Skip to main content
Top

2013 | Book

Proceedings of the International Conference on Information Engineering and Applications (IEA) 2012

Volume 4

insite
SEARCH

About this book

Information engineering and applications is the field of study concerned with constructing information computing, intelligent systems, mathematical models, numerical solution techniques, and using computers and other electronic devices to analyze and solve natural scientific, social scientific and engineering problems.

Information engineering is an important underpinning for techniques used in information and computational science and there are many unresolved problems worth studying. The Proceedings of the 2nd International Conference on Information Engineering and Applications (IEA 2012), which was held in Chongqing, China, from October 26-28, 2012, discusses the most innovative research and developments including technical challenges and social, legal, political, and economic issues.

A forum for engineers and scientists in academia, industry, and government, the Proceedings of the 2nd International Conference on Information Engineering and Applications presents ideas, results, works in progress, and experience in all aspects of information engineering and applications.

Table of Contents

Frontmatter
Erratum to: An Enhanced BitTorrent Protocol Supporting Multiple Network Accesses
Xue Yifei

Business Intelligence and Applications

Frontmatter
Chapter 1. Study on Standard of Tuition in Higher Education

There is a lack of a cost constraint mechanism in the current higher education tuition pricing system of our country. The “one size fits all” tuition standard fails to reflect the revenue law and the burden ability problems. First, according to the recent higher education tuition fees data related to quantitative analysis of higher education of our country’s college tuition situation, and the comprehensive evaluation of higher education tuition standards is given. Then, the game theory is used to seek higher education fees into the game of students, universities, and the government to achieve a balance of interests. Finally, a single target linear optimization model was established, as the university satisfaction index for target function, two game matrix as constraint conditions.

Chunfeng Liu, Shanshan Kong, Zhang Ling, Aimin Yang
Chapter 2. Role of Teachers in Oral English Teaching

In oral English teaching, students are the implementers, while teachers play different roles during this process. Teachers are conductors, guiding students to start activities. They are directors, designing scenarios for the activities and assigning roles to students. They are also critics, evaluating students’ oral expression appropriately. The appropriateness of roles that teachers play can change the traditional oral English teaching which is teacher-centered. In this way, teachers can develop students’ initiatives to a large extent and improve their abilities of oral expression in English.

Wanyu Liu
Chapter 3. Study on Competitive Power of Chinese Retail Chain Company

When wanting to improve competitiveness, what should retail chain companies do—reduce or enlarge? Which has more influence on competitiveness, shop numbers or shop area? Is improving the self-distribution an effective way? This paper tried to answer these questions based on the empirical analysis of the relationship between market share, sale growth rate and shop numbers, shop area, self-distribution.

Qingwen Li
Chapter 4. Cultivating Scheme of Students Autonomous Learning in English Listening and Speaking

According to the present situation, this passage tells the importance of cultivating the students autonomous learning ability. Emphasize the necessity of using multiply resources, computer technology, and the internet resources. The teachers should believe the students’ potential, and their speeches should have emotional appeal and encouragement. Teachers should also set examples to the students. These are the key functions of cultivating their autonomous learning ability. Then illustrate the methods of training them English listening and speaking.

Xianmei Wei, Yiquan Liu
Chapter 5. Research on English Teaching Cohesion Theory

To enhance students learning English reading, writing and other basic language skills, improve the level and quality of English teaching, to bridge the theory-based, focused on the non-structural convergence in College English teaching and gives the concrete implementation measures. Application of convergence theory, can train students in English language learning in the sense of convergence, improve English language skills and overall ability, while university teachers teaching guide also has a certain value.

Ke Tu
Chapter 6. Research on Practicing Teaching of University Students’ Political and Ideological Education

There are a lot of problems in practicing teaching of political and ideological education in university. It is short of continuity on time, standardability on organization, pragmaticality on implement. So practicing teaching reformation should take efforts to increase practicing methods. It should know information from society and anxiety from students, build the practicing teaching base, combine the practicing teaching resource from on and off campus, develop the positive effect on the practicing teaching base. To promote the practicing teaching activity, we should enhance acquaintance security, management security, organization security and so on.

Jin Rui Zhao, Xin Ying Zhao
Chapter 7. Reformation of University Students’ Political and Ideological Courses

There are many measures we should take to reform university students’ political and ideological courses such as widen the multi-media teaching, enrich the teaching content, strengthen key points of teaching, combine diffident kinds of views to face up to the problems and contradictions in our real life. By facing to answer but not to avoid these problems, we will build the necessary ideology and enrich teaching content by latest theory. Moreover, making connections among national conditions, patriotism, collectivity, and different related courses can build the proper comprehension and attitude toward this lesson. Then, one text of diffident forms will check the students’ acceptance ability and the consequence of teaching. Above all, the reformation of a combination of different education form helps express the main position of university students’ political and ideological courses.

Jin Rui Zhao, Hui Jian Liang
Chapter 8. Building of E-Commerce Trading Platform Based on Web Data Mining

Web Data Mining is the application of data mining technology in the Web environment collections, and potentially useful patterns or information found in the relevant data to browse the site from a large number of Web documents. E-commerce is becoming increasingly important in modern business activities, business data processing, highlighting the importance of data mining. This article discusses the main methods of Web data mining in detail and the function and application of data mining techniques in e-commerce trading platform. Web Usage mining excavation left in the server-side access records when the user accesses the Web. The paper presents the building of e-commerce trading platform based on Web data mining.

Ruihui Mu
Chapter 9. Study on Professional Education in Liberal Arts Colleges

In recent years, in order to bring up qualified military personnel, all the military academies promote the transformation of college education vigorously, transformation and construction of professional teaching have taken solid steps, training level and the quality of bringing up personnel have been promoting continuously. In recent days, the transformation of professional education has entered into critical period, various contradictions intervene with each other, and the task of transformation is still very difficult and important. In order to bring up military personnel who adapt to information war, we must face the appearing contradictions and issues carefully, and we should promote the deep development of professional education vigorously with forward-looking vision, developing perspectives, science initiatives, and strengthen the power of reform and information.

Ping-an Wang
Chapter 10. Reform of College Advertising Teaching

The advertising industry has been one of China’s most important industries for decades. Advertising higher education has offered a strong support on the development of the Chinese advertising industry through providing the qualified workforce needs. Through reviewing and analysis the brief history and current major changes of China’s college advertising teaching, the research indicated that the China’s college advertising teaching has. Reformed and developed responding to social and economic development needs; on the other hand, the relationship between college advertising teaching and advertising industry is interactive.

Ying Guo
Chapter 11. Study of Comprehensive Training in Import and Export Business in Higher Vocational College

Comprehensive Training in Import and Export Business is an operating practice curriculum for students in International Trade Major, which includes extensive professional knowledge, multifarious contents and is teaching demanding. Develop and construct the curriculum by aiming at Comprehensive Training in Import and Export Business, discussing the course arrangement and organizing implementation of comprehensive training from thinking and practice two aspects. Introduce the foreign trade business environment into school and innovate the mode of “teaching-business”.

Yuying Zhu

Communication Technology and Applications

Frontmatter
Chapter 12. Reliable and Energy-Efficient Routing Protocol for Wireless Sensor Network

This paper gives hop based routing protocol a detailed analysis, then a new routing policy—Reliable and Energy-efficient Routing Protocol for WSN (REERP) is proposed. In data transmission phase, REERP makes parents and siblings as forward selection; relying on a formula for evaluating the routing quality, routing mechanism has a comprehensive consideration of the forward selection; trigger update mechanism is used to maintain dynamic network topology and avoid “routing hole”; data packets act as a part of routing packets, which can reduce network maintenance cost. Compared with, DD, join-MHC in omnet ++ simulation tool, REERP proves its strength in load balancing, congestion avoidance, extending network lifetime, reliability, and low routing overhead.

Liwei Tan
Chapter 13. Research on Minimum Coverage Algorithm in Wiriness Sensor Network

A distributed algorithm based on sensing region pixels (ABSRP) is discussed aiming at the problems of low efficiency to find redundant nodes in wireless sensor network (WSN). To find the redundant nodes, node sensing region is converted into a series of pixels. Comparative experiments to existing algorithm show that this algorithm will affect the initial cover set slightly, and the redundant nodes can be selected out effectively.

Gang Hong, Xiao-qin Pan
Chapter 14. Quantum Secure Direct Communication Protocol Based on Four-Qubit Cluster State

In order to improve the reliability and security of quantum direct communication, this paper proposed a new quantum secure direct communication protocol based on the entanglement properties of cluster state and EPR entangled pairs. This protocol takes four-quit cluster state as the information carrier, using unitary transformation, through quantum information states to do the Bell-based measurements to interpret the secret messages. The cluster state is better than W state of entanglement properties, has a higher efficiency of the communication, and is more comfortable to use for information carrier.

Xianzhong Li, Guotian He, Mingxin Gu, Pengfei Dai
Chapter 15. An On-Demand QoS Routing Algorithm in Multiservice Scenarios

The trend that Internet applications are becoming more various puts forward higher request on Quality of Service (QoS) of coexisting multiservices in modern networks. An on-demand QoS path selection algorithm (marked as BW-cost algorithm) satisfying constrained conditions of both bandwidth and cost is proposed innovatively in this paper, and its usage procedures in OSPF is claimed accordingly. The core idea of the algorithm is choosing the best route satisfying certain bandwidth requirement with smallest cost in order to achieve the goal of splitting streams and balancing load. Simulation results shows the BW-cost algorithm can successfully guarantee multiservices’ QoS demands as well as has much better performance in some targets such as throughput and network utility, comparing to traditional Dijkstra algorithm. It also exceeds en existing on-demand QoS algorithm.

Yanjing Li, Li Li
Chapter 16. Large-Scale Test of 4G TD-LTE Network

To have a better understanding of the market concerns, promotion method as well as its problem in the commercial promotion of 4G TD-LTE network in China, this study made a depth research into Hangzhou, the first city in China to promote 4G TD-LTE on its second phase large-scale trial by means of depth interviews and focus groups. It reveals that the Chinese government and enterprises are now attaching more importance to the independent intellectual property rights of technology standards and global application in terms of the value orientation and as for its implementation methods; it appeals to smooth evolution technology for rapid development. Despite some technical difficulties, 4G TD-LTE network is changing the culture of Hangzhou and improving the quality of the local inhabitants’ life. Based on interviews with core managers and participants involved in the 4G TD-LTE project, the research results will contribute to the understanding of practical problems in the promotion of 4G TD-LTE in China and provide proposals for other cities to apply this technology in the world.

Jiankang Zhang, Yuwen Liu, Yangli Gu, Lijuan Su
Chapter 17. A Routing Algorithm Based on High Energy Efficiency in Cooperation WSN

To solve the weakness of small energy reserves of wireless sensor network, an ant colony algorithm based on the minimum energy consumption was proposed. The new algorithm chooses the path from the energy consumption of the current node to the next hop node, the path which chosen has the big pheromone to balance the energy consumption of whole network by the rules of intra-cluster communication and inter-clustering communication, and choosing the better link to realize the data transmission. The simulation results show that the path chosen by the algorithm is better than the simple ant colony algorithm, and the algorithm can save the network energy consumption better and can prolong the life cycle of the network.

Jianbin Xue, Ting Zhang, Wenhua Wang
Chapter 18. Communication Protocol for Greenhouse Monitoring System Based on Wireless Sensor Network

At present, wireless sensor network (WSN) is mainly used in some applications with a few sensor nodes and poor expansibility, which make it difficult to change the number of nodes in the WSN and the number of sensors in the node flexibly. In this paper, a new communication protocol for greenhouse monitoring system with multifunctional nodes is designed based on zigbee WSN technology to overcome the shortages above. The protocol establishes and maintains the routing table dynamically. And the bit mask method is used to mark devices and sensors which can access multiple devices in one packet. Through the elaborately designed protocol, different nodes can join the system automatically. Users can scan the data, capture images, and control the devices through browser on the Internet. The experiment results show that this greenhouse monitoring system based on WSN has perfect transportability and expansibility.

Han Qiao, Qin Ma, Xin Zhu, Mingli Li, Jinhui Zhou, Xiongchun Duan
Chapter 19. Research on Single-Carrier System with Frequency-Domain Equalization in HF Communication

The application of frequency domain equalization technique makes single carrier modulation a valuable alternative resisting multiple-path and time-varying channel in the broadband RF communication. This paper does a research on the principle and characteristics of Single-Carrier systems with Frequency-Domain Equalization (SC-FDE), and gives the performance of SC-FDE based on the 2 UW frame structure under RDM channel.

Boyuan Xu, Fei Xu, Weizhang Xu
Chapter 20. LEACH Clustering Routing Protocol for WSN

The node energy, storage space, and computation ability are limited, so energy saving is the primary goal in the design of wireless routing. The traditional wireless routing cannot be directly applied to the WSN, so WSN routing protocol research has important practical significance. The improved LEACH protocol means to make each nodes energy utilization more equalized to extend the total amount of data and network survival time. To improve the performance of the whole network is a crucial principle for the research of WSN according to a specific application in the future.

Dongfeng Guo, Lijun Xu
Chapter 21. Security Model Based on Cluster Formation in Ad Hoc Network

We apply the idea of systems analysis and integration to constructing the AD hoc network security model based on cluster formation in this paper. In this security model for ad hoc networks, the initial nodes are authorized by the user, or validated by the cluster headers in other clusters when the cluster is created. The cluster header is elected by all nodes in the cluster, and there is a temporary cluster header in charge of the cluster header elections.

Shuyu Hu
Chapter 22. RETRACTED CHAPTER: An Enhanced BitTorrent Protocol Supporting Multiple Network Accesses

We present our architecture which uses an enhanced BitTorrent protocol, supports multiple network accesses simultaneously, and localizes information retrieval. Our results showed that, for the scenario considered, the median download duration is reduced by more than 33 % compared to standard BitTorrent. The load on the inter-domain backbone was also significantly reduced. Since the information is localized, one would expect that it puts a high load on the gateway routers inside a network domain. However, the number of packets received by gateway routers was reduced by 62 %. The nodes could also send data at higher rates, recording a 63 % increase. The results display similar behavior to the prototype experiments.

Xue Yifei
Chapter 23. An Improved QoS Routing Algorithm in Internet

An efficient routing algorithm for Improving the QoS in Internet has been proposed and presented in this paper. The algorithm is a kind of multi constrained path algorithm. The routing takesplace based on more than one link weight components. To avoid the NP complete problem and to increase the computational efficiency some advancements are added. These include the definition of nonlinear path length, where the subpaths may not be the shortest path, having ‘k’ number of shortest paths in a node instead of having only the shortest path, and then removing the path dominancy for state space reduction. Finally, the concept of look ahead is also included through which a predicted path to destination is mapped. This work only implements the removal of path dominancy where the queue is updated by removing the dominated paths from the queue. The simulation also shows the better performance of the system.

Hongbo Huang, Yongzhi Wang
Chapter 24. Synchronization Accuracy in Wireless Sensor Networks

This paper provides new methods to estimate the clock migration in wireless sensor networks. The synchronous benefits (IGMKPF) method improve the performance of the system, compared and applicability CRLB maximum likelihood estimation, any random delay mode, such as symmetric gaussian and exponential model. Generally speaking, in case of (unknown) the gaussian distribution analysis, closed-form solution may not exist-expression MSE benchmark, and difficult to get lower. However, this paper derived Cramer-after Rao bound (PCRB) and IGMKPF. An important element in the clock estimates is that the improvement of the performance of the prediction is an unknown observation noise density estimation which led to an improvement.

Ying Zhang
Chapter 25. Energy-Efficient Routing Algorithm in Wireless Sensor Networks

In this paper, we propose a congestion-aware energy-saving routing protocol (CER) network. Specifically, a source node degree get obstruction of the surplus energy and neighbor node determine destination for packet. Wrapped in a jump of routing with a minimum cost, light routing traffic, and high energy level, such congestion could be reduced and the network life increased. The experimental results show that there is a significant improvement in energy saving, network, and other energy output as-aware routing protocol.

Hongmei Li
Chapter 26. Planar Inverted-F Antennas Structures for Mobile Communications

In answer to the increasing demand for portable terminal antenna, many of the works were all these years shorted-circuit quarter from the more commonly known PIFA wave antenna (planar inverted-F antenna). The main advantage of this antenna is their weak compactness and manufacturing cost, in addition to their important performance. In this chapter we put forward the new antenna-type geometry. Elements of coaxial probe feed. The design of the structure of advice from a simple PIFA antenna, based on software IE3D makes it possible to have Bi-bands, tri-bands, and quadribands antenna.

Ming Li, Juan Song

Internet of Things and Applications

Frontmatter
Chapter 27. Study of Web-Based Independent Learning Environment in the Course of Programming Foundation

This study focuses on the network teaching platform based on Tsinghua online education, and takes the tree structure of printed alphabet as the case in order to expound the process of construction of web-based independent learning environment in the course of programming foundation, in which the problems rising, circumstance creation, objectives definition, motivation arousing, initiative exploration, monitor, and regulation are included.

Yan Gou, Dongsheng Liu, Liping Zhang
Chapter 28. MPLS VPN Technology in Campus Network

A variety of novel service systems have been created in the campus network access to cross-MAN, and college information workers are required to ensure that these systems are in real-time, efficient and safe operation in the same physical network. To address this issue, this paper proposes the solution by which the BGP/MPLS VPN technology is introduced in the campus network, where the virtual private network of service systems is deployed to give the key steps to implement the program, which is a proven reference.

Dong Wang
Chapter 29. Evolution Course and Analysis of Internet of Things

As the three industrial tide of information technology after computer, Internet, and mobile communication, Internet of Things may provide fresh impetus for communication technology in the future, and it is attached importance as nation’s information strategy by more and more government. In this paper, the evolution course of Internet of Things is reviewed, and then the relationship between Internet of Things and related technologies, such as Internet, sensor network, ubiquitous network, M2M, cyber physical system, is analyzed to comprehensively understand the denotation and connotation of Internet of Things. Finally, we put forward some development direction of Internet of Things.

Peng Li, Qingzheng Xu, Na Wang
Chapter 30. Study of the Hierarchy Management Model Based on Active Network Node

Active network can provide a programmable interface to the user where users dynamically inject services into the intermediate nodes. However, the traditional prototype of network management does not accommodate to the management of active networks, it cannot utilize the distributed copulation capabilities that active networks provides. This paper analyzes the structure and mechanism of the active network management system, introduces a pattern of active network management, and studies the structure, management mechanism, design outline, and each connection of the management system. The paper also studies the network topology discovery and traffic.

Wenshu Duan, Tianping Dong, Yan Ma, Lunpeng Liu
Chapter 31. Fault Elimination in Campus Network

The campus network of Chongqing Yuzhong vocational education center was the background for this paper, from campus network troubleshooting model, troubleshooting of tools, combined with the troubleshooting case to discuss common faults and eliminating methods of the campus network. The purpose is to help the personnel maintenance of the campus network to troubleshoot network problems quickly, Troubleshooting steps, which is proposed in this paper, is obtained by long-term practical experience of the author, it has practical value and operability.

Hong Ye, Yuanyuan Liang, Mingyong Li, Wenshu Duan
Chapter 32. Advices of Perfecting the Civil Law on Protection of Network Virtual Property

Based on the idea and thinking of perfection advice in the civil legal protection about the online virtual assets, this paper compares the character and value through the network virtual assets and take the advantage of the authority instrument to adjust data that compare with the real questions. Moreover, provide some advices, principals, and methods of the virtual assets that based on the civil legal protection. It divides the basic real right and the characteristic of virtual assets property, and provides the suggestion for the special virtual assets property. Their special legal establishment for the network virtual assets is the necessary result during the modern network development. Therefore, it is the basic requirement for perfecting the socialism law.

Yu-e Li, Zhi-jie Li
Chapter 33. Intelligent Learning System Based on Ontology for Network Learning

In this paper, we used ontology and semantic annotation to construct the intelligent network learning behavior analysis system, based on network learning behavior model and concept relations in the network learning domain to build the ontology base, extract metadata, or semantic annotate data of the behavior information which we collected. Match the semantic parsed data with ontology base to deduce learners’ learning effect, to evaluate learning process, and to give some advice for learners’ learning. This system can help development of network learning platforms and educational resources also help teachers in designing and organizing the curriculum.

Xie Yong
Chapter 34. IOT Intelligent Monitoring Terminal Based on ARM+Linux

Based on acknowledgment of the Internet of things, this paper builds the Linux system on the ARM9 platform with researches of industry application needs and the key technologies of the intelligent monitoring terminal. Moreover, combining with the corresponding drive and service, it integrates with the video signal and analog monitoring information and uses B/S architecture to implement the system, and put forward a complete design of the intelligent monitoring terminal and corresponding network system.

Li Lu, Qi Ren
Chapter 35. Study of Security Technology in Wireless Sensor Networks

Due to its own characteristics, wireless sensor networks are different from the wired network security issues in the operating system and network protocol design. ZigBee technology, for example, is the use of security technology to analyze its security features and security requirements from multiple perspectives, and describes the specific application of the ZigBee network security encryption technology.

Chunjie Tang
Chapter 36. College Student’s Poineering Work Ability Analysis Based on the Network Environment

Affected by the world financial crisis, the employment situation of college students is not very good in the past 2 years; pioneering work of students has become a trend. But their pioneering work also has many weaknesses, so they are serious obstacle for their pioneering work process. Therefore, this chapter has discussed from the four influence factors of developing their own pioneering work capacity of the contemporary college students based on the network environment, and has use the fuzzy comprehensive evaluation method to analysis College Students starting an undertaking ability. At last, the result of College Student’s poineering work ability belongs to a higher level is pointed out.

Zhijin Wang
Chapter 37. College English Teaching Resources Library Based on Campus Network

By the analysis on the present situation of college English teaching resources library construction, beginning with the module and function of college English teaching resources library construction, the constructional ideas of college English teaching resources library is put forward, covering the following aspects as listening, speaking, reading, writing, translation, which has important significance on the integration of teaching resources, the construction of students’ autonomous learning platform and the improvement of the quality of English teaching.

Fuqiang Wang, Lijun Xu
Chapter 38. A Novel Secure Pairwise and Groupwise Synchronizing Scheme in WSN

Existing solutions yet for time synchronization in sensor networks are not resilient to malicious behavior from external attackers or internally compromised nodes. The feasibility of a pulse-delay attack (external attack), whereby an attacker can introduce arbitrarily long delays in the packet propagation time directly can affect the achieved synchronization precision. It is assumed in the proposed approach that all nodes are directly connected to one another. Hence, propagation delay is minimal. The proposed approach is able to overcome from external as well as internal attacker problems in group synchronization. The external attacks are resolved with the help of message authentication codes (MAC) and the use of private keys and internal attacks are found out on the basis of send and receive time. Once the group is secure from external as well as internal attacker i.e., no malicious node is present in the group then each node synchronizes to the common clock in the group.

Qin Dong
Chapter 39. Study of Gender Feature in Computer Mediated Communication

Nowadays computer mediated communication (CMC) is rapidly turning our world into a global village. We are able to talk to each other in online chat rooms, mediated by nothing but computers. And we are increasingly seeing the benefit of the Internet which empowers women, who are considered less powerful in the traditional patterns of male-dominated communication, not only participate in the CMC “equally” but also find community to pursue their own interests. Thus, the Internet is said to eradicate gender prejudice in communication, leading to greater gender equality and gender became a lesser issue than it had been in previous times.

Xiaoyi Zheng

Information Security and Network Protection

Frontmatter
Chapter 40. A Tibetan and Uygur Sensitive Word Tracking System

“Sensitive words” are the terms, certain words, and other bad words which are restricted to be used by the state or institutions. Here, we built a Tibetan and Uygur sensitive word tracking system, in it we first built a sensitive word vocabulary and classified the sensitive words. Then in order to track Tibetan and Uygur sensitive word effectively, we tried to search sensitive word on Web based on the sensitive word vocabulary. According to the search results, we have found the high focused sensitive words on Web, so these words are those we will track next. In our track system, we adopted a new link analysis algorithm to track high usage frequency Tibetan, Uygur sensitive word. From the experiments, we can see that it has effective performance.

Xiaodong Yan, Xiaobing Zhao, Guosheng Yang
Chapter 41. Intrusion Detection System Model Based on CGA

In the face of the growing network security, intrusion detection system, and the traditional shortcomings of more and more prominent. It is the false alarm rate, missed alarm rate, and the problem of poor real-time has not been resolved. In this paper, the lack of it, will make a concerted genetic algorithm combined with intrusion detection systems, designed a co-evolutionary genetic algorithm-based intrusion detection system model, it is great to make up for the lack of intrusion detection system now. I use a specific simulation experiments show the usefulness of this model in the final.

Zongjiang Wang, Xiaobo Li
Chapter 42. Research on Risk of Knowledge Sharing Based on Risk Assessment and Energy Analysis

This paper analyzes the related literature at home and abroad, dividing different risk types and its origin of knowledge sharing, focus on the risk assessment of knowledge sharing, discusses the risk energy model of knowledge sharing. Research shows that the risk of knowledge sharing is one kind phenomenon which generates, exist and change in the exchange process of material and energy between system and environment. The source of knowledge sharing risk can be summed up in the fuzziness of knowledge, the knowledge dependence of information asymmetry and opportunism and core competence. Only the benefits outweighed the losses, the knowledge sharing will occur. When the energy of cumulative risk reaches a certain level, risk will happen; inevitable produces a certain loss, even influence the normal operation of knowledge cooperation.

Bingfeng Liu
Chapter 43. A Novel Cache Prefetching Algorithm for Restoration Operations of Deduplication Systems

Sharing data chunks and sequentially writing data chunks result in data fragments in deduplication systems, which may degrade the reading throughput of these systems. To improve the reading throughput of deduplication systems, we propose a novel cache prefetching algorithm, referred to as WSP, which can detect weak sequential reading in the read requests of restoration operations and prefetch data for them, unlike the traditional cache prefetching algorithm, which cannot. Experimental results show that, when the cache size is 256 MB, the average cache miss rate of WSP is 77.5 % of that of the traditional cache prefetching algorithm for all 21 workloads.

Zhike Zhang, Zejun Jiang, Xiaobin Cai, Chengzhang Peng
Chapter 44. Balance Theory-Based Model for Discovering Trust Network

Relations among users on social network often reflect a mixture of positive (trust) and negative (distrust) interactions. It is necessary to extract the trust relationships among people and discover a trust network from the complex social network. The trust network can be used to calculate the trust confidence and can infer the trust values among the nodes in it. In this paper, we propose a method to estimate a trust network and it is the first time that the balance theory is applied to solve the problem of discovering trust network. The method makes use of balance theory to estimate the credibility of the relationships among the nodes. First, we analyzed the core content of the balance theory and the similarities with trust network. Then, we proposed the rules of building the trust network, and summarized the process of the implementation. The experiment runs on Epinions data set which consists of more than 130,000 nodes. The experiment results demonstrate that our algorithm performs well in building trust network.

Guangming Yang, Xiangjun Hou, Zhenhua Tan, Liangyu Zhang, Hainan Yu
Chapter 45. Cluster Enterprises’ Internationalization Based on Cluster Risk Evaluation Model

The cluster enterprises realize the effective integration of resources and the 1 + 1 > 2 benefit mode; and also cluster enterprises are more competitive in the internationalization road, while the enterprise’s internationalization growth still needs a stage. How to move toward the internationalization, how to carry out the growth pattern will be the focus of our analysis. Based on the cluster perspective analysis of enterprise growth pattern, we use the combination of cluster risk assessment model to analyze the risk assessment of cluster enterprises in the international development path, in order to get a better guide for cluster enterprises to control risks and strengthen enterprise management and operation. Through mutual cooperation, foster strengths and circumvent weaknesses, improving efficiency, and enhancing competitiveness, we could develop toward the internationalization.

He Huang
Chapter 46. Enterprise Information Security Warning Based on Subjective Bayes

Information security means protecting information and information systems from unauthorized access, use, disclosure, destruction, modification, view, and record and destruction. Forecast is one of the tasks of data mining. With data mining, we can complete the warning of information security. Subjective Bayes method is a method of uncertain reasoning. With this method, the factors that affect information security is defined as evidence, Evidence sufficiency measurement LS value is derived from the statistical or historical data given by the security experts, can deduce the value of enterprise security warning.

Bo Wu, Tuo Ji
Chapter 47. Intrusion Detection Based on Rough-Set Attribute Reduction

This paper mainly discusses the application of rough-set theory in intrusion detection, establishes the rough-set intrusion detection system model by applying the attribute reduction algorithm of rough set to mine the intrusion detection data, and improves the reduction algorithm which is based on attribute frequency, enhancing the data mining efficiency, and helping obtain concise and efficient data.

Shuyue Ma, Huifen Liao, Yuan Yuan

Semantic Grid and Natural Language Processing

Frontmatter
Chapter 48. Building of Virtual Server in Computer Laboratory

Today’s open computer labs are required to provide diverse and personalized services and enforce the deployment of server virtualization based on the existing hardware infrastructure. Through server virtualization technology to consolidate server resources, improve server utilization, reduce the time of system installation and configuration, provide users with high reliability, high availability, opening, expanding access to services of high quality, but also facilitate the management and maintenance of server. According to the present situation of computer labs, build virtual services to meet today’s requirements.

Yueping Wu, Jian Zheng, Yi Du
Chapter 49. New Global Stability Criterion of Delayed BAM Neural Networks

The global asymptotic stability of delayed BAM neural networks is investigated. A process, which is called parameterized first-order model transformation, is used to transform the linear system. New criterion for global asymptotic stability of the unique equilibrium point of delayed BAM neural networks is obtained.

Chunyan Hu, Degang Yang
Chapter 50. Semantic Integration Framework Based on Domain Ontology Construction

In this paper, we proposed a semantic integration framework of heterogeneous data based on domain ontology construction. The mechanism of domain ontology construction and mapping for heterogeneous data are studied, the purposes of which are to enhance the capability of dynamic adaptability and optimization of domain ontology construction, to resolve the problems of data heterogeneity in the processing of semantic information integration, and to promote the flexibility of the semantic integration process. Next, as to the semantic query, the theory and methods of specification or dynamic expansion of semantic query based on social annotation and ontology, and the duplicate removal and aggregating optimization of semantic query results are explored, the purpose of which is to realize the usability of semantic integration system and the credibility of the query results. Finally, an experimental prototype system of semantic integration of oil and gas exploration data based on domain ontology construction is constructed, the purpose of which is to verify the feasibility and correctness of the proposed theories and methods.

Jike Ge, Xianqiu Xu, Yongwen Huang, Mingying You
Chapter 51. Research of Text Plagiarism Detection Process

The paper analyzes and summarizes the main types and forms of the present document copying. Then according to the process of document plagiarism detection, there are many main methods and the corresponding researches used in the various stages. The paper provides an overview of the meaning of text plagiarism detection, and proposes some further work on text plagiarism detection.

Qin Xu, Yan Tang, Lan-su Nie
Chapter 52. A Hot Topic Detection Approach on Chinese Microblogging

This paper proposes an approach of hot topic detection on microblogging, that is, do microblogging texts clustering and heat evaluation so as to find hot topics. For the shortness and sparseness and the existence of synonyms and polysemy of the massive microblogging texts, when modeling the microblogging texts, microblogging text vectors are mapped to low-dimensional feature vector space to achieve the purpose of dimensionally reduction and denoising using Latent Semantic Indexing (LSI). For the shortcomings of traditional single-pass algorithm on topic detection, this paper proposes a two-level Hierarchical Agglomerative Clustering combined single-pass clustering method. Finally, according to text and propagation characteristics of microblogging, this paper proposes the topic heat evaluation model. Experimental studies on real world microblogging data show the method in this paper works well on massive microblogging texts and can effectively dig out hot topics.

Changchun Yang, Jing Yang, Hong Ding, Hengxin Xue
Chapter 53. High-Speed and High-Precision Wavelength Demodulation of Fiber Bragg Grating Sensor Network

Through the technologies of wavelength division multiplex and time division multiplex, fiber Bragg grating (FBG) sensor network was built. Based on System on Programmable Chip technology and fiber comb filter, a high-speed and high-precision wavelength demodulation scheme of FBG sensor network was proposed. The optical system and hardware circuit for demodulation system were designed specifically. To improve the accuracy of demodulation system of FBG, a constant temperature channel of the demodulation system connected with a fiber comb filter, which offered reference points to calibrate the Bragg grating center wavelength. Based on 32-bit soft-core processor NoisII, the embedded system collected and processed the photoelectric signal voltage transformed to rectangular voltage pulse. The upper computer displayed dynamically the FBG wavelength demodulation process and calibrated the Bragg grating center wavelength. The experiment results of wavelength demodulation and calibration show that, the wavelength demodulation system has many advantages, such as flexibility, stabilization, easy maintenance, high-speed, high-precision, and so on. The wavelength demodulation precision is ±2 pm.

Junjie Bai, Jianxing Li, Ying Wu, Xiaoyun Zhang
Chapter 54. A New Method for Rapid Extraction of Graduation Line

In the situation of pixel size acquisition, calibration, and reading automatically graduated scale, the image of graduated line is strictly requested. In order to improve the calibration adaptability and accuracy, an automatic extraction method of graduated line, which has strong adaptability, was proposed. This method utilized Hough transform to extract the lines in image. The basic idea of K-means clustering was adopted, and the distance was taken as the basis to effectively classify the lines which belong to the same graduation line. According to the classified lines, the effective points were selected, and then the least square method was adopted to precisely fit the midline of graduated line. The experiment results testify the validity and accuracy of the method.

Jianxing Li, Junjie Bai, Jian Dong
Chapter 55. Research of NFC Framework in MeeGo Harmattan

This paper discusses NFC technique on MeeGo Harmattan. First of all, it introduces the definition of NFC, NFC communication modes and operating modes, NFC working principle, NFC-related specification, and NFC Forum standards. Second it presents NFC architecture on MeeGo 1.2 Harmattan, including the introduction to MeeGo Harmattan, NFC architecture, and NFC applications types. Third, it dwells on QtMobility NFC API on MeeGo 1.2 Harmattan; especially expatiate on the usage of Generic NFC classes, NFC classes used in tag access, NFC classes for Peer-to-Peer communication and Connectivity QML plugin of QtMobility which provides some QML NFC elements in detail. After that it explains how to take advantage of NFC to deliver innovative apps Apps on MeeGo Harmattan. In the end, it discusses the current problems of NFC technique on MeeGo Harmattan, and looks forward to the future development of NFC apps on MeeGo Harmattan.

Wei Gong, Yan Ma, Yang Zhang, Ping Chen
Chapter 56. A Hierarchical Scheduler Design for Multiple Traffics with Reduced Feedback

In this paper, a novel scheduler is designed for multiple traffic classes with reduced feedback. The novel scheduler consists of two stages, i.e., at the first scheduling stage, the inter-traffic scheduler dynamically allocates the clustered bandwidth resources to each traffic class by a periodic and triggered way; at the second scheduling stage, and the intra-traffic scheduler schedules different users’ packets within each traffic class simultaneously. In order to reduce the feedback, each user only reports the CQI of

n

subchannels that have the best normalized SNR. The proposed algorithm not only enhances the system throughput but also reduces the feedback load under the condition that the QoS requirements of RT traffic are satisfied. Simulations validate the effectiveness and good performance of the proposed scheme.

Qiaoyun Sun, Zhang Haijun, Sun Kai, Zhang Shuguang, Wu Cuiting
Chapter 57. Low-Slop Hilly Land Resources Development and Utilization Based on AHP-SWOT Model

SWOT model is an effective strategy analysis method which has remarkable structured and systematic characteristics, but this analysis method usually limited to descriptive explanation and absence of effective quantitative restriction. This paper took low-slope hilly land resources development and utilization of Yiliang county as an example, used AHP method to analyze and evaluate strengths factors, weaknesses factors, opportunities factors and threats factors of SWOT model comprehensively and drew effective strategic measure of development and utilization, at the same time, evaluated strategic measures and determining the weights. The study indicated that using AHP method to calculate the weight of SWOT elements is an effective way which makes up for the defect of the subjective. The two methods were combined effectively which make the analysis process changed from qualitative analysis to quantitative analysis. The results of the strategy analysis of low-slope hilly land resources development and utilization have reference value.

Jie Lv, Xiping Yuan, Shu Gan, Wei Li
Chapter 58. Novel and Effective Multi-Secret Sharing Scheme

A new multi-secret sharing (

t, n

) threshold scheme is proposed in this paper. The scheme uses the Lagrange interpolating polynomial to split and reconstruct the secrets based on Shamir secret sharing scheme, and verifies the legality of data by NTRU algorithm and one-way hashing function. Compared with other public key cryptosystems such as elliptic curve cryptography, the proposed is simpler in design, which requires less calculation and fewer storage spaces. It can detect effectively a variety of cheating and forgery behaviors, which guarantee that the reconstruction of secret is the secure and trustworthy.

Shanyue Bu, Ronggeng Yang
Chapter 59. Rural E-Commerce Based on Probabilistic Neural Network Model

The purpose of this study is to examine the digital divide in western rural areas of China. According to rural E-commerce development of Western China, we constructed evaluation index system, and used methods of principal component analysis and factor analysis to pretreat survey data, then input the data into probabilistic neural network for evaluating rural E-commerce construction in Sichuan. Results reveal: First, only a small portion of rural enterprises have access to the Internet, and the penetration rate of the Internet in rural western enterprises of China is much lower than that in urban enterprises; Second, large and old enterprises are more likely to have access to the Internet; Thirdly, Internet access demonstrates very strong and positive relationships with enterprises’ economic and innovative performances. The study concludes that governments should promote Internet usage among rural enterprises.

Yuan He, Yangxu Li, Hong Xu

Artificial Intelligence

Frontmatter
Chapter 60. Optimality Conditions for Minimax Semi-Infinite Fractional Programming Involving Generalized Convexity

The purpose of this paper is to consider a class of nonsmooth minimax semi-infinite fractional programming problem. Based on the concept of

$$ H- $$

H

tangent derivative, a new generalization of convexity, namely generalized uniform

$$ (B_{H} ,\rho ) - $$

(

B

H

,

ρ

)

invexity, is defined for this problem. For such semi-infinite programming problems, several sufficient optimality conditions are established and proved by utilizing the above defined new classes of functions. The results extend and improve the corresponding results in the literature.

Xiaoyan Gao
Chapter 61. Study on Hairiness of Polyester/Cotton Blended Yarn in Rotor Spinning Via Artificial Neural Network Theory

In this study, in order to predict the cotton/polyester blended yarn hairiness of rotor spinning, an ANN model is developed. The ANN theory is an important technique of yarn virtual processing to predict the yarn hairiness. By analyzing, we can predict the hairiness of cotton/polyester blended yarn in rotor spinning. The results show that the predicted and experimental values agree well with, indicating that the neural network is an excellent method for predictors.

Bo Zhao
Chapter 62. SEMG Multi-Class Classification Based on S4VM Algorithm

A method using small amount of labeled instants and large unlabeled ones simultaneously involved in the training during the sEMG classification obtained a better effect is strongly needed. This paper introduces the S4VM proposed by Li et al. into surface EMG pattern recognition with small labeled instants and extends to multi-class classification problems, which will represent the autoregressive model characteristic value of the human hand movements of the seven types of EMG signal as the object of classification. The experimental results show that the safety semi-supervised support vector machine is suitable for the multi-pattern classification of surface EMG signal with high accuracy and good robustness.

Zhuojun Xu, Yantao Tian, Zhang Li, Yang Li
Chapter 63. Attribute Reduction Based on Equivalence Classes with Multiple Decision Values in Rough Set

For the attribute reduction problem of decision information systems, the concept of the equivalence class only including the condition attributes is introduced. The necessary condition of implementing attribute reduction and the attribute reduction method based on the equivalence classes with the multiple decision values are presented. After sorting the condition attributes by the cardinalities of the equivalence classes with the multiple decision value in ascending order, these ordered condition attributes are united one by one until the positive region of the united attribute subset is equal to the full region. Furthermore, if the attribute subset is independent and its indiscernibility relation is the same as the indiscernibility relation in original information system, then the subset is an attribute reduction of the information system. Finally, the experiment result demonstrates that our method is efficient.

Dongwen Zhang, Jiqing Qiu, Xiao Li
Chapter 64. Mathematical Models of Classification and Mass Calculation

People are familiar with trees, which have a lot of unsolved mysteries. “How much do the leaves on a tree weigh?” is one of the unsolved questions that frequently rise. To figure out the answer, this paper, under some ideal hypotheses, applies biologics, mechanics, and mathematics comprehensively to build mathematical models of leaf shapes and classification, and proposes a progressive approximation method to estimate leaf mass. This paper analyzes the correlation between leaf mass and the size characteristic of a tree with the model mentioned above, and analyzes the results, comparing them with actual situations, and it proposes, accordingly, an expanding model for obtaining leaf mass.

Jincai Chang, Aimin Yang, Liyu Chen
Chapter 65. Green Supply Chain and Supplier Selection and Evaluation

In order to select the appropriate business development needs of suppliers for green supply chain vendor selection and evaluation for the study, detailed discussion of the supplier evaluation and selection, design evaluation system for selecting the framework and content, and to out the specific implementation plan is given. It is proved that the method can select suppliers for the enterprise to provide a scientific solution; vendor management of enterprises has some reference value.

Jie Xiang
Chapter 66. Path-Based Floyd Algorithm in Automatic Search System

The shortest path planning is a point-to-point path planning approach as a network traffic system basic function of query. From the practical point of view, Floyd algorithm is designed based on the path to automatic search system, and a description of Floyd algorithm and the shortest path algorithm is described on the city. The system can be easily graphically painted and is set to be processed on graphics, mapped quickly to any queries for the shortest distance between two locations in the city. It very intuitively can see the route on the map and effectively improve the level of public information services and accelerate the process of urban modernization.

Hua Sun
Chapter 67. Modern Fashion Design Based on Virtual Reality

Virtual reality technology revolutionized the design of clothing, made in the development of virtual reality technology; from the point of view of modern fashion design tools and design concepts, we first introduced the three-dimensional garment design and virtual fitting system, and then separately showed the virtual reality environment's impact on fashion design, the impact on customer experience, the impact on clothing color design, the impact on four apparel—the aspects of virtual reality technology's profound impact on modern fashion design. Practice has proved that only the new technology and art of fashion design and performance of the organic combination are capable of fashion design to create new patterns and artistic styles.

Zhang Yi
Chapter 68. The Application of Fuzzy Self-Tuning PID Controller in SEHS

The existing hybrid fuzzy PID controller does not perform using electric hydraulic servo system application (SEHS). Therefore, when the system parameters change it will require a new adjustment of PID controller variable. Therefore, a hybrid fuzzy and fuzzy self-tuning PID control was put forward. This control scheme was divided into two parts, the fuzzy controller and fuzzy self-tuning PID controller. Fuzzy controller is used to control the output of the system of the values of the system away from target value. We proved the performance of the control scheme through the experiment of the motor speed control SEHS. The experimental results show that the proposed hybrid fuzzy PID controller and fuzzy self-tuning effect is better than that of a hybrid fuzzy and PID controller.

Sun Lan

Mathematics and Computation

Frontmatter
Chapter 69. Research of University Financial Risk Early Warning Mechanism Based on Hierarchical Fuzzy Method

Despite the haze of financial crisis was dispersing gradually; the side impact on the world economy is not dispersing as well. In the period of financial crisis, with the rapid development of higher educational cause and the growing scale of the college entrance, many colleges have been on debt in running schools on a massive scale, the new posture of the financial management have come into sight, the financial risk begins to take shape. If our colleges want to survive, develop, and expand, we must on our guard effectively dissolve the financial risk. At present, it is the biggest theoretical and practical mechanism in colleges and universities. Based on Fuzzy-AHP method, evaluation college financial warning mechanism, setting the quantitative indicators, analyzing and evaluating whether it is reasonable for the use of the college funding or not, and the level of the financial management and the real financial situation, revealing the hidden problems in advance, they can forecast the potential financial risk and the joint liability risk, and also provide a way of identifying risks to the financial management in colleges and universities.

Jun Zheng, Benluo Xiao, Guangbiao Sun, Xiaosi Xu
Chapter 70. Hilbert Algebras in Negative Implicative BCK-Algebras

The notion of BCK-algebras was formulated first in 1966 by Iséki, Japanese, and Mathematician. This notion is originated from two different ways. One of the motivations is based on set theory; another motivation is from classical and nonclassical propositional calculi. There are many classes of BCK-algebras, for example, subalgebras, bounded BCK-algebras, positive implicative BCK-algebra, implicative BCK-algebra, commutative BCK-algebra, BCK-algebras with condition (S), Griss (and semi-Brouwerian) algebras, quasicommutative BCK-algebras, direct product of BCK-algebras, and so on. The notion of positive implicative BCK-algebras was introduced by Iséki in 1975. In previous studies, scholars gave the definition of the positive implicative BCK-algebras, and its characterizations, and the relationship between other BCK-algebra, before this article I give a notion an ideal of Hilbert Algebras in BCK-algebras, as well as some propositions, so, here I will give a notion of Hilbert algebras in negative implicative BCK-algebras, and some propositions.

Qiu-na Zhang, Nan Ji, Li-nan Shi
Chapter 71. Study on Optimization of Innovative City Evaluation Index System Based on Mathematical Model

Innovative city is the product of the city knowledge-based development. This article puts forward the concept model of innovative city to establish evaluation index system of innovative city by introducing the mathematical model of the factor analysis method. Dialysis effects of each link on evaluation results by analyzing the evaluation process of innovative city. Absorbing advantages of various evaluation schemes to draw the most reliable evaluation results, so that the objectivity and fairness of the evaluation can be ensured. Therefore, it can guide policy formulation or adjustment of reality and plays a role of promoting and improving reality.

Shujuan Yuan, Li Li
Chapter 72. Some New Results for the Tree Indexed Markov Chains

The strong limit theorem is one of the central questions for studying in the international Probability theory. The purpose of this paper is to give a strong limit theorem for functions of two-ordered Markov chains indexed by a kind of nonhomogeneous tree.

Zhenyao Fan, Jian Zhang, Jing Bian, Yourong Wang
Chapter 73. Actuarial Pricing to Compound Option Under Ornstein-Uhlenback Process

A model of the compound options was studied by supposing if the stock price obeys the exponential Ornstein-Uhlenback process. The exact solutions of underlying European option and European compound options were obtained. The related theory of stochastic differential equation was used and the definition of actuarial pricing approach was considered in order to obtain the solutions. Finally, the comparative analysis between the results of the actuarial approach and the No arbitrage pricing method was discussed.

Congcong Xu, Haiying Li
Chapter 74. Mental Health Evaluation Model Based on Fuzzy Comprehensive Evaluation

For the complex information in the system of mental health evaluation, an evaluation index system has been built. Based on fuzzy comprehensive evaluation method, a psychological assessment of the mathematical model has been built in order to properly evaluate the students’ mental health status. And more scientific adjustment or treatment recommendations can be given. First, based on the mental health requirements a psychological evaluation index system divided into the 4-level indicators, 7 two indicators, and 18 three indicators is built. Second, the fuzzy comprehensive evaluation model of mental health is constructed using fuzzy comprehensive evaluation method. According to information collection, data processing and comprehensive evaluation the model is described in detail. Finally, the effectiveness of the method is verified by examples.

Ying Li, Donghui Li, Xinchun Wang
Chapter 75. Predictive Model of Population Growth in China

The population projections must be based on three basic elements fertility function, mortality function, and migration functions. In order to build predictive mathematical model of China we use the age shift operator algorithm, consider the discrete changes in characteristics of the population over the year to indirectly deduce the parameters of the state variable as a variable factor. Relay on the continuous population model and integral mean value theorem, the eventual establishment of forecast China in the short to medium-term and long-term population development of a discrete model of differential equations.

Zhijiang Wang, Jixun Song, Xiaolong Zhang
Chapter 76. Training Management of High-Level Sports Teams in Ordinary Universities Based on Mathematics Model

With the strategic readjustment of China’s education system reform and social needs of talent, there is the promotion of higher education to meet college students’ moral, intellectual, physical, and other aspects of the comprehensive development of a comprehensive talent. Sports as a competitive exercise, is also a measure of the strength of a university standard, various colleges and universities have set up their own sports teams, recruitment of physical good as an athlete in college students. Colleges and universities should make efforts to run the excellent sports teams, and we must first establish and improve training the management system. Only through this we can develop the high level of university sports team building and promotion of athletes’ level. Through literature survey and content analysis methods and the use of management of the related theory, college sports team’s training management models were analyzed to provide a scientific basis for rational decision making of school leaders and managers.

Chunzhong Liu
Chapter 77. Research on the Role of Vocabulary in the Teaching of English Writing Based on Mathematical Statistics Law

In this paper, the role of vocabulary in the teaching of English writing is described. We use mathematical methods to analyze the role of vocabulary in English writing and take sophomore students in a test case as an example for analysis, highlighting that the vocabulary accumulation can effectively promote writing and teaching quality, and derive a mathematical model to the English writing teaching and provide theoretical support for the improvement of students’ English proficiency.

Lihua Yang
Chapter 78. Analysis of College Students’ Employment and Entrepreneurship Based on Mathematical Statistic Law

This paper analyzes the status quo of the current college students’ employment and entrepreneurship. And combined with the survey instances, this paper made a depth analysis of the different views and trends of college students for employment and entrepreneurship. We use the university graduates in a city as the object of study to make college students employment and entrepreneurship analogy, pointing out the differences in college students’ employment and entrepreneurship, the existing problems and its solutions.

Jianfeng Cui, Tao Xiong

Information Management Systems and Software Engineering

Frontmatter
Chapter 79. Closed-Loop Control System of Single-Phase AC FFU Motor

Aiming at the demerits of traditional open-loop control system of single-phase alternate current fan filter unit (FFU) induction motor, a speed closed-loop control system of single-phase alternate current induction motor (SPIM) was designed and developed in this paper to achieve high-precision speed regulation control of FFU system. The control system used the dsPIC30F3010 as the control core chip. The control method is discussed and the main hardware circuit and software design are given. Experimental and practical results show that the proposed system is reasonable and has good speed control performance; the system can also meet the control requirements of FFU project application.

Yiwang Wang, Bo Zhang, Hui Pan
Chapter 80. Personal Health Records System Based on App Engine

The Personal Health Records (PHR) system stores all the personal health information about the residents. As an infrastructure database system, there are many challenges in its development. It explores the characteristics of PHR system and studies the cloud computing technology: Google App Engine. Then, according to the study result, a PHR system is designed and developed on Google App Engine. The technologies of Google App Engine are very suitable for solving problems such as scalability and semi-structure data modeling.

Bin Mu, Cheng Xiong, Shijin Yuan
Chapter 81. Efficient Applied Software Talents Training Scheme

In view of the current status quo of the university computer science students whose engineering practice capacity cannot meet the needs of IT companies, the relevant analysis was given to the problems that are present in a computer professional teaching of the colleges and universities in our country, for the purpose of improving their ability of engineering practice. By considering the software industry needs, educational concepts oriented at applications by applying their knowledge are introduced. The school–enterprise cooperation is innovated with the integration of extracurricular scientific and technological innovation activities to create a featured practice teaching platform. The “million lines of code project” is implemented to improve students’ ability of engineering practice, so as to develop application software talents that are urgently needed by IT enterprises.

Yi Xiang, Jun Peng, Liang Lei, Ying Wu
Chapter 82. Solution of Online Reimbursement System on Campus Network

With the development of the teaching scale in universities with more than one campus, especially after carrying out national treasury centralized payment, reimbursement is becoming a serious problem. Regarding widespread financial reimbursement, this paper tries to design and realize an online reimbursement system based on campus network, putting forward the goal and the overall framework of the system, analyzing and studying the landed of the reimbursement system, appointment reimbursement, query, and application of accounting treatment to achieve the method that simplifies the electronic work and network. Then we can standardize and improve the financial reimbursement processes and improve accounting efficiency and service level.

Guang Biao Sun, Jun Zheng, Lu Yang Gao, Hui Wang
Chapter 83. Research of Accounting Information System Under E-Commerce

With the development of e-commerce and the implementation of accounting information system, more and more people begin to realize the advantages of the accounting information system and the major changes it brings about. In this environment, the corporate accounting system has gradually become an information society. This paper describes the characteristics of the accounting information system and demonstrates the necessity for enterprises to strengthen construction of accounting information system. In particular, this chapter analyzes the problems of accounting information system under e-commerce environment, and offers some corresponding countermeasures to these specific problems.

Quan Quan, Yaping Li, Lingli Wang
Chapter 84. Radio Frequency Identification Books Monitoring System

This paper introduces the concept and characteristics of radio frequency identification (RFID) technology and overviews the main characteristic of RFID books monitoring system which is different from the traditional magnetic anti-theft monitoring system, analyzes system constitution, principle of design, working pattern and so on, and points out the insufficiency of the system.

Quan Bi Chang, Li Juan Wang, Zhi Jie Fan
Chapter 85. Design and Implementation of Campus GIS

To take Hebei United University as an example, the system used C# language, GIS platform—SuperMap IS.NET5 as well as SQL Server 2000 database as the foundation of the system development. It first made a design on the overall framework, function module, and database structure. Based on the design, the system realized digital campus management, for example, the daily maintaining and browsing on the campus’ spatial and attributes information, retrieving relevant information according to the given conditions, positioning the results on the map and conducting spatial analysis such as path analysis, buffer analysis, and overlay analysis. The campus GIS will greatly improve the efficiency of school management and will facilitate the daily life of students.

Shunxi Yan, Xiaolei Wang, Dongfa Li
Chapter 86. Island Resources Management System Based on GIS

The management and exploration on island resources has played an important role on improving the utilization ratio and proper exploration of sea resources. The whole system based on the requirement of sea resources, and normalizes on many aspects based on GIS, such as model information of island house-building construction, island statistical data, travel spots data, species on plants and animals, visualized density on plants and animal distribution and information inquiry, etc., and provide necessary information on tourism and statistics of island resources. The system include the functions on law enforcement, tourism, and display of island to help the managers utilize and manage sea resources scientifically and properly, and as the same time there is a great contribution on marine affairs of our country.

Xue-yu Mi, Yang Li, Lin Zhang, Guang Chen, Ai-hong Zhang
Chapter 87. Study of Tourism Information System Based on Android Platform

To improve the traditional Tourism Information System, provide a full range of services for tourists, and decision support for managers, this chapter integrates the Android mobile platform and Google Maps server into Tourism Information System. The features of the system include: classification of tourist attractions and related resources, query, locate, and trip planning. The system uses the Android Activity as interface design to select the SQLite database as a frontend database. The system uses http protocol to complete the server and client communication. The system is fully in line with the requirements of the tourism information management system. The advanced spatial server Google Maps make the system more convenient, intuitive, and detail.

Fengbo Hou, Xin Du

Physical Education and Applications

Frontmatter
Chapter 88. Happy Education in the School Football Teaching

To improve student learning initiative to enhance teaching effectiveness, to attract more students to participate in football, students interested in football. Will be happy to introduce the concept of education to the school football teaching, the reform of teaching methods and means, to communicate the subject of education, advocacy, and proper guidance are discussed in three aspects. Practice has proved that football in the school teaching, the joy of education is widely used, very promising, it is necessary in football teaching caused “happy” thoughts, the implementation of “happy” teaching.

Dong Bin
Chapter 89. Study of Martial Arts Industry in Henan Province

With the help of methodologies as the literature review and inductive analysis, this research has investigated the social conditions for development of martial arts industry in Henan province, elaborated upon the development stages hereof from germination and initial development to deepening stage, and examined herein upon the advantages and strategies for development of martial arts industrial zones in Henan province from the perspectives of martial arts population, human resources, technology, and brand development.

Yuxi Hu
Chapter 90. Study on a User-Defined and Low Cost Fieldbus Technology

A low cost fieldbus is defined and its protocol and electric code are elaborated in detail upon which a demonstration project is built. These fieldbus own certain market share in international market and have their own advantages and disadvantages. However, one common disadvantage of these products is their high costs which restrict their application in automatic field. With improvement of life quality, quickening tempo of life, and edification of modern communication technology, it is an undisputable fact that modern management is required in agriculture, industry, and civilian field.

Chengshan Zhang
Chapter 91. Study on Education Enlightenment of Olympic Spirit to Competitive Sports Training

Olympic spirit includes five core principles which are participation, competition, justice, friendship, and striving. It is with educational effectiveness, which can be used by educators. Modern sports trainings are designed to develop and enhance the athlete’s physical and psychological level and other aspects. In the process of the competitive sports training, Olympic spirit has brought certain education enlightenment to the technical and tactical innovation, ideology and morality, learning and using for reference, and confidence in training four aspects.

Jianping Xi
Chapter 92. Research on the Development Pattern for Rural Sports

Taking rural sports development model in Xvchang as the research object, this paper has given an investigation on status of rural sports development in Xvchang with the literature material method, interviewing method, questionnaire survey, and analyzed the influential factors to offer the development pattern, which also provides reference for the rapid development of new rural sports and the relevant departments to formulate corresponding policies.

Jianping Xi
Chapter 93. Study of Citizens Sports Tourism

In the era of Experience Economy, experience becomes a new value source. By statistical means including questionnaire, data statistics, and the literature review, this paper investigates and analyzes the present situation of tourism consumption in Chengdu, and finds that the experience value of present tourism products is low and their experience space is limited. Urban citizens’ inaccessibility to in-depth experience is the biggest barrier to sports tourism development in Chengdu. It concludes that developing tourism products based on experience and abstracting experience themes are important measures to develop sports tourism and promote sports tourism consumption in Chengdu.

Lin Guo, Fei Ma, Zhizhang Wang
Chapter 94. Study on Promotion Development of Shaolin Wushu

Shaolin Wushu is a famous school of martial arts; with a long history and far-reaching implications the school is an important part of traditional martial arts in modern times. Shaolin Wushu is perceived as an exploitation of our traditional culture model. For study of the Shaolin Wushu development experience to promote and develop sports culture and strengthen the cohesion of the Chinese nation, an important practical role in the development of sustainable achievement in human civilization is an inevitable requirement.

Deliang Wei, Yang Liu
Chapter 95. Research on Rural Sports Development

Our country is at a new stage from being a sports giant to being a sports power. Whereas rural sports development, as an important part of mass sports, does lag behind. Such a situation focuses on the following problems: regional imbalance in sports development, relatively less capital input, shortage of sports playgrounds and facilities, relatively less peasant sports population, outdated sports concepts, lack of professional sports instructors, and so on. Based on the analysis of the causes and uniting the aims of sports power, this paper analyses and elaborates the above problems systematically, and also proposes the corresponding suggestions and solutions.

Hongxue Zhang
Chapter 96. An Adolescent Physical Exercise Ability Evaluation Method in Sports Training

This paper describes an evaluation index system, on the basis of youth sports exercise ability, and on the basis of four—using biological resistance electrodes technology and sine constant-current. There is a strong relationship between the different size and shape of the impedance measurement parts including shaped body. The relationship between a parameter, this is equivalent series resistance index live analysis. We proposed the evaluation mode operation mode using impedance waveform and the stability of movement using reproducibility of impedance waveform. We expect to find all kinds of sports training application, rehabilitation, and related fields.

Xiaokun Zhang, Cheng Tao, Yan Liu
Chapter 97. Study on Physical Education of Vocational Colleges Based on Outward Bound

This paper conducts an in-depth study on the subject that Tangshan vocational colleges introduce the outward bound projects into the physical education through the investigation analysis, expert interview and teaching experiment, and other scientific research methods.

Qiang Wei, Yali Liu, Xiaomei Zhao
Chapter 98. Social Sports Connotation and Occupation Mechanism

On the relationship between physical culture and social system, the sports society system holds the view that sports contribute both in the construction of social development system and its cultural value. Physical denotation and connotation based on society and occupation differentiation, produced sports sociology connotation and occupation mechanism. In this paper, research answers the core problem of sports technology engineering.

Keke Bao
Chapter 99. Research on Socialized Mechanism of the Gymnasium and Stadium Inside School

At present all schools of higher learning are conducting project-based teaching and learning targets which require building a base, platform, and cooperative teaching and learning system inside the classrooms, gymnasiums, and stadium. First of all, what needs to be solved is how to transform the gymnasiums and stadium inside the school into entrusted teaching and learning units. Therefore, this paper defines the estimated entrustment to teaching and learning units, entrusted teaching and learning, entrusted gymnasiums and stadium.

Ju-xia Sheng

Intelligent Evolutionary Algorithms

Frontmatter
Chapter 100. Multi-Product Kanban System Based on Modified Genetic Algorithm

Kanban system plays an important role in many manufacturing systems. The design of a Kanban system addresses the selection of two important parameters, i.e., the number of Kanbans and the lot size. This problem has been tackled in a number of studies using simulation models. But in the absence of an efficient gradient analysis method of the objective function, it is time-consuming in solving large-scale problems using a simulation model coupled with a meta-heuristic algorithm. In this chapter, a gradient-based heuristic is applied to a genetic algorithm for the design of a multi-product Kanban system. Several case studies in different sizes have been tried out and solutions from the modified genetic algorithm were compared to those from the classical genetic algorithm. Notable improvements in computing times or solutions by the modified genetic algorithm can be observed.

Liang Huang
Chapter 101. Image Feature Selection Based on Genetic Algorithm

Image feature selection is formulated as an optimization problem. When traditional genetic algorithm is used for selecting image feature, it may bring problems of local convergence or precocious puberty because of using a fixed probability of crossover operator and mutation operator. First, the paper gave a brief introduction to image feature selection regarding the purposes, tasks, and commonly used algorithms. Then, the paper improved genetic operator of genetic algorithm, and parallel computing was used to genetic algorithm, to enhance the performance of image feature selection. Finally, experiments show that the improved genetic algorithm is convergent and effective, and applied to image feature selection is successful.

Liang Lei, Jun Peng, Bo Yang
Chapter 102. Weather Forecast Based on Improved Genetic Algorithm and Neural Network

The neural network has slow convergence speed and is easy to fall into the local minimum, while the genetic algorithm is suitable for global search. The genetic algorithm late is easy near optimal solutions shocks problem and puts forward the method of fitness value of calibration, and so optimizes the purpose of the genetic algorithm. This paper will present both together. Using the improved genetic algorithm to optimize the BP neural network of weights and threshold value, and a combination of the two algorithms is applied to the weather forecast, the experiments show that the improved genetic neural network compared with the standard genetic neural network has certain advantages for improved neural network prediction ability.

XueMei Meng
Chapter 103. A Digital Watermarking Method Based on Particle Swarm Optimization and Contourlet Transform

As a key technology for digital content copyright protection, digital watermark often sees a dilemma between imperceptibility and robustness. In view of the problem, this paper suggests a CT-SVD-based intelligent watermarking scheme that embraces three major algorithms including the watermark preprocessing, the watermark embedding, and extracting. The host image is first decomposed by contourlet transform to get the low frequency subband images on which the SVD decomposition is then implemented before embedding the preprocessed watermark. The watermark extracting is an inversion of watermark embedding. To maximize the watermark robustness while maintaining its imperceptibility, particle swarm optimization (PSO) is applied to have heuristic searches for scaling factor. The experiment has demonstrated that this scheme is capable of resisting frequent image attacks with better imperceptibility and robustness.

Jia Mo, Zhaofeng Ma, Yixian Yang, Xinxin Niu
Chapter 104. Mixed Recommendation Algorithm Based on Commodity Gene and Genetic Algorithm

To solve the problems of “new user” and “sparseness”, we introduce the concept of commodity gene. Through coupling the commodity gene database, users’ purchasing historical records, users’ content of online browsing and the data of neighbors’ behavior, we can form the module of candidate sets of customer preferences, and then use genetic algorithm which has been improved to make the selection and polymerization to the model, so that we can complete the best selection of neighbors. Finally, we can get the recommended sets according to the recommended module. Experimental results show that the algorithm we suggested can improve the accuracy of the recommendation and achieve good quality of recommendation.

Zhang Hao
Chapter 105. Improved Algorithm Based on Gaussian Mixture Background Model

Aimed at the disadvantage that Gaussian mixture background model is seriously affected by the sudden light change, this paper presents an improved algorithm based on Gaussian background model. By adding two steps which are light judgment and background update into the algorithm, the algorithm can eliminate the affects of sudden light change. The results show that this algorithm can extract the actual background in sudden light change environment.

Wei Wang, Xinyuan Yang, Sui Zong, Chenhui Wang
Chapter 106. Particle Filter-Based Target Tracking in Gaussian and Non-Gaussian Environments

Particle filter is a new filtering method based on Bayesian estimation and Monte Carlo method and effectively copes with complicated nonlinear and/or non-Gaussian problem. The basic idea of particle filter and the specific algorithm description of particle filter are presented. The particle filter is introduced to radar tracking based on the gaussian noise and glint noise statistical models. The Monte Carlo simulation results show that the particle filter have almost the same tracking accuracy in gaussian and glint environments. With the glint effect increasing, the particle filter has also the good accuracy.

Tanglin Xie, YiKang Yang, Xue Li
Chapter 107. A Delay-Constrained Multicast Routing Algorithm Based on the Ant Colony Algorithm

With the rapid popularization of Internet and the rapid development of some high-bandwidth applications, there have been many new communication services, such as video on demand, e-mail blasts, online games, distance learning, video conference, and so on. Such applications consume amounts of network resources significantly, and have a higher quality of service requirements by multiple users. Multicast is an effective way to reduce network bandwidth consumption and increase data transmission efficiency of communication in which such applications has been widely used. The problems of QoS multicast routing which research how to better realize the multicast function to meet the demand of service quality become a research hotspot. This paper researches and analyzes algorithm based on ant colony algorithm and delay-constrained multicast routing.

Linan Shi, Li Li, Wenjing Zhao, Bochao Qu
Chapter 108. An Improved Discrete Particle Swarm Optimization Algorithm

Evolutionary algorithms solve complex identification problems because they do not take into account any constraint on the cost function and more flexibility is offered when the model structure is chosen and the cost function is minimized. Step input-based identification has been developed, which could be used to determine the transient behavior of a system rapidly. In this paper, a new discrete particle swarm optimization (DPSO) algorithm is presented and the performance of this algorithm for solving identification problems is compared with the GA. The obtained results demonstrate that the proposed DPSO algorithm performs rather well in terms of speed (FNGC) and reaching to the minimum cost.

QingFeng Liu
Backmatter
Metadata
Title
Proceedings of the International Conference on Information Engineering and Applications (IEA) 2012
Editor
Zhicai Zhong
Copyright Year
2013
Publisher
Springer London
Electronic ISBN
978-1-4471-4853-1
Print ISBN
978-1-4471-4852-4
DOI
https://doi.org/10.1007/978-1-4471-4853-1