique of designation in the Virtual Manufacturing & Assembling environment , points out the virtual design is the direction of body welding line in our country.

Xiaoping Xiong, Quandong Jin
Modeling Economic Spatial Contact among Cities with the Intensity and Structure Model of Urban Flow

The paper employs the intensity model to analyze the spatial contact among cities that attribute to process of urban agglomeration, and builds a structure model to reveal the causality running urban agglomeration system. The study shows that Jiangxi province in China is still in the embryo of urban agglomeration at present, which is in the low degree of formation and development and hasn’t had the high density urban clusters with close correlation. And the economic spatial contact among cities is not powerful. Therefore, each city should make better use of its advantages to improve their overall ability, meanwhile enhance their comprehensive service capacity and strengthen the contact quantity of the outward functions. All of this is to provide the dynamics for the formation and development of urban agglomeration.

Yaobin Liu, Xiao Cai
Development of USB Device Driver in WinCE.Net

This paper describes USB host software architecture and basic knowledge of stream interface driver in the embedded operating system Windows CE.Net. After explaining the essential functions which should be involved in stream interface drivers, it mainly analyses USB device driver load and unload process associated with the flowchart diagram of the load process.

Ping Wang, Na Zhang
Time-Varying Weighting Techniques for Airborne Bistatic Radar Clutter Suppression

In this paper, a new nonlinearly time-varying weighting (NTVW) technique is proposed to mitigate the nonstationarity of bistatic clutter. The nonlinear factors contained in the range-varying characteristics of angle-Doppler frequency are taken into accounted by the method, and can effectively suppressing the bistatic clutter returns reflected from the far, middle and near distance scenarios. Moreover, the NTVW is a data-dependent method and can adaptively compensate the range nonstationarity of bistatic clutter without the prior knowledge of the moving platforms and the environment. The simulation results manifest that the NTVW has superior clutter rejection performance compared with the linear time-varying weighting and the traditional bistatic the space-time adaptive process (STAP) without any compensation strategies in the scenarios of different bistatic range.

Duan Rui, Wang Xuegang, Chen Zhuming
Factor Analysis of Competencies of Software Project Managers in China

This paper presents a competency model for software project managers in China. Based on the results of previous research on competencies for general managers and following the procedure of competency modeling, the study conducts an empirical study of more than 20 managers in software industry in Shenzhen and Guangzhou, China by interview and questionnaire. A competency model for software project managers is established by factor analysis. Eight categories of competencies are identified through the research which are: 1) professional skills; 2) personal abilities; 3) logic thinking; 4)management ability; 5)working willingness; 6) Efficiency orientation;7) Quality orientation ; 8) Self-confidence and innovation.

Xiaotao Li, Xuejun Wang, Zhiliang Zhang
Radio Propagation Characteristics for Short Range Body-Centric Wireless Communications

The shadow fading in body-centric wireless propagation environments was studied. The statistical model with the linear fitting to the measured data was proposed. The results show that the radio waves are diffracted around the body. The conventional path gain model is suitable for body-centric propagation environments when taking account of the attenuation around human body calculated in this study.

Wei Fu, Jianguo Ma
A New Efficient Multiple Messages Signcryption Scheme with Public Verifiability

Signcryption is a cryptographic primitive first proposed by Zheng in 1997 to combine the functionality of a digital signature scheme with that of an encryption scheme. Public verifiability is very important requirement for a signcryption scheme to settle a repudiation in case of a dispute. Recently in [1], a new efficient public key multi-messages signcryption scheme was introduced. This scheme is based on the intractability of Discrete Logarithm Problem (DLP) and used a multi-key generator to simultaneously signcrypts multiple messages in a logical single step, but it doesn’t achieve public verifiability. In this paper we introduce a new multiple messages signcryption scheme which achieves the same efficiency as that of the scheme in [1] but with the following advantages: (i) It is publicly verifiable. (ii) It uses a simple and dynamic multiple keys generation routine (MKGR). (iii) Its security is based on the intractability of three hard problems: DLP, Diffie-Hellman Problem (DHP) and reversing a One-Way Hash Function (OWHF).

Hassan Elkamchouchi, Mohammed Nasr, Roayat Ismail
Research and Implementation of Reconfigurable Multiplier over Galois Field Targeted at Stream Cipher

Multiplication over Galois field is the core operation in stream cipher. Based on the conversion of polynomial basis over different finite fields, a reconfigurable hardware architecture for multiplier over Galois field is presented. The multiplier can perform multiplications over

GF

((2

8

)

4

) ,

GF

((2

8

)

2

),

GF

(2

32

) ,

GF

(2

16

),

GF

(2

8

) with one single hardware architecture. The design has been realized using Altera’s FPGA of the family of Stratix II, the result indicates that the hardware spending is saved with one single multiplier. And when the multiplication over

GF

(2

32

) is performed, the clock frequency is up to 70.22Mhz, the data throughput can achieve 4.83Gbps, and the area only takes 586 ALUTS.

Xueying Zhang, Zibin Dai, Wei Li, Longmei Nan
Research of Grey Relation Theory Algorithm for Customer Classification of Manufacturing Enterprise

The paper puts forward customer classification method based on grey relation theory for customer classifying problem of manufacturing enterprise. Customer classifying comprehensive evaluation index system is introduced on the basis of analyzing research result about qualitative or quantitative customer classification at present. What’s more, customer classification grey relation evaluation model is discussed, and the method and step based on grey relation theory are also introduced in detail. The process and result of customer classification are lastly discussed by taking one manufacturing enterprise as instance, and the customer type of enterprise is determined by utilizing ABC taxonomy.

Laihong Du, Ping Kang
General Structural Model and Application of Intelligent Decision Support System Based on Knowledge Discovery

This paper mainly discusses the general structure model of IDSSKD (Intelligent Decision Support System Based on Knowledge Discovery) and describes the function of each of its sub-systems. IDSSKD has perfected and extended the function of conventional IDSS, and revised the running mechanism of conventional IDSS. Knowledge acquiring of domain experts, reasoning mechanism, KDD* mining and Web mining are efficiently fused into IDSS. Consequently, IDSSKD is a new type of intelligent decision support system that covers two networks and six bases. Furthermore, it is synthetically integrated, multi-tiered, and model-driven. It is promising that IDSSKD would play an important role in promoting the mainstream development of IDSS and become a new generation of intelligent decision support model.

Faguo G. Zhou, Fan Zhang, Bingru R. Yang
Application of Improved GA in System of Public Vehicle Dispatching

The system of public vehicle dispatching is a daily grind in the management of public vehicle company. In this paper method about how to build models for public vehicle dispatching model with computer is presented .The method about how to build models for system of public vehicle dispatching is detailed in this paper. To improve the solution of the dispatching problem, a multi—objective optimization model was proposed. The adaptive genetic algorithm based on entropy was improved and was used to solve the dispatching problem to attain the best solution. Simulation results show that the algorithm is reasonable. The correctness and advancement of this model and algorithm were tested by solving public vehicle dispatching problem.

Wang Bing, Yang Xianfeng, Liao Haode
Design and Implementation of Chat Room Based on UDP

As a common technology used in modern computer network communication, Socket network programming is one of the most popular technology to develop based on TCP/IP because it can customize packets communicate with each other effectively [1]. Network communication uses the interface which provided by operating system at different levels of communication to implement the secure communication in the process of network. Socket communication belongs to the bottom level of network communication, and API is used to program for network communication. This paper provides a method about a chat room using socket based on UDP (User Datagram Protocol). This design includes two parts, Server and Client. After client and server set up to connect, you can achieve many machines to communicate. It is equivalent to a dedicated chat server, a simplified WWW server. This system designed with C++ achieves a satisfying effect by experimental verification.

Zhao-na Zheng, Peng Sun
Emotion Recognition in Modern Distant Education System by Using Neural Networks and SVM

Modern distant education (or e-Learning or eLearning) is a type of Technology supported education/learning (TSL) where the medium of instruction is through computer technology, particularly involving digital technologies. Aiming at emotion deficiency in present modern distant education system, a lot of negative effects were analyzed and corresponding countermeasures were proposed. Basing on it, we combined affective computing with the modern distant education system. The model of modern distant education system based on affective computing was constructed by using speech emotion and facial emotion, which took speech feature and facial emotion as input data. The key technologies of Speech Emotion Recognition based on Neural Networks and Facial Emotion Recognition based on SVM have been proposed.

Qi Luo

Errata

Retraction Note to: New Interleaving and Forward Error Correction Strategies for Streaming

The paper starting on page 72 of this volume has been retracted because text, figures, and equations have been copied from the paper “Generic forward error correction of short frames for IP streaming applications” by J. Korhonen, Y. Huang, and Y. Wang, published by Springer Science + Business Media in 2006.

Mahila Dadfarnia, Majid Noorhoseini
Retraction Note to: Adjusting Forward Error Correction for Media Streaming

The paper starting on page 82 of this volume has been retracted because text, figures, and equations have been copied from the paper “Generic forward error correction of short frames for IP streaming applications” by J. Korhonen, Y. Huang, and Y. Wang, published by Springer Science + Business Media in 2006.

Mahila Dadfarnia, Samaneh Khakbaz
Backmatter
Metadaten
Titel
Applied Computing, Computer Science, and Advanced Communication
herausgegeben von
Luo Qi
Copyright-Jahr
2009
Verlag
Springer Berlin Heidelberg
Electronic ISBN
978-3-642-02342-2
Print ISBN
978-3-642-02341-5
DOI
https://doi.org/10.1007/978-3-642-02342-2