Skip to main content

Über dieses Buch

The latest inventions in internet technology influence most of business and daily activities. Internet security, internet data management, web search, data grids, cloud computing, and web-based applications play vital roles, especially in business and industry, as more transactions go online and mobile. Issues related to ubiquitous computing are becoming critical.

Internet technology and data engineering should reinforce efficiency and effectiveness of business processes. These technologies should help people make better and more accurate decisions by presenting necessary information and possible consequences for the decisions. Intelligent information systems should help us better understand and manage information with ubiquitous data repository and cloud computing.

This book is a compilation of some recent research findings in Internet Technology and Data Engineering. This book provides state-of-the-art accounts in computational algorithms/tools, database management and database technologies, intelligent information systems, data engineering applications, internet security, internet data management, web search, data grids, cloud computing, web-based application, and other related topics.



Applying Moving Boundary and Nested Grid to Compute the Accretion, Erosion at the Estuary

To evaluate the accretion, erosion at the estuary, we use a current model based on a 2D finite-difference grid, an alluvium transport model and a bed sediment transport model. The first one gives the velocity distribution on the surface of water body and in the case of transient analysis, the velocity distribution is computed at each computational time step. This velocity distribution will be taken as the input for the other models. Those models often run very slowly. There are two improvements in this research: moving boundary to get more correct results and nested grid to help the models run fast. The computational results in study area are agreement to our experimental results and the real data in Ca Mau coastal zone. It shows that those models are more accuracy and faster than the old ones.

Duong Thi Thuy Nga, Nguyen Ky Phung

Study on the Evaluation of Technological Innovation Efficiency of Equipment Manufacturing Industry in China Based on Improved DEA

This paper uses a panel data of statistical panel data over the period 2007-2009, and applies the DEA method to evaluate the efficiency of the equipment manufacturing industry technology innovation in China, by using the improved DEA to evaluate 7 kinds of equipment manufacturing industry technology innovation efficiency, and has achieved the differentiation and sorting of various sub-sector by using the improved DEA model, which solve the problem that when the number of DMU is too small, the DMU can’t be ranked. The Empirical result shows that the major categories of equipment manufacturing industry, technological innovation efficiency is generally low. The evaluation results can provide not only a new evaluation method for less decision unit, but also a new idea for the DEA evaluation theory and application.

Duan Jie, Liu Yong, Wang Yanhong

Design of Distributed Heterogeneous Data Retrieval Engine Using Service Oriented Architectures and Rich Internet Applications

As the demand for geospatial data rapidly increases, the lack of efficient way to find and retrieve appropriate data embedded in the mountain of available data on the Internet becomes critical. To meet this challenge, this paper presents a novel design of the data retrieval engine (DRE) targeted at facilitating one stop retrieval of geospatial data from heterogeneous data sources distributed on the Internet. The engine enables users to search, access and visualize the geospatial data of different types by setting query criteria in a map-based web portal. The engine is based on the service oriented architecture. It contains a built-in middleware composed of a harvest server, a central service database and a service search engine. Meta information of Open Geographic Consortium (OGC) web service are harvested by the harvest server and stored in the service database. When searching for particular geospatial data, those cached OGC services providing access to the data can be identified by the service search engine. The core functionalities of the middleware are exposed through a set of web services which can be consumed at client side. Two popular Rich Internet Applications (RIAs) technologies including Microsoft Silverlight and ArcGIS API for Silverlight are fully utilized to develop the web portal. The feasibility and effectiveness of the engine are carefully tested and demonstrated through investigations.

Mutao Huang, Yong Tian

Relationship between Internet Search Data and Stock Return: Empirical Evidence from Chinese Stock Market

Internet search data can be used for the study of market transaction behaviors. We firstly establish a concept framework to reveal the lead-lag relationship between search data and stock market based on micro-perspective of investors’ behaviors. Then we develop three types of composite search indices: investor action index, market condition index, and macroeconomic index. The empirical test indicates the cointegration relationship between search indices and the annual return rate of Shanghai composite index. In the long-term trend, each percentage point increase in the three types of search indices separately, the annual return rate will increase 0.22, 0.56, 0.83 percentage points in the next month. Furthermore, Granger causality test shows that the search indices have significant predictive power for the annual return rate of Shanghai composite index.

Ying Liu, Benfu Lv, Geng Peng, Chong Zhang

Hybrid Web Service Selection by Combining Semantic and Keyword Approaches

The challenge of Web service discovery increases with the remarkable raise of available Web services. The lack of semantic description in current keyword based service search makes it difficult for clients to find a required Web service. The pure semantic search restricts the types of queries that users can perform. In order to solve these problems, in this paper we suggest a new hybrid Web service discovery architecture, which combines the ability to query and reason on metadata of semantic based search, and the flexibility of syntactic based search.

Florie Ismaili

Research of Ontology-Driven Agricultural Search Engine

An ontology-driven retrival method for agriculture search engine is proposed in this paper. An agricultural products ontology was built, with that a semantic expanson algorithm for search keyword was achieved when executing search task. This process supply semantic-level retrieval service for search engine users. The goal is to improve intelligentization of agriculture search engine.

Wei Yuanyuan, Wang Rujing, Li Chuanxi, Hu Yimin

Efficient Encoding Technique for Strings-Based Dynamic XML Labeling Schemes

Several dynamic XML labeling schemes have been proposed to efficiently process updating in dynamic XML data. In this paper, we focus on one class of these schemes which are using strings of lexicographical order to support dynamic XML. We point out the problems of existing encodings which include memory inefficiencies when initial labeling and achieving labels of sub-optimal size when dynamic labeling. A Full-Tree-based(FT) encoding technique is proposed to overcome these problems. We bring the concept of


into strings, and it assures our encoding technique labeling for initial XML with efficient memory usage, which make it possible to process large XML with limited memory. Moreover, the concept of


is generalized into lexicographical order for the guarantee of achieving new labels with optimal size when XML frequently updates, which has the advantages of both reducing the storage cost and optimizing query performance. Experimental results confirm that our FT technique provides a new method which is intuitional and efficient for dynamic label schemes.

Shaorong Feng, Canwei Zhuang

Cross-Language Peculiar Image Search Using Translaion between Japanese and English

As next steps of Image Retrieval, it is very important to discriminate between “Typical Images” and “Peculiar Images” in the acceptable images, and moreover, to collect many different kinds of peculiar images exhaustively. As a solution to the 1st next step, my previous work has proposed a novel method to more precisely search the Web for peculiar images of a target object by its peculiar appearance descriptions (e.g., color-names) extracted from the Web and/or its peculiar image features (e.g., color-features) converted from them. This paper proposes a refined method equipped with cross-language (translation between Japanese and English) functions and validates its retrieval precision.

Shun Hattori

VSEC: A Vertical Search Engine for E-commerce

With the explosion of e-commerce sites, querying information residing on these sites with high accuracy becomes a practical issue when designing next generation search engines. The inherent natures of general search engines limit their applications in scenarios where result quality is a critical concern. To overcome this difficulty, we build a Vertical Search Engine for e-commerce (VSEC), which crawls, deep-processes, index information of e-commerce sites of given topics and provide querying service of high quality. VSEC is characterized by two defining features: (1) multi-thread model is employed to speed up the crawling procedure; (2) index building and query answering is implemented on Lucene.Net. Experimental results show that our system has high retrieval efficiency and higher query accuracy and recall rate than general search engine.

Quan Shi, Zhenquan Shi, Yanghua Xiao

Knowledge Based System for Intelligent Search Engine Optimization

This paper presents a Knowledge-Based System that using heterogeneous inductive learning techniques and domain knowledge representation, has the major aim of supporting the activity of SEO (Search Engine Optimization). The system arises from the need to answer the following questions. Is it possible to position a web site without being an expert in SEO? Is it possible for a SEO tool to indicate what factors should be modified to position a web site? It attempts to answer both questions from a Domain Knowledge Base and an Inductive Knowledge Base by which the system suggests the most appropriate optimization tasks for positioning a pair [keyword, web site] on the first page of search engines and infers the positioning results to be obtained.

Héctor Oscar Nigro, Leonardo Balduzzi, Ignacio Andrés Cuesta, Sandra Elizabeth González Císaro

A Novel Research Methodology for Gastronomic Blogs

Blogs are effective on spreading eWOM to provide hospitality and tourism promoters and different from traditional ones, but has big potential to create enormous impact on hospitality or tourism promotion.Although the growth rate of blogs is impressive, less research effort has been devoted to investigating the influence of gastronomy blogs. Assessing gastronomy blogs from readers’ perspective can be a great value to both researchers and practitioners and it can be useful to researchers in developing and testing theories relating to gastronomy blogs, enable researchers to justify gastronomy blogs as an effective way in the context of hospitality marketing, and help to understand the drivers behind gastronomy blogs to drive readers’ behavioral intention. By developing such a study, restaurant executives is able to better justify their web-based promotional activities if they devote a significant portion of their organizational budgets to these activities, as well as to understand how to use gastronomy blogs as part of their business strategies for greater culinary destination promotion. Therefore, the main purpose of this study is to explore the novel research methodology deriving from gastronomy blogs influenced blog readers’ behavioral intention to taste local gastronomy.

Hsiu-Yuan Wang, Tung-Jung Chan, Yu-Sheng Chang, Ching-Mu Chen

Semantic Network Active Directory Service System

The project focuses on the implementation of a Semantic Network utilizing an Active Directory Service System in providing real-time access of relevant information within closed communities, ranging from educational standpoints to secure server networks where queried information must be protected. A distributed server model is implemented to accommodate an expanding Semantic Network. However, the added scalability poses a challenge in the synchronization of data across multiple servers. To provide a uniform Semantic Network and efficiently utilize the computational power of this distributed server platform, an innovative software architectural model is presented. Such endeavors fulfill on-demand Internet-based client requests for aerospace information exchange [1]. This exchange is based on synchronization of an Extensible Markup Language (XML) [2] directory and file structure, which tracks content and metadata across the distributed server network.

Sergio Beltran, Adrienne Lam, Jorge Estrada, Aleksander Milshteyn, John Paul Adigwu, Alexander Alegre, Charles Liu, Helen Boussalis

Lost in Translation: Data Integration Tools Meet the Semantic Web (Experiences from the Ondex Project)

More information is now being published in machine processable form on the web and, as


distributed knowledge bases are materializing, partly encouraged by the vision of the Semantic Web, the focus is shifting from the publication of this information to its consumption. Platforms for data integration, visualization and analysis that are based on a graph representation of information appear first candidates to be consumers of web-based information that is readily expressible as graphs. The question is whether the adoption of these platforms to information available on the Semantic Web requires some adaptation of their data structures and semantics. Ondex is a network-based data integration, analysis and visualization platform which has been developed in a Life Sciences context. A number of features, including semantic annotation via ontologies and an attention to provenance and evidence, make this an ideal candidate to consume Semantic Web information, as well as a prototype for the application of network analysis tools in this context. By analyzing the Ondex data structure and its usage, we have found a set of discrepancies and errors arising from the semantic mismatch between a procedural approach to network analysis and the implications of a web-based representation of information.We report in the paper on the simple methodology that we have adopted to conduct such analysis, and on issues that we have found which may be relevant for a range of similar platforms.

Andrea Splendiani, Chris J. Rawlings, Shao-Chih Kuo, Robert Stevens, Phillip Lord

Multi-classification Document Manager

A Rich Ontology-Based Approach for Semantic Desktop

We propose a lightweight technological system for managing user’s documents according to multiple classification dimensions. The core of the proposal is the application of ALC-expressive ontologies for capturing the multi-property-based classification of documents. The ontology is then responsible for representing (i) the properties that serve for the document classification (e.g. authors, subjects, types), and (ii) the classes of documents specified based on the properties’ values of the documents. Once the ontology is populated with data captured from the documents via parsers/analyzers, an inference engine logically classify documents according to the classes.

Paulo Maio, Nuno Silva, Ricardo Brandão, Jorge Vasconcelos, Fábio Loureiro

Investigating the Potential of Rough Sets Theory in Automatic Thesaurus Construction

This paper presents the result of initial study about implementation of rough sets theory in generating a thesaurus automatically from a corpus. The main objective of this study is to investigate the relation between keywords (defined by human experts as highly related with particular topic) and the sets generated based on rough sets theory. Analysis was conducted into comparison results of all available sets. We concluded that implementing rough sets theory is a rational way to automatically construct a thesaurus, as it can enrich a concept and proved to be able to cover the keywords given by the human experts.

Gloria Virginia, Hung Son Nguyen

Sentiment Analysis in Colombian Online Newspaper Comments

The Web 2.0 evolution has renovated the way in which the producers and consumers of information interact. Online newspapers have allowed readers to express their views of the news being read, by publishing a comment. Recognizing that the aggregation of comments can produce valuable information about the topic being commented is the main contribution of the present work. It presents the development and the results of NOA, a web application intended to detect opinion tendencies, using sentiment analysis and NoSQL technology. It produces an aggregated, qualitative and quantitative tendency. NOA also diagnoses the quality of the comments from a Web source. It is tested on three online newspapers, gathering the information required to make a valuable opinion. Conclusions are withdrawn from the quality of the comments and the commenting culture in general.

Diego Pérez-Granados, Carlos Lozano-Garzón, Alexandra López-Urueña, Claudia Jiménez-Guarín

Privacy Tradeoffs in eCommerce: Agent-Based Delegation for Payoff Maximization

Collecting and analysis of personal information are among the most far-reaching development in e-commerce. Such endeavor, however, has resulted in the unprecedented attrition of individual privacy. This paper describes an agent-based system that allows consumers to benefit from the dissemination of their personal information. The implementation and analysis of such system are provided in this paper.

Abdulsalam Yassine, Ali Asghar Nazari Shirehjini, Shervin Shirmohammadi, Thomas T. Tran

An Improved Kernel Trojan Horse Architecture Model

As a new kind of Trojan horse which combines with the kernel Rootkit technologies, kernel Trojan horse has received a great mount of people’s attention and been used a lot. However, the sensitive property of kernel Trojan which follows traditional architecture model is fully exposed to the security software, and needs kernel concealment module to complete all the hidden works, thus the concealment module is too large, easily detected by security software. Based on the analysis of Trojan collaborative concealment model, this paper improves the traditional architecture model and introduces a lightweight concealment module of pure kernel Trojan horse architecture model. Furthermore, an example which adopts the improved model is present in this paper. The experimental results verify the feasibility and efficient of the improved model.

Mingwei Zhao, Rongan Jiang

Automatically Resolving Virtual Function Calls in Binary Executables

Call graph plays an important role in interprocedural program analysis methods. However, due to the common exist of function pointers and virtual functions in large programs, call graphs used in current program analysis systems are usually incomplete and imprecise, especially in analysis systems for binary executables. In this paper, we present a scalable and effective approach to automatically resolve virtual-function calls in executables. For the benchmark used in previous studies, our approach resolved almost 100% of reachable virtual function call-sites, whereas CodeSurfer/x86 resolved about 82%.

Tao Wei, Runpu Wu, Tielei Wang, Xinjian Zhao, Wei Zou, Weihong Zheng

Research of Network Intrusion-Detection System Based on Data Mining

In this paper, the algorithm for data mining of intrusion detection system has been improved and optimized so as to achieve intelligent detection of network data. Winsock2 SPI is used during the design to intercept data in the network, and the method of “session filtering” is adopted to filter network packets. The system consists of modules of control rules and intelligent detection, etc. According to actual detection, the system is capable of displaying network connection status on a real-time basis, effectively controlling application programs and intelligently detecting network data.

Shijun Yi, Fangyuan Deng

Classification Algorithm for Filtering E-mail Spams

In this paper we propose an incremental spam e-mail filtering using a modified Naïve Bayesian classification that is simple, adaptable and efficient. Our email spam filter is a hybrid filter that combines the advantages of the various filtering techniques. We also illustrate the effectiveness of our filtering scheme by simulations


Lixin Fu, Geetha Gali

DPEES: DDoS Protection Effectiveness Evaluation System

Implemented Distributed Denial of Service(DDoS) protection effectiveness evaluation system (DPEES) in Linux system is proposed in this paper to meet the needs of DDoS attack test and related defense experiments. DPEES can provide a variety of DDoS attack test with different type, intensity and characteristics, and evaluate the results of the attack. This system generates DDoS flows by multiple gigabit network cards, a few hosts with multiple network cards can send a large DDoS attacking flow, simulating a network environment which contains large scale puppet machine in different regions, this will make full use of local resources. Experimental results show that the proposed system can provide convenient environment for the DDoS attack test, defense and the evaluation of the defense effect.

Haipeng Qu, Lina Chang, Lei Ma, Yanfei Xu, Guangwei Yang

Host Based Detection Approach Using Time Based Module for Fast Attack Detection Behavior

Intrusion Detection System (IDS) is an important component in a network security infrastructure. IDS need to be accurate and reliable in order to detect the intrusive behaviour of a packet that travelling through the network. With the current technological advancement attack on network infrastructure has evolve to a new level and to make IDS sensitive enough to detect the new attack, the detection framework need to be frequently updated. Both the fast attack and slow attack mechanism has become the subset of phases inside the anatomy of attack. Each of the attack mechanism has their own criteria and fast attack is the important type of attack that need to be considered as any late detection of the fast attack can cause a major bad impact to the organization. Therefore, there is a need to identify a suitable technique to detect the fast attack and based on this, this paper introduce a static threshold using statistical and observation technique for detecting the fast attack intrusion that is within one second time interval. The Threshold selected was based on the real network traffic dataset and verified using classification table on real network traffic.

Faizal Mohd Abdollah, Mohd Zaki Mas’ud, Shahrin Sahib, Asrul Hadi Yaacob, Robiah Yusof, Siti Rahayu Selamat

Virtual Machine Based Autonomous Web Server

Enterprises are turning to Internet technology to circulate information, interact with potential customers and establish an e-commerce business presence. These activities are depending highly on Web server and maintaining good server security has been a requirement for avoiding any malicious attacks especially web defacements and malware. Web server administrators should be alert and attentive to the status of the server at all time. They need to be persistent in monitoring the server in order to detect any attempted attacks. This is an advantage for a web server that is maintained by a big company that has a big budget to hire a knowledgeable web server administrator, for a new established small company it will only burden their expenses. To overcome this problem, this paper proposes a low cost system called Autonomous Web Server Administrator (AWSA) that is fully developed using open source software. AWSA combines several computing concepts such as Virtual Machine, Intrusion Detection System and Checksum. AWSA offers a Virtual Machine based Web server that has the ability to automatically detect intrusions and reconstruct corrupted data or the file system without any human intervention.

Mohd Zaki Mas’ud, Faizal Mohd Abdollah, Asrul Hadi Yaacob, Nazrul Muhaimin Ahmad, Erman Hamid

Generation of IPv6 Addresses Based on One-to-Many Reversible Mapping Using AES

The proliferation of enterprise wireless network raises the security concern in any organization despite the unarguable benefits it brings about. At the same time, the initiative to migrate from IPv4 (Internet Protocol version four) to IPv6 (Internet Protocol version six) is gaining momentum across the globe to resolve the IP address depletion problem as well as reaping the benefit of it. This research proposes a new scheme to manage IPv6 addresses in an enterprise wireless local area network (WLAN) which may be incorporated into DHCPv6 (Dynamic Host Configuration Protocol for IPv6) software. In this scheme each user is assigned a dynamic IPv6 address that is generated cryptographically. Each time a user tries to access the network, different IPv6 address will be given which is generated using CFB (Cipher Feedback) mode of AES (Advanced Encryption Standard) algorithm, whereby there is a one-to-many reversible mapping between user and IPv6 addresses. In this way, it is possible for the network administrator to identify users in real time from their IPv6 address although a user’s IP address regularly changed. Dynamically changing IP address will impede an external network adversary’s effort to track user’s online behavior, thus enhancing privacy.

Nashrul Hakiem, Akhmad Unggul Priantoro, Mohammad Umar Siddiqi, Talib Hashim Hasan

A Study on Privacy Preserving Data Leakage Prevention System

DLP (Data Leakage Prevention) system is an essential for protection of valuable information asset of companies and organizations. To prevent the data leakage, security administrator should monitor the employee’s network access and it causes violation of privacy. This research deals with the privacy violation issues in DLP system and shows how we can manage the trade-off relation between DLP and privacy protection. Especially, we are proposing a design of privacy preserving DLP system.

Jinhyung Kim, Hyung Jong Kim

The Trojan Horse Detection Technology Based on Support Vector Machine

This paper presents a Trojan-detection system model based on Support Vector Machine. First, while monitoring the system, this strategy establish system call sequences in accordance with its system calls function in the system, and convert into supporting vector machine-readable tags, and place in the data warehouse for support vector machine extracted as the feature vectors. And to determine the abnormal behavior of testing procedures to determine whether it is Trojan by classifying the detected program behaviors based on the support vector machine classifier. Experimental results show that, comparing with the existing technology of Trojan horse detection, this method has better performance in detection time and detection of known and unknown Trojan horse attacks. Besides, it has higher accuracy, and takes up very little system resource.

Jie Qin, Hui-juan Yan

High Capacity Lossless VQ Hiding with Grouping Strategy

This paper proposes a reversible data hiding technique on Vector Quantization (VQ) encoding. Our scheme increases the embedding capacity of secret messages by increasing the embeddable index values. First, we count the number of index values generated through image compressed by VQ. Then, we sort the codewords in the VQ codebook in descending order according to frequencies of index values. The rearranged codebook is evenly divided into five groups which are employed to embed secret messages into an index table and then a complete stego index table with embedded secret information is created. From experimental results, our scheme is capable of increasing the embedding capacity of secret data compared to Yang et al.’s. In addition, our scheme can recover the lossless original VQ-compressed index value after extracting the embedding secret data.

Chin-Feng Lee, Kuan-Ting Li, Dushyant Goyal

Traffic-Oriented STDMA Scheduling in Multi-hop Wireless Networks

For complicated traffic-oriented transmissions (e.g., multiple multicasting) in Spatial Time Division Multiple Access (STDMA) network, scheduling algorithms are employed to determine an efficient assignment for the transmissions. In this paper, a scheduling algorithm, designated as traffic-oriented scheduling assignment (TOSA), is proposed to effectively allocate available network resource in the link-based and node-based STDMA networks. The objective of TOSA is to reduce schedule frame length by enhancing the spatial utilization within each time slot. Simulation results demonstrate that the proposed algorithms achieve a lower schedule frame length than existing STDMA scheduling algorithms.

Jung-Shian Li, Kun-Hsuan Liu, Chun-Yen Wang, Chien-Hung Wu

Cloud Computing: Understanding the Technology before Getting “Clouded”

The IT Industry and the wider media are abuzz with the phrase “cloud computing” and most of us have no idea what this latest terminology means. This paper starts by addressing the question – “what is cloud computing, and provides an understanding of the technology?” Cloud computing is related to technologies that has been around for ages, however, what can be done differently with the same technology when integrated with Internet is cloud computing.

Individuals who might be considering cloud computing services for personal use will also benefit by the information provided. Web sites like Flickr, FaceBook, YouTube and others are used to store and share personal photos, music and videos for free. Easy as: 1). Register, 2). Upload, 3). Share. Free and easy, there has to be a downside, and there is awareness regarding this.

There is information regarding cloud computing for businesses! Businesses, who wish to get on the “flight to the clouds” like their peers to keep their heads above the “cloud” and competition. With cloud service providers, businesses can tap into the IT services that they need, when they need, for as long as they need; without investing in any IT infrastructure. The result is a far more agile and cost-effective IT services and this paper looks at how and why.

After looking at the good of cloud computing, the bad, and the ugly is revealed. Not all our experiences on the Internet have been totally positive. A range of security and trust issues exist. Individuals and businesses ask is “how secured are their information once it is with the cloud service providers?” There is analysis on the ownership of data and information stored with the cloud service providers and taxonomy of data that you post on social networking web sites.

Finally, anecdotes about cloud computing that support our endeavour to compute in the cloud. Cloud computing is not a hype, it is a reality. Cloud computing is not a fad, it is here to stay. The question is no longer “will cloud computing happen?” but “how you are going to exploit this technology?”

Sam Goundar

Literature Review of Network Traffic Classification Using Neural Networks

The management and surveillance of the network operation are vital to the managers of the network. However the traditional network management software or tools can not archive this objective. Currently there are mainly three methods for network traffic classification and recognition, one is rely on ‘well known’ TCP or UDP port numbers, second is deeply packet inspection and the third is based on features of traffic flow. The first two methods both have some shortcomings. while the third method can be through selecting the different pattern recognition methods, Such as linear models for classification, kernel methods, clustering methods and neural networks methods to overcome this shortcoming by identifying network applications based on per-flow statistics, derived from payload-independent features such as packet length and inter-arrival time distributions and so on. In this literature review, with the articles we get from the Google scholar, analyze the features these article use to classify the traffic by using the neural networks, and the classification accuracy of these articles announced. Finally discuss the improvement of the algorithms these articles adopted.

Pang Bin, Li Ru

AUS: A Scalable IPv6 Multicast Solution

While the deployment of IPv4 network-layer multicast has been mostly limited to LAN level networks due to scalability and management issues, the application of a large-scale, secure and controllable IPv6 multicast is of great interest in the current high-bandwidth transmission networks. In this paper we (1) define multicast application requirements, (2) propose a scalable IPv6 multicast framework solution (AUS) and (3) provide the evaluation and deployment of the AUS framework in CERNET2. Given the deployment of this scalable multicast framework, we believe that our solution offer the advantages of both a bandwidth-saving delivery network and strong controllability.

Bizhen Fu, Kun Yu, Congxiao Bao, Xing Li

Indonesian Shallow Stemmer for Text Reading Support System

Our project involves the construction of a web-based system to facilitate the reading and comprehension of Indonesian text. The system will help users to understand difficult words in a text by displaying dictionary information about the words in a window. A large number of words in the Indonesian language are formed by combining root words with affixes and other combining forms. To search for the related dictionary entry, we need a stemming program to extract these root words. We develop an Indonesian stemming program for ourselves. Our stemmer does not need to be perfect because our application is limited to that of a text reading system. In this paper, we describe such a stemmer and present the results of preliminary examinations to evaluate it. We also describe a design for the text reading support system that uses the developed stemming program.

Hajime Mochizuki, Yuhei Nakamura, Kohji Shibano

Intellectual Property Online Education System Based on Moodle

A serious issue being raised currently in Japan is the shortage of human resources and the decreasing recognition of Intellectual Property Rights, which support the economy of Japan but lag behind the global trend. However, certain changes in education are now providing opportunities for creating and acquiring the rights to Intellectual Property. To help develop education on Intellectual Property Rights, the Intellectual Property Online Education System (IPOES) is proposed in this research. IPOES utilizes the features of Moodle, a system for online classes. For now, IPOES targets science and engineering students at University. In this paper, an outline is presented for IPOES development on Moodle and the ideal infrastructure for education in collaboration with the Technology Licensing Organization (TLO).

Yutaro Ikeda, Yasuhiko Higaki

Knowledge Sharing in Virtual Teams a Perspective View of Social Capital

Although research on virtual teams is becoming more popular, there is a gap in the understanding of how social capital affects the processes of knowledge sharing and creating, and their impacts on virtual team performance. To fill in this gap, this study formed a framework by incorporating social capital and SECI model [7] and examined it by an experiment with 65 virtual teams collaborating in a Wiki platform. The results showed that social capital was positively related to the four SECI modes (socialization, internalization, combination and externalization) and three SECI modes (internalization, combination and externalization) were found to be positively related to virtual team performance. The contributions of this study were twofold. Firstly the framework brought a broader view of researching knowledge management in a virtual team context. Secondly leaders and managers of virtual teams should be made aware of enhancing the effects of social capital to encourage internalization, combination and externalization to substitute the role of socialization.

Ying Chieh Liu

A Study on Correlation between Web Search Data and CPI

The web search data, which recorded hundreds of Millions of searchers concerns and interests, reflected the trends of their behavior and provided essential data basis for the study of macro-economic issues. This paper established a concept frame based on commodity market and equilibrium price theory, revealed a certain correlation and lead-lag relationship between web search data and consumer price index (CPI). Empirical results indicated that there is a co-integration relationship between web search data and CPI. The model was able to obtain a good fit with CPI. Model fitting is 0.978.

Chong Zhang, Benfu Lv, Geng Peng, Ying Liu, Qingyu Yuan

Improve the User Experience with Quick-Browser on Netbook

In this paper, we discuss how to improve user experience with web browser on Netbook. Internet browser is the most important application for Netbook. The start up speed of browsers is too slow on Atom processor, such as Firefox, IE, etc... So this paper proposal a quick-browser to overcome this defect, and improve the cold booting user experience.

Fangli Xiang

A Study on Sharing Grid of Instructional Resources Management System

With changed requirements, the old management system for the Audio & Video Resources Library of Tsinghua University had not met needs any more and should be improved. But there is a question: how to design it? In past decade, many universities in China had constructed resource libraries by themselves, and it is rewarding to sharing the resources in them with each other. But there still exist some barriers coming from technology and management etc, for instance, how exchange and transfer the resources? Thus, this article will discuss how to design a sharing grid of the instructional resources management system satisfying current demands.

Bin Li, Fei Li, Shuqiang Song

Learning with Serious Games: The SELEAG Approach

Games can be instantiated for learning as they involve mental and physical stimulation and they develop practical skills – they force the player to decide, to choose, to define priorities, to solve problems, etc. Serious Games are specifically designed to change behaviors and impart knowledge. The objective of the project SELEAG is to evaluate the use of Serious Games for learning history, culture and social relations. An extensible, online, multi-language, multi-player, collaborative and social game platform for sharing and acquiring knowledge of the history of European regions was developed for this purpose and was tested with students.

Carlos Vaz de Carvalho

A Framework for e-Content Generation, Management and Integration in MYREN Network

Malaysian Research and Education Network (MYREN) aims to provide accessible broadband to the Malaysian researchers to achieve the country’s knowledge economy aspiration. This networking super highway enables researchers to run data-intensive applications, share computing equipments and run advanced applications within Malaysia as well as overseas. In this paper we provide a social network based framework for enabling all universities and higher education colleges in Malaysia to generate their academic content using MYREN infrastructure and also share them with each other and even with the several other international research communities in Asia Pacific, Europe and North America.

Vala Ali Rohani, Siew Hock Ow

A Case of Study of Investigating Users’ Acceptance toward Mobile Learning

Mobile learning (m-learning) is a relatively new learning tool in the pedagogical arsenal to support students and teachers as they navigate the options available in the expanding world of distance learning. Regarding to wide application of mobile learning, investigating learners’ acceptance toward it is an essential issue. This research investigates learners’ acceptance toward m-learning. An m-learning questionnaire survey that based on 168 university students’ attitudes was investigated. From statistical results, learner autonomy of using m-learning, perceived interaction of using m-learning, quality of m-learning functions, and perceived satisfaction of using m-learning are positive predictors on m-learning acceptance.

Shu-Sheng Liaw, Hsiu-Mei Huang

A Layered Service-Oriented Architecture for Exercise Prescriptions Generation and Follow-Up

Recently, the services that integrating hospital care and home care from the patient-centered concept are more and more important to modern healthcare. The main challenge faced is the integration of heterogeneous platforms. For example, generating and follow-up one exercise prescription is one of such typical services. Service-Oriented Architecture (SOA) has been proposed as a key technology to overcome various problems involved in the integration of heterogeneous platforms and reuse legacy systems. In this paper, we present a layered SOA model for generating exercise prescriptions and follow-up that facilitates interoperability between intranet (hospital) and internet (homecare). In hospital layer, the system automatically produces an exercise prescription for one particular patient, and follows the effectiveness of the exercise prescription in homecare layer. Exercise prescriptions are produced and followed by diversely web services which interoperable over inter and intra networks. The implementation of exercise prescription and monitoring system (named EPMS) is demonstrated by a brief scenario for heart disease patient in this paper.

Wen-Shin Hsu, Jiann-I Pan

Web GIS-Based Regional Social Networking Service as Participatory GIS

Participatory GIS (PGIS) is used in regional urban development and in solving regional problems that affect local communities. Accordingly, the widespread adoption of PGIS is important. In this paper, the development of a Web GIS-based regional social networking service (SNS) is presented. The SNS focuses on PGIS and takes into account user activity support. The system has three functions: information extraction by user activity area, GPS location referencing, and location based information posting function. The proposed SNS is evaluated in Takizawa Village, Japan. Furthermore, a PGIS usage model is proposed for actively utilizing PGIS. Local governments, nonprofit organizations, and universities each have a role in this model.

Satoshi Kubota, Kazuya Soga, Yuki Sasaki, Akihiro Abe

Network and Data Management Techniques for Converged IP Networks

In this paper an attempt has been made to design and develop a prototype of Web Based Server of Servers (WBSOS) which will automatically configure some network parameters for various servers such as DHCP, NETCONF, etc, connected in a network and maintain the data in a centralized manner in an RDBMS, through a browser based application.

In WBSOS, various servers can be managed using a single browser based application. Testing is being done using two servers’ viz. Dynamic host Configuration Protocol (DHCP) and Internet Engineering Task Force’s (IETF), Network Configuration Protocol (NETCONF) implemented in the same browser based application. The system is being tested on windows platform. As NETCONF based Network Management System (NMS) is being implemented, constraints in existing SNMP based NMS have been removed.

NETCONF is being implemented using Web Services Description Language (WSDL) that imports the definitions of XML types and elements from the base NETCONF schema. Using the conversion tools, basic JAVA APIs are generated. These APIs are modified to access the parameters from the graphical user interface (GUI) and generate a request message. This message is encapsulated with SOAP envelope and HTTP and then encrypted with SSL agent and finally sent to the agent. At the agent, after decryption by SOAP & HTTP, the message is parsed by the XML parser and sends to the operation processor to get back the operation commands such as get, edit, etc. The command is executed at the agent and reply is send back to the server. On receiving the reply, the manager saves the data in the centralized data store. Here, data is stored in My SQL database.

The WBSOS will share the data of the network thus reducing the overall burden on the network. As the data is shared, collective and relative analysis can also be carried out. Use of NETCONF finds many benefits in this environment: from the reuse of existing standards, to ease of software development, to integration with deployed systems. Thus WBSOS will be capable of handling a wide range of devices in converged network system.

Sangita Rajankar, Abhay Gandhi

Developing WikiBOK: A Wiki-Based BOK Formulation-Aid System

The design and implementation of WikiBOK, a Wiki-based body of knowledge (BOK) formulation-aid system, is investigated in this paper. In contrast to formulating a BOK for a matured discipline such as computer science, BOK formulation for a new discipline such as social informatics needs a “bottom-up” approach because academics in a new discipline cannot draw its entire figure par avance. Therefore, an open collaboration approach based on the collective intelligence concept seems promising. WikiBOK is under development as part of our project based on BOK+, which is a novel BOK formulation principle for new disciplines. It uses Semantic MediaWiki (SMW) to facilitate its fundamental functions. To support a rich graphical user interface for WikiBOKers, a a graph visualization software, Graphviz, is adopted. SMW is enhanced to work in conjunction with Graphviz. Because edit conflicts occur when WikiBOKers collaborate, a resolution principle is investigated to resolve BOK tree edit conflicts.

Yoshifumi Masunaga, Masaki Chiba, Nobutaka Fukuda, Hiroyuki Ishida, Kazunari Ito, Mamoru Ito, Toshiyuki Masamura, Hiroyasu Nagata, Yasushi Shimizu, Yoshiyuki Shoji, Toru Takahashi, Taro Yabuki

Secure Spaces and Spatio-temporal Weblog Sensors with Temporal Shift and Propagation

This paper defines three kinds of Weblog Sensors to mine the Web, especially CGM such as Weblog documents for spatio-temporal data about a target phenomenon in the physical world, and tries to validate the potential and reliability of these Weblog Sensors’ spatio-temporal data by measuring the correlation with weather statistics of Japan Meteorological Agency as real-world data.

Shun Hattori

Neighbor Information Table-Based Handoff Research for Mobile IPv6

To analysis the standard mobile IPv6 (MIPv6)fast handoff scheme, an neighbor information table-based fast handoff scheme for Mobile IPv6 was proposed. Through pre-configured and regularly updated way to let MN get ahead of target limited areas of information table– neighbor information table, Switching process with a neighbor information table to shorten the uniqueness of the care-of address verification and testing of time delay. The simulation results show that this mechanism does not take up additional network resources, Reduce the switching process of ping-pong exchange and cut down the switching process of switching delay time, this scheme is a kind of superior performance of mobile IPv6 fast handoff scheme.

Zhang Lin, Qiu Shu-Wei, Zhou Jian, Huang Jian

Channel Assignment in Wireless Networks Using Simple Genetic Algorithms

Channel assignments in wireless telecommunication and mobile computing have been studied using a simple genetic algorithm. In genetic algorithm, each cell populates all channels and the fitness function is set a function as channel interferences. Co-channels constraints, adjacent channels constraints, and co-site channel constraints are considered and represented as an energy function. The minimum energy for each available channel is reported as the results of genetic algorithm. The channel with minimum energy is assigned to the incoming call. The simulation results show that genetic algorithm is better than fixed channel assignment in charging calls blocking problem.

Li Ming Li

Application Study of Brand Niche Theory in B2C Brands Overlap and Breadth Measurement

This paper uses theories in ecology for resource competition to study the brand competition in business. It provides a quantitative method to measure brand breadth and brand overlap and examines their relationships with brand competition. Four Chinese online bookstores are used as examples to illustrate the utility of the proposed method in evaluating their degree of competition. This study can help companies identify main competitors in the industry and the main aspects that they are competing in.

Xiuting Li, Geng Peng, Hong Zhao, Fan Liu

Influenza Epidemics Detection Based on Google Search Queries

Some new researches demonstrated that the search data can be used to detect public health trends and short-term syndrome surveillance. In this paper, we study the problem of influenza epidemics surveillance using Google search data. A hybrid model with dynamic search query set is developed, which was more accurate in influenza forecast than Google flu trends, especially for the irregular new influenza strain forecasts. This research is valuable for improving the timeliness of syndrome surveillance.

Fan Liu, Benfu Lv, Geng Peng, Xiuting Li

A Message Prioritization Scheme for Virtual Collaboration

Assuring quality for online games is a big challenge. The client-server architecture, currently though a widely running mode supporting hundreds of thousands of players in a regular basis, faces many difficulties. Network limitations like latency and jitter can leave timely interaction at jeopardy. In online games, the magnitude of interaction among players varies largely which generally depends on virtual distance and other complex variables. It is imperative that the frequency of interaction among players is uneven as a closer player is interacted with more often than a distant one. Similarly, the significance of interaction follows the same drift as the virtual distance increases the significance of relative interaction decreases. A message prioritization scheme can be formulated considering these ingredients for large scale collaboration where the volume of message is high. For this purpose, we exploit the importance of players temporal bond of interaction as well as a segmentation scheme for virtual space around a players area of interest where each segment has a different level of significance in terms of game states. The above techniques set a platform to devise a message passing plan for online games that can offer better game service.

Dewan Tanvir Ahmed, Shervin Shirmohammadi

An Online Virtual Classroom Using SIP

Online Virtual Classroom using SIP is another alternative for the users who have the network constrain. The system composes of two user agents, which are the teacher’s user agent, and the student’s user agents. Both user agents contain three main functions: slides control, live text chat, and 2-ways real-time voice communication. The user agents are compatible with an Open source SIP server called “Asterisk”. No modification is required on the SIP server. The purposed system allows the teacher, and the student to communicate via text chat and real-time voice with a low bandwidth connection. PowerPoint files would be loaded into the students’ computers before the class start. The slide control module will synchronize the slides between the teacher and all students. The system also supports voice communication using SIP and RTP. The network efficiency analysis is done to evaluate the performance of the purposed system compare to a commercial web conference system.

Vajirasak Vanijja, Budsakol Supadetvivat

The Designing of the EPON System

Ethernet Passive Optical Network (EPON) is used in access network. , Optical Line Terminal (OLT) is connected with multiple Optical Network Unit (ONU) by the network connected by Optical Distribution Network (ODN) which consists of passive cable, optical splitters and optical combiners . Ethernet technology is by far the most successful and sophisticated Local Area Network (LAN) technology. EPON is the supplement of the existing agreement IEEE802.3, basically compatible. The compatibility of EPON and Ethernet is one of its greatest strengths. EPON’s downstream channel is for the Fast/Gigabit of the broadcasting, while the upstream is for users to share the Fast/Gigabit channel. It offers symmetric uplink and downlink 1.25Gbit/s of bandwidth. In addition, EPON system can provide remote access within 20KM, with the characteristics of long distance and wide coverage.

Chen Guangjun

A Case Study of a Successful mHealth Application: Cell-Life’s EMIT System

There has been a massive investment in information system resources to aid in the fight against HIV/AIDS over the years. Recently, there has been an increased emphasis on mobile technologies as a key technology for developing countries in this fight. This paper describes a successful mobile health information system that is used by field workers in South Africa to gather and upload field data to a central database.

Alfred Mukudu, Jean-Paul Van Belle

Combine DPC and TDM for MIMO Broadcast Channels in Circuit Data Scenarios

Dirty paper coding (DPC) is shown to achieve the capacity of multiple-input multiple-output (MIMO) Gaussian broadcast channels (BCs). Finding the optimal covariance matrices and order of users for maximizing user capacity requires high complexity computation. To deal with this problem, many researchers use fixed order of users e.g. minimum power first (MPF) and get subpar performance. Meanwhile, the complexity of DPC scheme grows linearly with number of users requiring to cancel known-interference. In this paper we present a scheme combining DPC and traditional Time Division Multiplexing (TDM) that aim to maximize user capacity and reduce complexity of implementation. Simulation results show that the proposed scheme achieves better performance than that of DPC MPF scheme.

Yingbo Li, Da Wang, Guocheng Lv, Mingke Dong, Ye Jin

Estimating Average Round-Trip Time from Bidirectional Flow Records in NetFlow

Round-trip time (RTT) is significant to the network performance. Traditional RTT passive estimating methods are based on IP Traces, which need specialized packet capture equipment and mass storage space. This paper proposes a method to estimate average round-trip time between two hosts by analysis TCP steady traffic model, using specific bidirectional flow records in NetFlow. Test result shows that this method has acceptable error.

Chao Gao, Wei Ding, Yan Zhang, Jian Gong

PAR: Prioritized DTN Routing Protocol Based on Age Rumors

In this paper, we proposed a prioritized DTN Routing Protocol Based on Age Rumors (PAR). In order to reduce the waste of resources in message transference procedure and increase data delivery ratio, the protocol limits the total number of message copy through combining forwarding-based protocols and replication-based ones effectively. Through simulative analysis, the algorithm is found to be able to achieve high data delivery ratio and improve the network performance.

Luan Xu, Hongyu Wei, Zhengbao Li, Haipeng Qu

The Applications of GIS in Modern Community Management and Service

GIS is a useful technology to manage and organize information effectively. It can combine and show objects’ geography location and other characters directly, visually and entirely. GIS has a vast application future in community management and service. It is positive for the improvement of community management and residents’ life quality. It will become an important part of community informationization. In this article, we introduced the study and practice of GIS using in modern community management and service.

Haibin Gao, Bin Gao, Yinghui Li

Comp. Psy. 101: The Psychology behind High Performance Computing

Building software which can deliver high performance consistently, across a range of different computer clusters, is a challenging exercise for developers as clusters come with specialized architectures and differing queuing policies and costs. Given that optimal code configuration for a particular model on any machine is difficult for developers and end-users alike to predict, we have developed a test which can provide instructions for optimal code configuration, is instantly comprehensible and does not bombard the user with technical details. This test is in the form of a ‘personality type’ resonant with users’ everyday experience of colleagues in the workplace. A given cluster is deemed suitable for either development and or production and small/composite models and or large/complex ones. To help users of our software to choose an efficient configuration of the code, we convert the personality assessment result into a series of optimization instructions based on their cluster’s personality type.

Wendy Sharples, Louis Moresi, Katie Cooper, Patrick Sunter

Quality Assessment for MPEG-2 Video Streams

Depending on different contents of video sequences, the compression settings also differ. So many parameters can be obtained from video steams. We extract and analyze a large set of parameters from different layer. Based on the correlation between features and the subjective perceived quality, the most important objective parameters are picked out. A low complexity objective quality assessment metric is obtained by a linear calculation on the selected parameters. The presented method can perform continuous objective quality assessment in unit of GOP (Group of Pictures). The experimental results show that our model can achieve good performance for video quality prediction. In addition, our model does not require the source, or the decoded picture, it is suitable for real-time applications. And continuous quality assessment can provide an automatic warning without delay when picture quality problems occur.

Caihong Wang, Xiuhua Jiang, Yuxia Wang, Fang Meng

Portuguese Education Going Mobile with M-Learning

M-learning intend to endorse new forms of learning encouraging the use of mobile technologies, but this purpose is not been fully implemented yet in institutions Portuguese. In this paper, we describe an environment addresses the mobile learning environment. Before we design the environment was investigated existing solutions using mobile technologies to support learning process and analyzed practical implications of design and education when they come into virtual learning environments.

Rosa Reis, Paula Escudeiro

Measurement and Improvement of the Delay of SCTP Multihoming Path Switch

SCTP multihoming feature has been widely exploited to develop schemes for mobile host handoff, e.g., mSCTP. However, there is no research work on the measurement of path switch delay in practical SCTP implementations. In this paper, we consider the possible case of SCTP path switch delay on common Linux system testbed with SCTP implementation.Our experiment demonstrates that many packets are blocked in the duration of path switch, where the delay usually results from the timeout/retransmission trial process. And we propose an approach to intelligently bypass retransmission phase without modifying the SCTP protocol. The experiment results show that the path switch delay can be significantly reduced and has no negative impact on the whole performance.

Kuang-Yuan Tung, Richard Chun-Hung Lin, Ying Chih Lin, Yu-Hsiu Huang

A Holistic Game Inspired Defense Architecture

Ad-hoc security mechanisms are effective in solving the particular problems they are designed for, however, they generally fail to respond appropriately under dynamically changing real world scenarios. We discuss a novel holistic security approach which aims at providing security using a quantitative decision making framework inspired by game theory. We consider the interaction between the attacks and the defense mechanisms as a game played between the attacker and the defender. We discuss one implementation of our holistic approach, namely, game inspired defense architecture in which a game decision model decides the best defense strategies for the other components in the system.

Sajjan Shiva, Harkeerat Singh Bedi, Chris B. Simmons, Marc Fisher, Ramya Dharam

Performance of VoIP on IPv4 and IPv6to4 Tunnel Using Windows Vista and Windows 7

In this paper, the performance VoIP is investigated for IPv4, IPv6to4 tunneling mechanism, for various VoIP codecs, namely the G.711.1, G.711.2, G.723.1, G.729.2 and G.729.3 codecs using Windows Vista and Windows 7 operating systems. Parameters studied are jitter, RTT (round trip time) and throughput. The results indicate that IPv6to4 tunneling generates extra RTT and jitter compared to the IPv4 networks. For the system studied, the highest RTT was at 0.8msec for G711.2 using Pv6to4 tunneling. For the system studied, the G.711.1 codec provides the highest bandwidth of 688Kbps while G.723.1 has the lowest bandwidth of 77.4 Kbps of all codecs studied.

Samad Salehi Kolahi, Mohib Ali Shah, Justin Joseph

A PageRank-Based Heuristic Algorithm for Influence Maximization in the Social Network

The influence maximization is the problem of how to find a small subset of nodes (seed nodes) that could maximize the spread of influence in social network. However,it proved to be NP-hard.We propose a new heuristic algorithm, the High-PageRank greedy algorithm(HPR_Greedy),which searches the seed nodes in a small portion containing only the high-PageRank nodes, based on the power-law influence distribution in non-uniform networks. The experimental results showed that, compared with classical algorithms, the HPR_Greedy algorithm reduced search time and achieved better scalability without losing influence.

Zhi-Lin Luo, Wan-Dong Cai, Yong-Jun Li, Dong Peng

Examining Learning Attitude toward ICT in Digital Photography

Fast developed Internet transmission and digital environment has been an impact to on-line learning and E-learning. Researchers however hold diverse aspects toward ICT learning, positive such as self-direct learning and online group learning; negative, unwilling change and loneliness. In order to clarify students’ learning attitude toward web learning environment, one semester experimental course digital photography is held. 5 factors, awareness, communication, usefulness, learning motivation, and satisfaction, are examined. The research result indicates that the satisfaction factor is significant correlated with achievement performance. However, other applications and perceptions of ICT may not bring to high achievement in this research.

Sin-Ho Chin, Jung-Hui Lien, Yi-Xin Huang

Study on the Information Technology-Based Lean Construction Supply Chain Management Model

Lean supply chain management, originally generated from manufacturing, has been proved to be an effective supply chain management model mainly by eliminating all forms of wastes in the entire supply chain. This paper first analyzes the status quo and major problems of our construction supply chain. Then it introduces the idea of lean construction supply chain management. Based on this, it puts forward the information technology-based lean construction supply chain management (IT-based LCSCM) model and elaborates its structure. Finally, the paper fully discusses the main issues of the implementation of this IT-based LCSCM model, including constructing lean supply chain network node enterprises and establishing lean supply chain linkages among construction supply chain parties.

Chen Yan, Xu Zhangong

Design and Implementation of Value-Added Services Based on Parlay/OSA API

Development of value-added services in traditional telecommunication network has some problems, such as high costs and long period. API which hides the protocol details of the underlying network is used in NGN nowadays to speed up service creation and deployment. This paper describes a key development technology of value-added services—Parlay, analyses the architecture of Parlay/OSA API, and then presents a detailed design of “SMS Filter” service and “Positioning and Calling” service, so as to resolve problems of spam messages and user location respectively. At the end of this paper, the two services are implemented in the Ericsson NRG simulator.

Chunyue Zhang, Youqing Guan

A Design of Integrated Management System for Building Constructions Based on USNs

This paper designs an Integrated Management System for building constructions based on USNs, which consist of diverse sensors, actuators and RFID attached devices so that the system can monitor the status the construction environments via the USNs and analyze the status information of the construction sites. Through the designed system, we expect the construction management to be carried out efficiently and rapidly for managing and monitoring the resources of workers, materials and equipment. Finally, the system can reduce both the construction cost and its building period.

Byoung-Kug Kim, Won-Gil Hong, Doo-Seop Eom

Design of Public Practical Training Service Platform Based on Cloud Computing for Students Majoring in Software

For some problems in Chinese colleges and universities such as misdistributions and low share of teaching resources, the good and bad were intermingled in graduates majoring in software. This paper introduces a public practical training service platform. This platform is based on cloud computing which will realize virtual and network training. Firstly presents the characters about cloud computing. These characters can gather all kinds of practical training recourses, so it will happen that practical training is regarded as a public service. Then designs the architecture for public practical training service platform and introduces how students practice with this platform; provides major technologies. At last expatiates the advantages of the platform.

Jing Tang, Wen-ai Song


Weitere Informationen

Premium Partner