Skip to main content

2010 | Buch

Advances in Wireless Networks and Information Systems

insite
SUCHEN

Über dieses Buch

The purpose of WNIS 2009, the 2009 International Conference on Wireless N- works and Information Systems, is to bring together researchers, engineers and practitioners interested on information systems and applications in the context of wireless networks and mobile technologies. Information systems and information technology are pervasive in the whole communications field, which is quite vast, encompassing a large number of research topics and applications: from practical issues to the more abstract th- retical aspects of communication; from low level protocols to high-level netwo- ing and applications; from wireless networking technologies to mobile infor- tion systems; many other topics are included in the scope of WNIS 2009. The WNIS 2009 will be held in Shanghai, China, in December 2009. We cordially invite you to attend the 2009 International Conference on Wireless N- works and Information Systems. We are soliciting papers that present recent results, as well as more speculative presentations that discuss research challenges, define new applications, and propose methodologies for evaluating and the road map for achieving the vision of wireless networks and mobile technologies. The WNIS 2009 is co-sponsored by the Institute of Electrical and Electronics Engineers, the IEEE Shanghai Section, the Intelligent Information Technology Application Research Association, Hong Kong and Wuhan Institute of Techn- ogy, China. The purpose of the WNIS 2009 is to bring together researchers and practitioners from academia, industry, and government to exchange their research ideas and results and to discuss the state of the art in the areas of the symposium.

Inhaltsverzeichnis

Frontmatter
Web Services Discovery in Metric Space through Similarity Search

Most current semantic web services discovery approaches focus on the matchmaking of services in a specific description language such as OWL-S, and WSML. However, in practical applications, effective services discovery is expected to have the ability to deal with all heterogeneous and distributed web services. This paper proposes a novel semantic web service discovery method using the metric space approach to resolve this problem. In the method, all heterogeneous web services are modeled as similar metric objects regardless of concrete description languages, and thereby the discovery problem can be treated as similarity search in metric space with a uniform criterion. In the matchmaking process, both the functional semantics and non-functional semantics of the web services are integrated as selection conditions for similarity query. And two types of similarity queries: range query and an improved nearest neighbor query are combined to produce a sorted result set so that the method can be better applied to practical situation.

Ming-hui Wu, Fan-wei Zhu, Jing Ying
An Effective Measure of Semantic Similarity

Measuring semantic similarity between two concepts is an important problem in web mining, targeted advertisement and domains that need semantic content matching. Nevertheless, developing a computational method capable of generating satisfactory results close to what humans would perceive is still a difficult task somewhat owed to the subjective nature of similarity. This paper presents an effective measure of semantic similarity between two concepts. It relies on hierarchical structure of WordNet 3.0, and considers not only semantic distance but also depth sum and depth difference between two concepts. The correlation value of the proposed semantic similarity measure compared with the human ratings reported by Miller and Charles for the dataset of 28 pairs of noun is higher than some other reported semantic similarity measures for the same dataset.

Songmei Cai, Zhao Lu, Junzhong Gu
Improved Run-Length Coding for Gray Level Images Using Gouraud Shading Method

While improving compression ratio is a persistent interest in image representation, the encoding and decoding time is critical in some applications such as real-time image retrieval and communication. Based on the Run-Length Coding (RLC) and the Gouraud shading method, an Improved Run-Length Coding (IRLC) for gray level images is presented in this paper. The theoretical analysis and the experimental studies illustrate that the IRLC is superior to the S-Tree Compression (STC) in respect of the encoding and decoding time, without the compromises of the bit rates and the image quality.

Wei Huang, Shuai Chen, Gengsheng Zheng
Factors Affecting Consumer Intentions to Acceptance Banking Services in China

This study compared the factors influencing consumer acceptance banking services in China. Five factors were identified: service quality, customer satisfaction, trust, commitment, behavioural intentions. Structural equation modelling (SEM) was computed to determine the relationships among these factors. The main results are as follows: there is 1) a positive relationship between service quality and customer satisfaction; 2) a positive relationship between customer satisfaction and behavioral intentions; 3) a positive relationship between customer satisfaction and trust; 4) a positive relationship between trust and commitment; 5) a positive relationship between commitment and behavioral intentions. The findings aim to enhance service quality and performance in banking.

Sun Quan
Comparative Study of Workload Control Methods for Autonomic Database System

Autonomic database system is a performance optimization system, which can improve the resource utilization of database system by effective management of the access order to the workload of the database system. In this paper, the existing workload autonomic framework of database system has been improved, giving emphasis on the workload control component within the framework, and the comparative analysis of the replacement strategy and the NSGA-II algorithm was carried out. The simulation shows that the NSGA-II workload control algorithm can achieve higher accuracy with scarifying longer time to run, whereas the replacement strategy of workloads has lower accuracy with less time-consuming, which is more favorable for a real-time autonomic database system.

Yan Qiang, Juan-juan Zhao, Jun-jie Chen
Consensus of Mobile Agent Systems Based on Wireless Information Networks and Pinning Control

In this paper, consensus of mobile multi-agent systems with wireless information networks and pinning control is studied. Suppose mobile multi-agent systems consist of

n

agents, there is a directed interconnected graph with a globally reachable node. Based on the Lypunov stability theory, the consensus of multi-agent systems with pinning control is analyzed. By Applying generalized Nyquist criterion and Greshgorin’s disc theorem, the consensus of delayed algorithm with pinning control is analyzed. Finally, computer simulations are used to show the validity of the result.

Hongyong Yang, Lan Lu, Xiao Li
Dynamic Evolution in System Modeling of Knowledge-Intensive Business Services’ Organizational Inertia

This research analyzes inertia as a metaphor to explain organizational change and innovation by adopting system dynamics modeling of the organizational inertia of knowledge-intensive business services (KIBS). KIBS are regarded as the main study object in virtue of more uncertainties and complicatedly ever-changing environments and their winning inertia for the survival is a buzzword. This study aims at making out the specific component of organizational inertia of KIBS, which have the prominently different characteristics from the traditional industries. It highlights the level and rate model to illustrate the dynamic evolutionary processes of organizational inertia and works out the input and output graphs of organizational inertia in Vensim that demands the relevant system modeling foundations in the empirical practice.

Min Liu
Research on Java Imaging Technology and Its Programming Framework

With the rapid increase on requirement of the cross-platform distributed imaging technology, and the common, stable imaging lib, SUN provided a complete solution based Java platform technology. This paper analyzed the evolution of java imaging technology such as Java AWT, Java 2D and Java Advanced Imaging. Especially, it details the image operators, the core classes and the programming framework of Java Advanced Imaging. At last, the paper gave out two imaging examples included the programming codes and the result images, which can be used in project.

M. A. Weifeng, Mao Keji
The Performance of SFN in Multi-Media System

This paper describes the principles of SFN (Signal Frequency Network) in details and analyses the affection of time-delay of multi-transmitters in SFN. This paper also presents the insufficiency of transmitters’ maximal distance designed in traditional literatures based on the transmission circumstance of big city. At last, some simulations are made to validate the results.

Zhang Naiqian, Jin Libiao
A Domain-Oriented Goal Elaborate Method

Most traditional methods elaborate goals by answering “HOW” and “WHY” questions. There may be some defects in elaborate results by using traditional methods because different analyzers usually have different views on the goals and turn to different elaborate results. This article quotes domain rules to instruct goals elaborate process upon the traditional methods. Analyzers’ “HOW” and “WHY” questions in turn are based on domain rules, and the sequence of questions is determined by the relationship between rules and goals. Analyzers answer such questions which can instruct the elaborate process. In elaborate process, analyzers should make the most of formal goal refinement patterns, because those patterns can reduce human’s influence to the elaborate results.

Yonghua Li, Yingjie Wu
A Hybrid Genetic Routing Algorithm in Wireless Sensor Networks

Wireless Sensor Networks (WSN) represent a new dimension in the field of networking. Through learning from the energy multi-path routing protocol of WSN and the hybrid genetic algorithm, this paper presents a novel routing protocol to find the optimal path. The Algorithm consists of two stages: single-parent evolution and population evolution. The initial population is formed in the stage of single-parent evolution by using gene pool, then the algorithm continues to the further evolution process, finally the best solution will be generated and saved in the population. The simulation results show that the algorithm is effective. It can optimize the network path, balance energy consumption of the network and extend the network life cycle.

Lejiang Guo, Bengwen Wang, Qian Tang
The Application of Fast Multipole-BEM for 3-D Elastic Contact Problem with Friction

In this paper, three-dimensional elastic contact problem is discussed. Based on traditional boundary element method (BEM), mixed boundary integral equation is presented to solving several bodies contact problem with friction. It is not only reducing the dimension from domain to boundary, but also solving the displacement and stress independently at the same time. A new judgement criterion of contact state is established to judge the contact state of separate, adhere and slip. Through numerical analysis, the displacement and stress obtained by FM-BEM is better than traditional BEM in calculation time and accuracy. It illustrates that FM-BEM is better than traditional BEM for solving contact problem with friction.

Gui Hai-lian, Huang Qing-xue
Simulation Method Research of Ground Target IR Scene Based on Aerospace Information

Infrared imaging guidance is a guidance system with strong anti-interference ability. It is a technology with high efficiency-cost ratio which increases the missile power. It also is one of precision guided munitions development directions nowadays. It is first step that studies on the infrared radiation characteristics of target region to study on infrared imaging guidance, in which the key is how to obtain the infrared information of target region. This paper presents a kind of target IR scene simulation methods based on aerospace information. Firstly, three-dimensional scene model is generated based on terrain data, target 3D data and remote sensing image data. Secondly, the value of target and scene surface temperature is computed with different methods. Finally, target region IR scene 24h image sequence is produced. After comparative analysis, the IR scene image sequence produced by this method reflects target region infrared radiation characteristics in truth, and has a good fidelity.

Chen Shan, Sun Ji-yin
Research on Role-Based Agent Collaboration in WSN

The sensor nodes in wireless sensor network have limited capacities, complete complex tasks through collaboration. In multi-agent system, the agents complete their work through collaboration. Collaboration is one of the key issues in multi-agent system research. Taking into account the similarities between multi-agent systems and wireless sensor networks, it is possible to use agent collaboration in wireless sensor network. In this paper, we use the role-based agent collaboration to help sensor nodes, and construct a Wireless Data Acquisition and Analysis System with role-based agent collaboration. Simulation experiment results show that, when the number of nodes is large, the use of role-based agent collaboration can help it to effectively improve the system load, and reduce channel congestion. However, in the area of role definitions, roles dynamically added and so on, there are great challenges.

Lei Yan, Xinying Wang, Dongyang Zhang
Spectral Matting Based on Color Information of Matting Components

Color information carried by the matting components in spectral matting is used in our method to solve the matting problem. By comparing the color similarity of each matting component, the matting components were separated into two groups: the foreground and the background. There are two advantages of doing so. Firstly, there is no need to use the trimap which is a necessary tool in traditional matting solving methods to accomplish the process of semi-supervised learning. Instead, the color similarity information could be used as constrain or heuristic cue in finishing the process of unsupervised learning to lower the blindness of automatically extracting the foreground object. Secondly, combining the color similarity information with a little user provided foreground and background cue could further reduce the number of matting components whose group have not been known yet, and thus a semi-supervised learning process which could only be done by using a lot user provided cue in traditional matting solving methods could be accomplished.

Jia-zhuo Wang, Cui-hua Li
The Correlation of Conditional Time Series of Sunspot Series

This paper investigates the correlation properties of original sunspot series and their conditional time series. Appling the R/S method, we obtain the correlated exponent for original series and the conditional time series. The conclusions indicate that the Hurst exponents value H decrease from 1.1264 to 0.9896, with the increasing of q from 0.15x̄ to 0.90x̄.

Wenguo Li, Haikun Zhou, Hong Zhang
Hurst Exponent Estimation Based on Moving Average Method

In this paper, we introduce moving average method to estimate the Hurst exponent of the Hang Seng Index data for the 22-year period, from December 31, 1986, to June 6, 2008 in the Hongkong stock market, a total of 5315 trading days. Further, we present a detailed comparison between the regular rescaled range method and the moving average method. We find that the long-range correlations are present by both the new method and the regular method.

Nianpeng Wang, Yanheng Li, Hong Zhang
Comprehensive Evaluation of Regional Independent Innovation Ability: Based on Chinese Enterprise Level

In this paper we establish the evaluation index system of independent innovation ability, and then employ unitary principle component analysis method to dynamically analyze the enterprises’ independent innovation ability of Jing-jin-ji area, Yangtz river delt area, South coastal area and Northeast area from 2005 to 2008, the results of this research provide important references to recognize enterprise’ independent innovation ability of each economic area in China.

Zishuo Feng, Shukuan Zhao
Research of Chord Model Based on Grouping by Property

Chord is one of the peer-to-peer systems that searching algorithm for resource,simplicity stabilize and scalable. But its reckon without properties of node while mapping out. Every node is equal under the system. This leads to some problems. In this paper, considering instance of application in practice, we propose a scheme that improved Chord Model Grouping by Property(GP-Chord). And results show that its satisfactory through simulation.

Hongjun Wei, Jun Yan, Xiaoxia Li
Research of Some Autopilot Controller Based on Neural Network PID

First, established submersible vehicle movement mathematic model; then analyzed disadvantage of PID autopilot effect. Mainly, a multi-controller method with a neural network control and PID control was adopted, and researched the submersible vehicle autopilot control technology, then a neural network identification(NNI) was designed, and to identify the submersible vehicles space mathematical models on line, though the submersible vehicle mathematical models can not fully determine, the submersible vehicles approaching mathematical models also can be identified on line by NNI through the real time input and output of the submersible vehicle under large interference. At the same time, the multi-layer prior neural network as neural PID controller (NNC) was adopted, and it improved accuracy. The simulation results show that neural network PID control autopilot has very good performance and is better than traditional PID autopilot in robustness and practicability.

Jinxian Yang, Bingfeng Li, Hui Tao
Dependent Failure Reliability Assessment of Electronic System

Electronic systems are widely used in many engineer and civil fields, such as aviation, energy, communication, military and automatic etc. Usually the more the components that a system includes the poorer the system reliability is. But the failures of components are usually dependent. In this paper, a reliability model of dependent failure of electronic system is built and the influences of strength decentrality and load decentrality is discussed. The results of two examples prove the validity and superiority of the method in the application of the reliability modeling and assessment of system and the model that considered failure dependent is more reasonable than those conventional reliability models.

Wenxue Qian, Xiaowei Yin, Liyang Xie
Research of RFID Authentication Protocol Based on Hash Function

The introduction of authentication protocols for RFID system provides the security to it, authentication protocol based on hash function is one of the most commonly used authentication protocol, which the hash function they used is a unilateral function, with a relatively high security, and it is easy to implement in the tag of RFID, so it has a wider application in RFID system. As the hash function, the characteristics of its own will have hash table conflicts, and thus would have resulted in security vulnerabilities, aim at the hash table conflict, this paper proposes a specific solution, and simulate the improved authentication protocol.

Li Heng, Gao Fei, Xue Yanming, Feng Shuo
Energy Efficient Message Routing in a Small World Wireless Sensor Network

Routing data messages in a wireless sensor network is different from traditional networks because sensors do not have a unique IP address, knowledge of the network topology or routers and routing tables. Also, the limited power resource places restrictions on the number of messages sent and received within a network. The purpose of this article is to develop an algorithm based on small world networks, to route sensor data to the nearest sink node. A wireless sensor network, with optimally placed sink nodes, does lead to efficient routing of data between nodes while preserving battery lifetime.

Suvendi Chinnappen-Rimer, Gerhard P. Hancke
Based on the Integration of Information Technology and Industrialization to Propel and Accelerate Industrialization of HeBei Province

China is on the important accelerating step to industrialization country, taking a new road of industrialization of integrating information technology application with industrialization is a very crucial job for our economy. The traditional industrialization that relies on resources and high capital input accelerated the rapid economic growth and at the same time, inevitably, caused a number of problems. For example, the overall efficiency of the national economy was dragged down, all sectors of society slackened the drive to promote technological innovation and efficiency, the development of service industry was suppressed and the shortage of basic resources like water, land, coil, electricity and oil was intensified and the ecological environment was worsened. All of these make the traditional way difficult to carry on and call for a new type one. In this paper, take HeBei Province for an example, to discuss how to increase the industrialization from the angle of integration of information technology and industrialization.

Aifen Sun, Jinyu Wei
Pivoting Algorithm for Mean-CVaR Portfolio Optimization Model

The volatility of financial asset return is getting more and more drastic in recent years. This situation makes regulators and investors pay more attention to high loss risk of portfolio. Conditional value at risk (CVaR) is an effective tool to measure the risk of high loss. In order to control the large loss risk of portfolio, the paper established mean-CVaR portfolio optimization model, and presented pivoting algorithm to solve the model. Based on the real trade data of composition stocks of SZ50 Index, we calculated the efficient frontier of the mean-CVaR model. The computational results showed that the pivoting algorithm has high calculation efficiency which can satisfy the computing demand of investment practitioner.

Yanwu Liu, Zhongzhen Zhang
The Ontology-Cored Emotional Semantic Search Model

An ontology-cored emotional semantic retrieval model was proposed and constructed in order to overcome the current situation that it is difficult to implement emotional semantic search in the course of image searching. A method Combines Mpeg-7, theory of concept lattices and ontology construction together to construct the kernel ontology library was put forward. The difficulty of this method lies on how to integrate the Mpeg-7 standard descriptor with image emotional ontology properties, and how to auto-generate new concept results. Related experiments were carried out of which the results validated the feasibility of this model on image emotional semantic search.

Juan-juan Zhao, Jun-jie Chen, Yan Qiang
Multi-agent Task Allocation Method Based on Auction

Task allocation is the core problem of MAS. Capability is the embodiment of agent’s own value, and each task requires certain capabilities to complish it. Based on capability, this article present an auction-based task allocation algorithm. Each agent gives a reasonable tender price to select perfect task, according its capability and its preferences for different tasks, and mission requirements. Finally, we make a simulation experiment for transporting problem, and the results show that the algorithm is reasonable and effective, Superior NeA-MRTA[6] algorithm.

Xue-li Tao, Yan-bin Zheng
Error Bound for the Generalized Complementarity Problem in Engineering and Economic Equilibrium Modeling

In this paper, the global error bound estimation for the generalized complementarity problem in engineering and economic equilibrium modeling(GCP) is established. The results obtained in this paper can be viewed as extensions of previously known results.

Hongchun Sun
Research of Tag Anti-collision Technology in RFID System

In this paper, the RFID system and its related technologies are introduced, and the inevitable tags collision problem in RFID technology is analyzed. At the basis of an in-depth study on the popular ALOHA algorithm and binary search algorithm to solve the tags collision problem, the basic principles and a variety of improvements of the two algorithms is described in detail, and the emergence of new research trends of Tag anti-collision technology is summarized. Finally, anti-collision technology development tendency is forecasted.

Zhitao Guo, Jinli Yuan, Junhua Gu, Zhikai Liu
An Algorithm Based on Ad-Hoc Energy Conservation in Wireless Sensor Network

An improved medium access control algorithm based on energy conservation is proposed in this paper because the energy is constrained in wireless sensor network. In this algorithm, each code can adjust its sleeping probability by its remaining energy, balance energy consumption of net codes, so the life time of whole network is enlarging .The simulating result shows that comparing with traditional algorithm, the max life time can be increased from 1.48 × 104 time-slot to 3.6 × 104 time-slot. At sometime, the data groups also can be improved more in life time with the same energy of each code.

Jianguo Liu, Huojin Wan, Hailin Hu
The Design of the Hardware and the Data Processing Technology of Interbus

The paper design the hardware of interbus, and introduce a new method of data transmission of the interbus control system. In which the data is processed based on the PCAuto3.6. The interbus control systems, which are in the local area network of a factory, connect with others through Ethernet technology. The interbus can accomplish the issuing of network and transmission of the real-time data efficiently, and it provides a powerful method that can improve the productivity and the management level of the factory markedly.

Jianguo Liu, Huojin Wan, Hailin Hu
Broadband MMIC Power Amplifier for X Band Applications

The large signal model of a PHEMT with total gate width 850

μ

m is achieved by microwave on-wafer test and IC-CAP software, then the design and optimization of circuit are implemented by ADS software. A three-stage broadband power amplifier is designed with above model. At operation frequency from 6 to 18 GHz, the output power is over 33dBm, the power gain is higher than 19dB and the PAE is more than 25%. Otherwise, the power amplifier has better power gain flatness.

Jiang Xia, Zhao Zhengping, Zhang Zhiguo, Luo Xinjiang, Yang Ruixia, Feng Zhihong
The Selection of Dry Port Location with the Method of Fuzzy-ANP

With the increasing of maritime container, functional seaport inland access is important for the efficiency of the transportation chain as a whole. The selection of Dry port location bases on the index system in view of the factors. The factors that affect the facilities of the dry port were systematically analyzed and an evaluation model was built. As a result of complexity in assessing Dry port selection performance, it is difficult for decision-makers to provide exact numerical values for the factors. Therefore, a fuzzy ANP method can solve problems in an uncertain condition effectively.

Jinyu Wei, Aifen Sun, Jing Zhuang
Growing and Declining of Aged Population Asymmetric Real Estate Price Reactions: The Proof of China

The population of China will be to undergo considerable permanent reduction because of aging significantly and a low fertility rate by 2050. After discussing different factors which induced the real estate price fluctuation of China , this paper proposes a mixed model to analyze the relations between the change of aged population with housing price. The empirical result indicates that asymmetric price reactions: growth in aged population numbers has not significantly lowered prices, whereas declining in aged population has a significant effect on price .The paper gives the guide about how to choose the balance between aged population with real estate price.

Jinqiu Xu
Mobile Learning Application Research Based on iPhone

In recent years, as a new mode of learning, more and more domestic and foreign scholars pay attention to mobile learning. This paper use iPhone act as mobile learning carrier, learners can get and interact information through iPhone. Application research based on iPhone will maximize the potential advantages of iPhone, so that learners can participate in learning at anytime, in anywhere.

Zong Hu, Dongming Huang
Research of Improved Frame-Slot ALOHA Anti-collision Algorithm

In order to further improve identification efficiency of tag anti-collision algorithm in RFID system, we analyze the performance the frame-slot ALOHA anti-collision algorithm, apply the idea of grouping in binary search algorithm to frame-slot ALOHA anti-collision algorithm, and propose an improved frame-slot ALOHA anti-collision algorithm combining frame-slot ALOHA anti-collision algorithm and binary search algorithm, identifying the collided tags in time slots with the binary search algorithm. The simulation results show that, the improved algorithm does improve the anti-collision performance and the tag identification efficiency in RFID system.

Shuo Feng, Fei Gao, Yanming Xue, Heng Li
Research on Transmission of Power Telecontrol Information Based on IEC 61850/OPC

The traditional means of power telecontrol communication must be changed because of the use of IEC 61850 standards in Substation communication. Considering the integration of IEC 61850 standards and IEC 61970, this paper presents an IEC 61850/OPC-based telecontrol communication model. The telecontrol information can be exchanged through ACSI/MMS services between IEDs in substation and OPC server in control center. The OPC server performs the mapping of IEC 61850 information models and OPC information model, and publishes information to SCADA applications which run as OPC clients. A prototype system is built to verify the feasibility of the model. It is proved that this system can meet the real-time requirements. It is different from gateway and need no complex protocol conversion.

Changming Zhang, Yan Wang, Zheng Li
E-Commerce Leading Development Trend of New Sports Marketing

The traditional sports marketing is based on sport used as a carrier to promote their products and brands which is a marketing activity as well as a means of marketing. E-commerce sports marketing is based on the traditional sports marketing, adding e-commerce support to re-arrange the advantages of e-commerce and traditional sports marketing, which, accordingly makes traditional sports marketing present more flexibility, communication and high-profit.

Zhongbin Yin, Binli Wang, Lina Wang
A Modified Robust Image Hashing Using Fractional Fourier Transform for Image Retrieval

In order to improve the security and robustness of image retrieval, a novel image hashing algorithm based on fractional Fourier transform (FRFT) for content-based image retrieval (CBIR) application is proposed in this paper. By employing FRFT and normalized Hamming distance, a robust hashing sequence is obtained by preprocessing, feature extracting and post processing. The security of proposed algorithm is totally depended on the orders of FRFT which are saved as secret keys. For illustration, several benchmark images are utilized to show the feasibility of the image hashing algorithm. Experimental results show that the proposed scheme is robust against perceptually acceptable modifications to the image such as JPEG compression, mid-filtering, and rotation. Therefore, the scheme proposed in this paper is suitable for CBIR application.

Delong Cui, Jinglong Zuo, Ming Xiao
Short-Circuit Current Calculation of Distribution Network Based on the VDNAP

This article elaborates the establishment mechanism and realization method of distribution network analysis platform VDNAP (Visual Distributed Network Analysis Platform) based on geographic information systems relatively deeply, based on describing the method of short-circuit current calculation on superposition principle and then use the method to carry out short-circuit current calculation in VDNAP with taking a single line of certain urban areas for example, which achieve the effective combination of VDNAP and short-circuit current algorithm, and avoid the tedious work of user manual modeling, using the method of short-circuit current calculation based on superposition principle overcome the difficulties encountered when the traditional symmetrical component method is applied to distribution system short-circuit current calculation.

Yungao Gu, Yuexiao Han, Jian Li, Chenghua Shi
People’s Event Features Extraction

In this paper we describe the system architecture and method of people’s event feature extraction. Although the individual techniques are not new, but assembling and applying those to extract person’s feature are new and interesting.

Wen Zhou, Ping Yi, Bofeng Zhang, Jianfeng Fu, Ying Zhu
A Server-Based Secure Bootstrap Architecture

The computer terminal plays an import role in the security of whole Local Area Network. However, the uncontrolled way of bootstrap brings about difficulties of providing sufficient trustworthiness to the LAN. To enforce the terminal security of the LAN and especially its ability of resisting ill-meaning tampering, this paper puts forward a server-based bootstrap architecture, based on the trusted computing technology. By verifying the integrity of the terminal before booting the OS, this architecture can effectively prevent the terminal from booting into a tampered OS, and the recovery module meanwhile enforces the robustness of the system. We present an implementation of the architecture, which extends the Trusted GRUB by adopting an attestation process between the GRUB level and the attestation server. The performance analysis shows that at a low time delay, the security of the system has been improved, and the proposed architecture can also provide server with stronger control and management ability towards the whole LAN.

Qiuyan Zhang, Chao Chen, Shuren Liao, Yiqi Dai
Design and Implementation of the Integration Platform for Telecom Services Based on SOA

In the trend of telecommunication network and Internet towards convergence, it is important to learn the success experiences of existed service provision and service development technologies from telecommunication domain and introduce the new technologies of SOA from software domains, for convergent network oriented next generation service provision. According to the demand characteristic of business process integration for telecom enterprises, an integration platform for telecom services is designed and implemented based on SOA, which will provide the flexibility for enterprises to change their business process quickly and swiftly. It makes the new and old system couple with better and cut down the cost in development and maintenance.

Xiaoxiao Wei, Xiangchi Yang, Pengfei Li
An Online Collaborative Learning Mode in Management Information System Experimental Teaching

Nowadays, the teaching reformation based on network is one of the new trends of higher educational research. Taking the experimental teaching reformation practice of Management Information System, which is the common fundamental subject of managerial specialties, as an example, this paper reviews the constructivism learning theory, which is the theoretical basis of online collaborative learning, and then expound the implementation process of the action research of online collaborative learning under the network environment. At last, the author presents an operable online collaborative learning mode, and analyzes some limitations of this research.

Hanyang Luo
Statistical Properties Analysis of Internet Traffic Dispersion Networks

Recent frequent emergence of applications affecting Internet traffic dynamics have made it imperative to develop effective techniques that can make sense of different applications. In this paper, we build an unweighted and directed complex networks, which a vertex representing a simple IP address, and edge represents the exchange number of flows among these IP addresses on a specific application. Then we analyzed the statistic properties of these networks. According to the experiment result, we find the statistical properties diversity for different applications and can label p2p application.

Cai Jun, Yu Shun-Zheng
Design and Implementation of Mobile Learning System Based on Mobile Phone

Recent years, mobile learning has stepped into the stage of practical application from the academic research rapidly. This paper presents the design of a set of phone-based mobile learning system that focuses on the overall design of the system, the function of each module and concrete implementation methods, as well as the technique used in the process of development. We use WML language to display the foreground page, and use the M3Gate software to simulate real mobile phone interface.

Qianzhu Shi
Extract Backbones of Large-Scale Networks Using Data Field Theory

The last decade has witnessed a thriving development of the World Wide Web and internet networks, people are involved into different communication networks. With the increasing scale of these networks, it has left a challenge to understand their holistic features, to know which members and the relationships among them, that is, backbone, play vital roles. Based on data field theory, this paper proposes an algorithm that offers a practical procedure to extract backbone of large-scale networks. For dealing with the uncertainty of granularities of different backbones, we present a measurement to validate which is the optimal backbone with the most suitable granularity. We apply our method to the identical real-world networks and compare the results with several alternative backbone extracting methods. The experimental results illustrate that this backbone extraction algorithm can get a 0.8 score on precision ratios, and the recall ratios approximate reaches 0.5; the results are superior to the compared methods.

Zhang Shuqing, Li Deyi, Han Yanni, Xing Ru
An Efficient Collaborative Recommendation Algorithm Based on Item Clustering

To help people to find useful information efficiently and effectively, information filtering technique emerges as the times require. Collaborative recommendation is becoming a popular one, but traditional collaborative recommendation algorithm has the problem of sparsity, which will influence the efficiency of prediction. Unfortunately, with the tremendous growth in the amount of items and users, the lack of original rating poses some key challenges for recommendation quality. Aiming at the problem of data sparsity for recommender systems, an efficient collaborative recommendation algorithm based on item clustering is presented. This method uses the item clustering technology to fill the vacant ratings where necessary at first, then uses collaborative recommendation to form nearest neighborhood, and lastly generates recommendations. The collaborative recommendation based on item clustering smoothing can alleviate the sparsity issue in collaborative recommendation algorithms.

Songjie Gong
An Intelligent Solution for Open Vehicle Routing Problem in Grain Logistics

This paper studies the grain logistics open vehicle routing problem (OVRP), in which the vehicles are not required to return to starting depot after completing service, or if they are required, they must return by traveling the same route back. The grain logistics OVRP is a well known hard combinatorial optimization problem, the objective is to minimize the fleet size following routes of minimum distance. We present a hybrid intelligent algorithm for solving the open-version of the well-known open vehicle routing problem (OVRP). Computational results are given for several standard test instances, which show that the proposed procedure obtains better solutions than those found in the open literature, and also indicate that the proposed hybrid method is capable of obtaining optimal solutions very efficiently.

Hongyi Ge, Tong Zhen, Yuying Jiang, Yi Che
E-Commerce Comparison-Shopping Model of Neural Network Based on Ant Colony Optimization

A new model of comparison-shopping and key contents is discussed in the paper to solve the problem of the user bias’ filtering and learning. On the basis of traditional comparison shopping method, trains the BP neural networks by ant colony optimization algorithm to obtain the users’ preference information. It also adopts the growth-oriented method of network structure to decrease the learning error. And the sequence of search results is reorganized based on the information, to provide users with the personalized shopping guide service to meet their needs. Besides, the application of Web 2.0 can be optimized by using the knowledge of preference to build a better comparison-shopping e-commerce website.

Kang Shao, Ye Cheng
PPC Model Based on ACO

In order to find a new method for solving the shortcoming of the projection pursuit comprehension assessment algorithm, an improved ACO based on information entropy was introduced. The proved ant colony optimization algorithm was used to optimize the function of the projected indexes in the PP. Application results show that the method can complete the assessment objectively and rationally.

Li Yancang, Hou Zhenguo
Image Algorithm for Watermarking Relational Databases Based on Chaos

Database watermarking is an important branch of information hiding technology, and it is chiefly used to protect copyright. This paper creatively proposes a novel method for watermarking relational database, which uses the encrypted images sequence as watermark embed into database according to the weight of attributes. Experimental results show that the proposed scheme is robust against various forms of attacks. Our approach is more intuitive, and it support easy watermark identification.

Zaihui Cao, Jianhua Sun, Zhongyan Hu
The Building of College Management Information System Based on Team Collaboration

In the 21st century college management information system development direction and the tendency is at based on the network educational administration teaching management. Based on team collaboration development pattern, but safe, effectively carries on the design and the realization to the college management information system. The practice proved that, it can coordinate the teacher, the student; the classroom three relations conveniently, enable the resources to achieve maximized the use. This article introduced one emphatically based on the team collaboration college management information system engineering research.

Yu-you Dong, Shuang Chen
The Study on Decision Rules in Incomplete Information Management System Based on Rough Sets

In this paper, the concept of non-symmetric similarity relation had been used to formulate a new definition of approximation to an incomplete information management system. By means of the new definition of approximation to an object set and the concept of attribute value pair, the rough-sets-based methodology for certain rule acquisition in an incomplete information management system had been developed. The algorithm could deal with incomplete data directly and do not required changing the size of the original incomplete system. The experiment showed that the algorithm provides precise and simple certain decision rules and does not affect by the missing values.

Xiu-ju Liu
Collaboration CAD Design Based Virtual Reality Modeling Language in Heterogeneity Assembly Environment

Collaboration designs now often involve engineers working around the world while current CAD-based virtual assembly system s often only supports single computer operation. This paper presents a VRML (virtual reality modeling language) based virtual assembly system developed to provide a heterogeneity CAD model collaboration assembly environment. The system uses an assembly feature parameter extraction algorithm to realize the assembly constraints among the VRML part models. Furthermore a C-P (command-parameter) and operation token mechanism s are used to handle low speed Internet traffic and avoid operational conflicts. The system also includes a collision detection module based on the V-collide library to dynamically detect collisions between VRML parts during assembly. The system is integrated with the product data management system to create a product life cycle system, including design, demonstration, and maintenance, with effective communication efficiency during the product design stage.

Jian Yingxia, Huang Nan
The Study on the Sharing of Data Sources in CAD Environment Based on XML

Exchanging and sharing the heterogeneous data sources is the core of the information integration in virtual product development. Using the XML-based method to achieve the product information integration in CAD environment has the merits of clear structure and good interoperability. The article, aiming at the application background of the car mould virtual product development achieves the XML based information integration in CAD environment and provides the quick and effective method of accessing the product information for the other subsystems in car mould victual product development system.

Jian Yingxia
Semantic Mapping Approach for Logistics Services Integration in 4PL

The forth-party logistics (4PL) is a modern logistics operation mode for logistics industry. The kernel of 4PL operation is the integration and collaboration among the 4PL operator, logistics services providers and customers. Based on the analysis of integration requirements for the logistics services, which including dynamic integration, unified integration mode, integration standard supporting, semantic supporting and loosely coupled etc, this paper puts forward a semantic mapping approach for logistics services integration in 4PL. Firstly, a logistics services semantic mapping framework for 4PL based on the shared logistics ontology is provided. On the basis, the logistics services semantic mapping process based on shared logistics ontology for 4PL is formal described in detail. Finally, the semantic mapping based logistics services integration process is realized, which provides a semantic integration approach for 4PL logistics services integration.

Qifeng Wang
The Study on Distributed Database Security Strategy

The rapid development of computer network promotes that of the distributed database management system, but how to ensure the security of the distributed database management system in an open network environment is still a complex question that needs to be analyzed and studied carefully. This paper, in response to this question illustrated the security factors exist in this system, and described the current security strategies, and then gave out the implementation of the security policy based on Oracle database, by which the operation of the distributed database management system can be safeguarded.

Yan bing
An Improved Symmetric Key Encryption Algorithm for Digital Signature

Based on the analysis of the shortage of existing digital signature solution, an improved digital signature solution was proposed according to the advantage of symmetrical key algorithm, asymmetrical key algorithm and unidirectional hashing function. It successfully solved the problem of symmetrical digital signature caused by the difficulty to store key and indispensability of arbitrator. And it also avoided the disadvantage of asymmetrical digital signature that it was too slow to suit for the long file signature.

Xiuyan Sun
Application of Soft Test Method to Intelligent Service Robots

The importance of the soft test technique in developing intelligent service robots is analyzed in this paper. The soft test standards of ISO are of great use to soft test which constitutes one of the critical phases of life cycle of software engineering. The soft test standards of ISO are applied to intelligent service robots for the purpose of unit testing and integration testing. This paper summarized the experience and effective method of soft test in intelligent service robots based on the testing results. Furthermore, the idea of aspect-oriented program was employed to solve problems with regard to intelligent service robots which were difficult to address through the use of traditional method. It is proved that the result is satisfactory.

Wang Hongxing
The Research of the Role Information of the Marketing Channel Management Personnel of the Domestic Leisure Garment Brands

Based on the garment brands randomly selected in Shanghai, Zhejiang, Guangdong, Fujian, Henan, Jiangsu, and Hubei, this paper learns about the basic information of the garment brand channel manager through the manager himself, store manager, and the company’s other staff. Making use of telephone, Email, interviews, networking online contact and other data collection methods, understanding the survey questionnaires about the channel manager’s gender, age, education, occupation, marital status, working years, salary, and treatment, sorting out the role information of the channel manager in the current domestic leisure garment market, and representing the data in charts, this paper is aimed to provide some referential information for clothing brand enterprises while they choose their channel manager.

Zhang Junying
The Study on Data Mining to CRM Based on Rough Set

The key of competition is a corporation can satisfy the client’s requirement, it makes the CRM turn into the focus of the development, research of CRM based on data mining is become a pop in this correlative domain. The concept, character and basal effects of CRM, research of data mining with CRM are introduced. In the Data Mining technology, Rough Set Theory is introduced. At present, knowledge reduction and decision rule mining in decision are the research hotspots. With heuristic information, minimal decision rule acquirement based on Rough Set Theory is researched. Finally, an example is used to verify the effectiveness and feasibility of this method.

Zhang Wei-bo
The Data Mining Method Based on Rough Sets in Economic Practice

As the computer technology rapid development, each kind of data grows suddenly. How to extract useful information from these massive data has become a very real and important issue. It is very important that how to get the rule in the theory of rough set, it may obtain some inherent laws from the rule. It is helpful to analyze the decision table. Based on the economic data of Hebei Province in recent years, analyses the system of Hebei economics by the rule got. The result get from the rules is consistent with the reality.

Luo Shengmin
The Study on Adaptive Routing Protocol in Mobile Adhoc Network Based on Rough Set

This paper introduces the up-to-date research in on-demand routing for ad hoc mobile networks. The on-demand routing protocols arc divided into three categories: flat flooding routing, flat limited routing and hierarchy routing. In flat flooding routing protocols, DSR, ABR, AODV and ZRP arc discussed. In flat limited routing protocols LAR and RDMAR arc discussed. In hierarchy routing protocol CBRP is introduced. For each routing protocol, this paper not only introduces the contents of the routing protocol, but also the merits and drawbacks, and evaluates these protocols based on a given set of parameters such as communication complexity, time complexity, route metric, the range of route discovery, the periodically packets and route maintenance. This paper also evaluates some drawbacks of above routing protocols, for example initial route delay, supporting of unidirectional links and flooding broadcast, and proposes some optimized schema for these drawbacks. These schemas arc cluster based hybrid routing schema to mitigate the flooding broadcast and initial route delay, and unidirectional ad hoc on-demand routing schema to support the ad hoc mobile networks with unidirectional links. Furthermore this paper proposes an optimization schema based on rough set for limited routing protocols, which is that the intermediate nodes update the zone of route discovery by their newer location and/or distance information. Finally authors suggest the research direction in routing for ad hoc mobile wireless networks in the future.

Pan Shaoming, Cai Qizhong, Han Junfeng
The Evaluation Model of Network Security Based on Fuzzy Rough Sets

It is very important to know the security status of computer networks accurately. At present, most computer network security evaluation system doesn’t analyze the datum thoroughly. Therefore it is difficult to acquire the security status of computer networks at the whole. An algorithm model with fuzzy rough set theory to mine the rules of computer network security evaluation is proposed. A fuzzy rough set knowledge system description of computer network security evaluation is studied. A fuzzy rough set attribute reduction method is given. The decision rules mining method presented in this paper is validated with a simplified network security evaluation data set. The experiment results show that decision rules acquired by the method are in accord with the fact.

Yaolong Qi, Haining An
A Novel Image Fusion Method Based on Particle Swarm Optimization

In most of multi object image fusion methods, the parameter configuration of fusion model is usually based on experience. In this paper, a new multi objective optimization method of multi objective image fusion based on APSO (Adaptive Particle Optimization) is presented, which can simplify the model of multi objective image fusion and overcome the limitations of traditional methods. First the proper evaluation indices of multi objective image fusion are given, then the uniform model of multi objective image fusion in DWT (Discrete Wavelet Transform) domain is constructed, in which the model parameters are selected as, the decision variables, and finally APSO is designed to optimize the decision variables. APSO not only uses a mutation operator to avoid earlier convergence, but also uses a crowding operator to improve the distribution of no dominated solutions along the Pareto front, and uses a new adaptive inertia weight to raise the optimization capacities. Experiment results demonstrate that APSO has a higher convergence speed and better search capacities, and that the method of multi objective image fusion based on IMOP- SO achieves the Pareto optimal image fusion.

Haining An, Yaolong Qi, Ziyu Cheng
Relational Database Semantic Access Based on Ontology

Ontology plays more and more roles in creating semantic data in the Semantic Web. Now, because large amounts of data in legacy system are stored and managed in relational database, so there are many existing approaches used to transform relational databases into to ontologies, including ontologies definition and instances. But when vast amount of instance data are stored in OWL files, it is very difficult to manage and query. So, an ontology-based approach for accessing relational database is proposed in this paper, which acquires OWL ontology based on relational database schema, and the instances data still store in database. The ontology is viewed as mediated schema providing shared vocabularies for Semantic Web to be queried using SPARQL.

Shufeng Zhou
Dynamic Analysis of Transmission Shaft of Width Equipment for Square Billet

With the rapid development of science and technology, the quality of machinery products have been greatly improved, the market competition becomes increasingly fierce, the product quality of life become an important indicator. The modernization of production facilities not only improve the level of production, but also greatly reduce the labor intensity. Machinery products in the practical application will often appear a variety of issues, which is not a simple theoretical analysis. Practical experience is a very effective way to be solved the problem, but in the rapid development of technology today, it is relatively backward, computers and the software can quickly identify emerging problems. In the field of engineering, the finite element analysis method can be used in products which can increase strength and avoid defects. It can be a simple model that gives the reason of the problem, the research results can show that the method solve the reality engineering problem, and it can reduce the product time of testing and improve product life.

Xianzhang Feng, Hui Zhao
Mobile Software Testing Based on Simulation Keyboard

Confronted with the increase in system complexity, the code quantity of mobile software has doubled every two years. Simultaneously, the system also requires that the application should be concise, efficient, stable and reliable, so that the time of mobile software development gets longer and longer in the whole system, and the quality of software plays a decisive role in the final product. In the market, prevail available testing tools are generally classified into pure software tools and pure hardware tools. Pure software testing tools are generally used in the stub function and preprocessed task, and the pure hardware testing tools generally used for the hardware design and testing task including debugging phase of driver. This paper presents a software testing method based on simulation keyboard for the mobile terminal with the combination of hardware and software.

Hua Ji
VLSI Prototype for Mpeg-4 Part 2 Using AIC

This paper presents a VLSI prototype for the 2*2 Hadamard transform that is applied to the DC coefficients of each image component as described in the MPEG-4 part 2 Advanced Image Coding (AIC).

A VLSI prototype for the quantization process that is accompanied with the transform operation is given as well. It mainly deals about reducing the loss of clarity of the image when it is compressed. This is achieved by using hadamard transform. This transform is computed using add operations only. Thus the computational requirements of the design are reduced. Using the appropriate transforms and coding technique we can actually reduce the clarity loss of an image at each stage of either transforms or coding techniques. This is because at each stage we compare the actual and the predicted value. Thus the residual value is just taken which is loss free or with minimal loss.

Thus VLSI implementation of degraded images using AIC improves the features of the image to a very large extent. This sort of implementation using AIC can be used in variety of applications such as HD and digital photo applications.

Kausalya Gopal, Kanimozhi Ilambarathi, Riaz Ahmed Liyakath
Backmatter
Metadaten
Titel
Advances in Wireless Networks and Information Systems
herausgegeben von
Qi Luo
Copyright-Jahr
2010
Verlag
Springer Berlin Heidelberg
Electronic ISBN
978-3-642-14350-2
Print ISBN
978-3-642-14349-6
DOI
https://doi.org/10.1007/978-3-642-14350-2

Neuer Inhalt