Skip to main content

2012 | Buch

Software Engineering and Knowledge Engineering: Theory and Practice

Volume 1

insite
SUCHEN

Über dieses Buch

The volume includes a set of selected papers extended and revised from the I2009 Pacific-Asia Conference on Knowledge Engineering and Software Engineering (KESE 2009) was held on December 19~ 20, 2009, Shenzhen, China.

Volume 1 is to provide a forum for researchers, educators, engineers, and government officials involved in the general areas of Computer and Software Engineering to disseminate their latest research results and exchange views on the future research directions of these fields. 140 high-quality papers are included in the volume. Each paper has been peer-reviewed by at least 2 program committee members and selected by the volume editor Prof. Yanwen Wu.

On behalf of this volume, we would like to express our sincere appreciation to all of authors and referees for their efforts reviewing the papers. Hoping you can find lots of profound research ideas and results on the related fields of Computer and Software Engineering.

Inhaltsverzeichnis

Frontmatter
Design and Implement of East China Sea Economic Fisheries Resources Forewarning System

Combination forecasting model were practicable in complex economic system with uncompleted information. The General forewarning system based on DSS, in this East China Sea economic fisheries resources forewarning system, time and space will be connected, this paper will explain Ontology replaces Knowledge Base, mode of Optimization of Knowledge Organization, advance the system’s query efficiency. Integrate database, model base, and ontology with GIS, make the best of advantage from the four factors, and make up for inadequate points, so that it can achieve the development of Fisheries resource in the east sea in China and also can supply reliable information events of resources for the decision-makers. Integrate the warning model of gray forecast model and BP Neural Network (NN) and analysis through the real database from the resources of East Sea in China, the experience results indicate that this warning model has high precision, and achieve good results.

Chen Qinghai, Wang Aiji, Zhang Chi
Personalized Academic Resources Information System Based on Agent Technology

Information Agent is the main tool to solve online information overload, the paper introduces the technical characteristics and basic functions of information Agent, and introduces an information system softwarebased on information Agent - Reference Manger, so that the reader has a more intuitive understanding about Information Agent Technology.

Xianmin Wei
Research of Highway Integrated Traffic Control System Based on Multi-agent

Highway integrated traffic control system is a distributed, nonlinear, dynamic, complex giant system. In this paper, based on the Hierarchical intelligent control system structure, proposed highway integrated traffic control system Distributed Hierarchical architecture, and with Agent as intelligent controller at all levels, to establish a highway MAS model of integrated traffic control system, and conducted in-depth research in the main MAS body of the structural model, construction method, communication system and consultation mechanism.

Xianmin Wei
Research on the Mode of Computer-Aided Translation Teaching Process

The paper begins with the concept and ideas of multimedia teaching and computer-aided multimedia teaching, illustrates the principles of optimal integration between computer-aided multimedia teaching and traditional teaching, stresses how to balance the relationship between the learners and the teacher and how to benefit from the teaching process, all these have just been shown with the figures and been developed by taking translation teaching as the sample, and the constructivist theory of scaffolding instruction has also been adopted as the theory basis, especially to the the design, the Organization and the implement of the multimedia assisted translation teaching.

Zhang Huiqin, Guo Pingjian, Ma Jun
Enhanced Mirror Adaptive Random Testing Based on I/O Relation Analysis

Adaptive Random Testing (ART) is an effective improvement of Random Testing (RT). It is based on the observation that failure-causing inputs tend to be clustered together and the generic characters of typical failure patterns. By far, many ART algorithms have been developed. However, most of them have boundary effect and make use of less information of the specification. For these two issues, we propose two enhanced ART algorithms based on the idea of virtual images and the I/O relations of the program under testing respectively. Our simulation experiments show that the first algorithm can avoid the boundary effect of previous ART methods and the second can improve the failure-detection effectiveness of ART. Eventually, we obtained unexpected results in the last experiment using an integration of two new algorithms.

Janping Nie, Yueying Qian, Nan Cui
Emotion Recognition from Physiological Signals Using Support Vector Machine

Emotion recognition is one of the key steps towards emotional intelligence in advanced human-machine interaction. This paper adopted principal component analysis (PCA) to dimensionality reduction and combined support vector machines algorithm to be used for classifier. Experimental result shows that the classifier performance was effective and useful. Emotion recognition impression was fairish and reasonable for special affective state groupings.

Bo Cheng
Structural Damage Localization of Steel Arch Bridge Based on Wavelet Packet Transform

In order to solve the damage identification problem of steel arch bridge, a damage detection method based on wavelet packet is presented in this paper. A vertical impact load as excitation source is exerted on the surface of the arch bridge. Thus, the acceleration responses can be directly measured, and applied to identify the damage locations. The acceleration responses of damaged and undamaged arch bridges will be converted to node energy by using wavelet packet transform. We will contrast the changes of node energy of each band before and after damage occurs, and calculate the sum of absolute energy differences of all frequency bands. Thus, a damage index can be created, and through the peak method the suspected damage locations can be inferred preliminarily. Then, Shannon entropy is proposed as cost function to optimize the level number of wavelet packet decomposition. Two-dimensional and three-dimensional truss finite element models of arch bridge are applied to verify the performance of the proposed damage detection method. The simulation results show that the method can identify damage locations. Therefore, the proposed method is effective for the damage identification of steel arch bridge.

Huiyong Guo, Jianrong Lin, Zhengliang Li
Developing Research of Enterprise Portal Basing on Open Source Technology

Introduce open source technology such as PHP, MySQL & MD5 technology, its features, related technology and some specific phenomenon when combining with mysql database, especially its key function in developing research of enterprise portal.This paper proposes these open source technology in enterprise portal. An experiment is performed to test and depict the improved achievement. Finally, the feasibility is experimented and the result shows the developing efficiency and software quality can be greatly improved.

Wenrong Jiang, Shiwei Lin
Based on Particle Swarm Engineering Project Progress Control

Project progress control is the key to project success. This paper makes a detailed analysis of various factors and their specific influence on the project success control by the mathematical model. To increase the studies’accuracy, this paper uses the particle swarm algorithm. The ultimate result shows that it can control the project progress effectively.

Xiao Zheng, Zhenning Liu
Arc Interpolation Control of Numerical Control Machine Tools and Its Realization Based on Multi-axis Motion Control Card

In order to deduce the algorithm of arc interpolation control of numerical control machine tools and realize its visualization control, the paper studied the interpolation principle and edited the procedure of arc interpolation for two axis servo motors. Then the paper constructed the servo system consisting of PC computer, multi-axis motion control card, servo driver, servo motor and load and edited the control interface program calling the interpolation procedure, which could realize the simulation control and real time control to servo motors. The compare results show the accuracy of the experiment is higher, and the control interface has such characteristics as visualization, operation easily and so on.

Xiumin Shi, Yi Dai, Xuecui Yang, Wei Liu
Fingerprint Segmentation Using Histogram Thresholding

Fingerprint segmentation is a crucial step in fingerprint recognition system, and determines the results of fingerprint analysis and recognition. In this paper, an approach for fingerprint segmentation based on histogram thresholding is presented. Experimental results show that proposed method can extract the fingerprint effectively and efficiently from original image.

Wenjuan Zhang, Jiayin Kang
QuickBird Remote Sensing Image Denoising Based on CNN

Image denoising is the first pre-processing step in analyzing and understanding images, and is crucial to acquire the high-quality image products. QuickBird, launched in October 18, 2001, has spatial resolution with 0.61m in panchromatic mode, and can be used in various fields. In order to take the benefit of the high spatial resolution information of the QuickBird images, this paper proposed a method to remove the noise in QuickBird images using cellular neural netwok, CNN. Experimental results show that CNN-based approach performs effectively in removing the noise in QuickBird images.

Wenjuan Zhang, Jiayin Kang
A Similarity Measure Model Based on Rough Concept Lattice

The concept lattice is an efficient tool for analyzing data, while it is impossible dealing with non-certainty information for traditional concept lattice. Rough set is an efficient approach of data processing. So the research on rough concept lattice is an important task. In this paper, based on the problem of similarity measure for ontology mapping, a novel similarity measure method based on rough concept lattice is proposed. It is processed by the combination of formal concept analysis and rough set theory for non-certainty, which is processed by approximate operator of rough set for concept lattice measuring. The concepts of ontology mapping is first introduced. A similarity measure model based on rough concept lattice is then proposed. Finally, the experiment results on artificially shows rough concept lattice has excellent performance on .similarity measure.

Xia Wang, Gongzhen Li
The Application of Data Mining Clustering Algorithm in Fuzzy Control

In this paper, through collecting, preprocessing, clustering and analyzing the data, which are achieved from the pressure system of gas-collection pipe coking and gassing factory, the fuzzy control rules are created, which can control the gas-collecting pipe pressure system. With the development and improvement of data mining (DM), a new way will be provided for creating fuzzy control rules. We have completed the core of fuzzy control system, after the fuzzy controller has been built.

Li Guodong, Xia Kewen
A Novel Data Mining Method in Distributed Network

In this paper, we give a summary to the existing DDM systems, and classify them into three classes. Based on the analysis of the popular problems of the existing DDM systems, we propose a novel DDM model for e-commerce data environment, and to improve the quality of the final global mining result, we also propose a knowledge integrating model.

Yang Zhenjian, Xia Kewen
Application of Kingview SQL Database Technology in Traditional Chinese Medicine Dropping Pill Packing Control System

The main points of SQL database technology in Kingview software are explained with a concrete example in this paper.The methods and steps of connecting Ms Access database and KVDBGrid control are shown with the technology, which has solved the technical problems involved in database of industrial control system.

Jujiang Cao, Longgang Li, Xiuyu Meng
Identification of the Software Layers in COSMIC-FFP

The Common Software Measurement International Consortium—Full Function Point (COSMIC-FFP) has been proposed for the next generation of functional sizing methods for many years and used widely soon, although there were still some problems about measurement in practice. In this article, we talk about the relationship between the identification of software layers and other key concepts in COSMIC-FFP. An empirical investigation done with a software projects shows that identifying software layers for measurement is critical to its result. In the end, we give some suggestions about identifying software layers.

Zhou Peng, He Hong-jun, Liu Qing-he, Zhu An-jing, Mai Xin-hui
Design and Implementation of the System Used to Evaluate and Manage the Overall Quality of University Students

This paper aims to provide a system platform to evaluate and manage the overall quality of university students, which is comprehensive, objective, fair, impartial and efficient, for Universities and education authorities at all levels. In this system, B/S three-tier structure is used, the information center acts as the core of the overall framework, and functional modules are designed based on J2EE+Struts and Orecle 10g database. Finally, the concept of the database, logic and physical structure is designed. All in all, running results show that the system reaches the intended design requirements.

Maobao Du, Fengxia Qiu, Yajun Lu
Seismic Collapse Resistance of Multi-story Buildings Focus on Structural Low-Cycle Fatigue Characteristic

Based on the low-cycle fatigue tests of fourteen identical half-scale concrete columns, the collapse index of earthquake-resistant structures is presented in this paper. The influence of post-yield stiffness and floor yield strength coefficient of structures on the dynamic behavior of structural response is studied based on a large number of time-history analyses. Other influence factors, such as site category, basic period, are also addressed in this paper. The analytical results show that the influence of the site category on collapse response is determined by its contribution to earthquake wave amplitude, frequency spectrum and duration. The negative stiffness of post-yielded structure has a significant influence on the collapse response of structures. By using the floor yield strength coefficient, structures are categorized into three types: strong, moderate and weak. For the strong structure, it is easy to ensure the safety under the rare earthquake; for the weak structure, the story drift can be checked following the current code; and for the moderate structure, the method suggested in this paper can be utilized to check the equivalent ductility considering low-cyclic fatigue characteristic and ensure the safety under the rare earthquake.

Yuan Pan, Jianling Hou, Guohua Xing, Boquan Liu
Failure Mechanism and Seismic Behavior of Interior Joints with Different Depth Beams

Four specimens of interior joints with different depth beams were tested under reversed cyclic loading. The experimental study was conducted that focused on the effect of hoop percentage and axial compression ratio on seismic behavior of joint specimens. Test results indicated that the first crack appeared in the minor core (determined by the shallow beam and the top column), and the final failure appeared in the large core (determined by the deeper beam and the bottom column). The critical crack load was quite nearly with the ultimate load of abnormal joints, and the seismic behavior of the specimens were not influenced by the axial compression ratio but influenced by the joint hoop percentage. With the increasing of joint hoop percentage, the shear strength of the beam-column joint subassemblage increased, the width and space of diagonal cracks became smaller than that of the control specimens. Based on the experimental study, an equivalent strut mechanism for interior joints with different depth beams was put forward, and can be served as a basis for further study on mechanical properties of reinforced concrete beam-column joint.

Yuan Pan, Guohua Xing, Jianling Hou, Boquan Liu
Emergency Cases Ontology-Based Uncertain Similarity Matching

In decision-making process for emergency response, there are a lot of uncertain information. It is very difficult to make an effective decision based merely on existing experiences. This becomes a key issue to the development of emergency response strategy. This paper presents an ontology-based context matching algorithm (OCMA) for emergency decision-making based on historical cases. We use rough set upper and lower approximation and principle of similarity relation to cope with uncertain information. Combining with case similarity and calculation of weight, both matching of single-value and multi-value context variables are taken into consideration. With this approach, we solve the problem of uncertain similarity matching which the traditional case matching can’t deal with very effectively.

Songhe Mu, Yongmei Guo, Peng Yang, Wenjun Wang, Long Yu
Solid Reconstruction from Multi-view Engineering Drawings

This paper proposed a new multi-view separation algorithm and a new composite-three-view representation to deal with the practical engineering drawings using existing algorithms which can only handle three-view drawings. The proposed algorithm can separate the views in an engineering drawing automatically and group them into three composite views to meet the input requirements of existing algorithms, which extends the scope of engineering drawings can be handled.

Zi-Gang Fu, Bei-Ji Zou, Ling Wu, Yi-Ming Chen
Reliability Analysis of Seismic Shear-Type Structures

Statistical analysis and significance test of structural seismic response variable have shown that the story maximum ductility ratio and equivalent hysteretic loop numbers all belong to log-normal distribution. Reliability analysis method of structure under different earthquake intensities in structural serviceability limit state is put forward on the basis of results of seismic risk analysis and that of equivalent ductility damage criteria accounting for low-cycle fatigue characteristics of structures. In addition, One-order, second-moment point estimation method is used to focus the reliability analysis on reliability index for practical convenience.

Ming Liu
Study on Performance Index of Reinforced Concrete Bridge Column

According to the failure characteristics of reinforced concrete bridge columns and the need of performance based seismic design in bridge, reinforced concrete bridge column performance levels, which are categorized into fully operational, temporarily operational, reparably operational, life safe and near collapse levels are established. To relate bridge damage to socio-economic descriptions at the five designated performance levels, qualitative indices are established. Considering field investigations following a seismic event, quantitative indices for the same five designated performance levels are proposed. Based on the statistical data of 127 seismic performance tests of RC bridge columns with circular section subjected to flexural failure, drift ratio limit for the same five designated performance levels are put forward.

Ming Liu, Benyan Lu, Boquan Liu
An Optimization Method Based on XML Query Algebra

Current algebra based on XML is mainly object-oriented algebra and relational algebra, the focus is on normalizing XML query semantics, query optimization factors are not considered, only traversal method can be used for querying, causing the lower query efficiency. After analysing the existing XML algebra principle, the paper adopts a new set-oriented algebra system named PAT algebra, and defined the operators, the operating range and the operating objects, used in the time of XML query optimization based on PAT algebra. Several optimization strategies based on PAT algebraic expressions are proposed, they are the standardization of query sets, semantic transformation and the most simplified query. Using these optimization strategies can better optimize the XML expressions, and improve the query efficiency.

Qiuyu Zhang, Min Wang
The Study on Chinese Agricultural E-Commerce Development

Synthesizes our country agriculture informationization the present situation and the existence question, in the economic zone carrying out science and technology information service platform is the imperative matter, and promotes gradually from one point to entire area through electronic commerce’s superiority in our country countryside, becomes serves specially for the farmer has custom-made the network information platform, at the same time also needs the related government to give the support vigorously, can enable our country’s agricultural informationization to obtain quickly the good development, further promotes the countryside modernization system’s formation, promotes our country agricultural economy development, strengthens our country’s comprehensive national strength.

Wen Yangeng, Kang Yuena, Zang Weihua
The Application of SQL Sever2000 in Digit Library Management System

Computer information management and information management system is closely related to the development of the system’s development is a prerequisite for system administration. This system is to manage the library information design. Data processing is workload, error-prone; because the data is easy to lose, and difficult to find in general, for the lack of systematic, standardized information management tools. While some libraries have computers, but has not yet used for information management, did not play its effectiveness, resources and idle more prominent, which is management information system developed by the basic environment. Then it tells the basis and characters of the main developer tools-Delphi7.0 and the correlative academic basis of the layer of VCL. Next it briefly introduces the data development tools-SQL Sever2000 process of creating and linking.

Wu Yun-ting, Xiong-ting Wang, Zhong-zhuang
The Building of Network Training Information Management System

Making use of advanced information technology to make scientific analysis and guidance to training is serves as an effective means to enhance the athletes’ level. In this paper, Web database and ASP are used to design and realize a management information system for training under the network environment, integrating the various necessary analyses in training, prediction models and methods, which provides a convenient and uniform data analysis processing platform for policy-makers of varied levels and meanwhile scientific quantitative basis for the layout of training plans.

Zhang Yanjun, Shi Leina, Si Lingling
A Primary Exploring on the Development Strategy of Qinhuangdao Leisure Tourism

Fulfilling the demand of strategic task of ring Beijing and Tianjin leisure tourism industrial belt to create a new tourism growth, Qinhuangdao needs to breakthrough the model of traditional sightseeing tourism and realize tourism upgrade. This paper discusses on the industrial distribution and marketing strategy of rapid developing leisure cultural tourism to use the superior resources in Qinhuangdao district.

Qianghua Li, Xuewu Qin, Zhaochuan Qi, Zhiqiang Zhao
An Aspect-Base Trichotomy Modeling Approach

This paper proposes a formal method for modeling and analyzing automatic control systems with statecharts and temporal logic based on aspect-base trichotomy. System model is composed of component model, aspect model and weaving model. Dynamic behaviors of automatic control systems are formalized by statecharts, while their properties are specified by temporal logic. We illustrate the model with an example involving a FAN control system.

Xinxiu Wen, Huiqun Yu
Developmental Obstacles and Countermeasure for Asset Securitization in China

As development capital market in China, asset securitization is important more and more. In this paper, firstly, the definition, origin, development and motivation are described. Secondly, the developmental significance for asset securitization in China is pointed out. Finally, the developmental countermeasures for asset securitization in China are proposed by analyzing developmental obstacles.

Chaoqiong Yang
Fixed Assets Accounting Drawbacks and Countermeasures in Colleges and Universities

As multivariate of capital source in colleges and universities, the method of fixed assets accounting can not be suitable to the current situation. In this paper, to compensate for wear and tear of fixed assets, improved accounting and extracted depreciation were proposed. Further more, capital construction accounting merge into enterprise accounting will truly report real state of fixed assets in colleges and universities.

Chaoqiong Yang
The Effect of Applied Compression Stress on Isothermal Phase Transformation Kinetics and Transformation Plasticity of Bainite for HQ785 Steel

The study of isothermal bainite transformation under the applied compression stress for the HQ785 steel was carried out on the Gleeble1500 thermal simulation test machine, according to the expansion curve of bainite transformation with different stress and isothermal temperature, the simulated calculation of the phase transformation kinetics and transformation plasticity is carried out. The results show that, the applied compression stress promotes bainite transformation, with the stress increased, the incubation period of phase transformation becomes shorter. With the stress increased, the parameter b of bainite transformation kinetics equation shows the tendency of increasing, however, the increasing rate of b-valued is different under the different isothermal temperature and applied stress. When the applied stress is in elastic range, phase transformation plastic coefficient K increased with the stress increased. The bainite transformation kinetics model was adopted to numerical simulation of the bainite transformation process, the results of which are in good agreement with the measured, which shows that the calculation model is correct.

Weijuan Li, Shoubin Zhang
Improved Particle Swarm Algorithm and Its Application in Vehicle Routing Problem

In this paper, the particle swarm algorithm is combined with the mutation operation method, according to the actual problem constraints, the particle swarm intelligence factor was added. Classify the location of each customer according to the coordinates, sort the service time of each customer, and then, and then map the results of classification and ordination into particle, which is involved in the operation of the particle swarm algorithm. The experimental results showed that this method is effective.

Ding Pengxin, Zou Shurong, Zhang Hongwei
A KDD-Based Spinning Process Decision System

Although automated equipments are widely employed within yarn production, it has taken more interests to reconfigure the product development way with the KDD and AI technologies in order to improve the yarn quality and to minimize production cost. The existing process data which were recorded in large quantities to ensure the ability to trace production steps can be used to improve the quality itself. This paper investigates knowledge discovery methods from the yarn production database, and presents a novel KDD-based intelligent decision model (IDM) for process optimization. The applied cases are demonstrated that the intelligent model to control the yarn quality is promising.

Zhi-Jun Lv, Jian-Guo Yang, Long-Di Cheng
Combining AHP with CSI in Assessment of Drinking Water Supply Engineering Services

The performance assessment of water supply engineering services plays a key role in urban water policy-making and water pricing reform. It might not be valid to assess the performance in terms of some macro indicators based on the data mainly from water supply industries. This article conducted a study from the perspective of water users through questionnaire surveys. A relevant index system of drinking water supply engineering service was developed in the sight of water users. The Customer Satisfaction Index (CSI) theory was adopted to quantify these indices. The weights of indices were measured by using the Analytical Hierarchy Process (AHP) method. Nanjing city is taken as a case study area to illustrate the developed methods. The weights calculated showed that water price was the most important indicator and the next was water quality. The calculated total satisfaction score displayed an intermediate level for the water supply engineering services. Among the indices, the satisfaction score for water price is the lowest. The results showed that the water supply engineering services and the water price system should be improved to meet the need of most residents in Nanjing city.

Dan Chen, Jing Chen, Zhaohui Luo
Analysis of the Value of Portfolio Insurance Strategy

With options,futures and other financial derivatives,the portfolio insurance strategy can hedge against and transfer risks.Risk capital is the underlying asset of financial derivatives whose prices influence the portfolio insurance strategies.Based on tool of dynamic synthetic put option, the paper has analyzed the relation between risk capital price and the value of the optimum portfolio insurance, the income value of the portfolio insurance, and cost value of the portfolio insurance, with empirical data analysis. The results give technical support to insurers.

Yuan Yao
Design of EPON System Data Encryption Based on Time Function and Service Level

Ethernet passive optical network (EPON) is the most sophisticated optical networks, but EPON system is a point to multipoint broadcast channel, so security risks become the biggest threat to it. And the traditional encryption algorithms can not well meet customer demand. Therefore, this paper makes an innovative design for the existing encryption algorithms and encryption related equipments without changing the structure of existing chips. The EPON system data encryption module based on time function and service level is designed, which comprehensively ensures the EPON system data security based on no additional cost, and also meets the needs of different users.

Dongxiao Wang, Longju Chen, Zhaolin Wu, Zhihui Li
An Adaptive Genetic Algorithm for Solving Ill-Conditioned Linear Equation Group

Simple genetic algorithm (SGA) may be vibrate at optimum solution because of randomicity of genetic operator in the later stage of evolution, so the algorithm can not converge rapidly and increase numerical solution error. To address the shortcoming brought by this problem, an Adaptive Genetic Algorithm (AGA) is designed. Three genetic operators including selection, crossover and mutation are presented to be improved by joining in several methods in the AGA, for example, penalty function, population migration and elite individuals reservation. Taking several large scale and ill-conditioned linear equations as example, the AGA is verified. The experimental results show that the AGA can promote precision of numerical solution of large scale and ill-conditioned linear equation set effectively.

Pengfei Li, Xifeng Tong
A Cluster-Based Routing for UWB Ad Hoc Networks with Strategies

In this paper, an improved Clustering Algorithm and a novel routing scheme for the UWB ad hoc network have been proposed and evaluated. In the Clustering Algorithm, mobility factor is defined and becomes a standard to find the master node. In the proposed scheme, GRA has been adopted to find the probable area of the connection, and some strategies have been given to choose the node in precise routing. This scheme is more stable, the routing rebuilding time is very short and the cost is very little.

Jiang Fei-bo, Dong Li
A Novel Chinese Word Segmentation Method Utilizing Morphology Information

In this paper, we present a novel approach to integrate morphology information into the statistical model for CWS, which yields better accuracies than the traditional CRFs-based approach. The improvements are mainly attributed to two aspects. Firstly, the structure information within the words is integrated into the CRFs model by annotating the Chinese word corpus with morphology tags, which conveys the construction modes of Chinese words. Secondly, the training process adopts a joint CRFs model to integrate structure information with other context, which combine the morphology tag and word boundary in the same state level and complete the word segmentation and morphology tag identification complementarily. Experimental results show that the morphology information is of great use to word segmentation.

Xu Shuona, Zeng Biqing
An Unsupervised Framework of Video Event Analysis

Video event analysis has become the hottest topic of research in computer vision. Previous works found models based upon statistical outperform other models in many aspects grammar. However, the manner of manually defining production rules limits their capability of generalization. In the paper, we adopt Liang’s nonparametric model of HDP-SCFG, and present an unsupervised framework to overcome the limit. We mainly contribute in three aspects. 1) It is the first time that transplant nonparametric grammar, ISCFG, to the area of event analysis in video. 2) We define event primitives and construct their sequence for single/double-agent respectively, instead of the previous mixed-up manner. The ability of describing single/multi-agent event is enhanced. 3) We present a modified version of Earley-Stolcke parser (MES). An additional variable is attached to each state for accumulating the penalty. The MES enhances the robustness to the unexpectable low-level errors, but increase little computing complexity.

Weiguang Xu, Jianjiang Lu, Yafei Zhang, Jiabao Wang
A Method of General Multi-Concept Learning Based on Cognitive Model

The increasing of the knowledge of mankind benefits from the concept learning. Based on the analysis of the common procedure of children’s actions during recognizing the world, a cognitive model of concept learning is set up. A general multi-concept learning algorithm, a method of knowledge representation based on general rules, a logical structure in the forest shape, and a uniform data structure for storage are accordingly presented. Thus, a complete and more scientific knowledge acquisition and application case used for building knowledge base of many kinds of AI system based on knowledge is provided. Further more, with this method, a large scale knowledge base containing more extensive domains can be build. At last, comparing with some ontology knowledge bases, such as CYC, WordNet, NKI and so on, three different characteristics of this learning method are identified and the good application prospects are discussed.

Shisong Zhu, Yunjia Wang, Xiaobo Huang
The Research on Aspect-Oriented Unified Modeling Language State Machine

The paper applies the concept of aspect-oriented to the modeling of state machine and realizes the separation of crosscutting features from the design level, thus maintaining consistency of system design and implementation in the life cycle of software development. State machine is a complicated design model; the methods mentioned in the paper preliminarily explore the aspect mechanism in state machine, which needs in-depth research.

Zhou Mingji, Chen Zhuoyi
An Adaptive Target Tracking Method Based on Motion Vector

An adaptive target tracking method based on motion vector is proposed to enhance the veracity of dynamical model which use Brownian motion to model the dynamics of the state of the target. At first, motion vectors given by motion estimation were calculated using statistic method. Then the statistics result was used to adjust the parameter of the dynamical model adaptively. Lastly the state of the target was inferred using dynamical model and particle filter. The method proposed in this paper adjust the parameter of dynamical model adaptively to predict the dynamic of the target state more exactly from the compressed code directly, and can improve the veracity and stability of the tracker without increasing the computation complexity. Numerous experiments demonstrate the effectiveness of the proposed method which can model the dynamic of the target state exactly and can make the tracker more robust to the change of the target movement.

Honghua Hu, Jiulu Gong, Derong Chen
A Method of Recommendation Based on Affection Semantic in E-Business

Because current recommendation system haven’t considered user affection, we introduce affection semantic in recommendation system, and we propose a model of recommendation system based on affection semantic (RSBAS). We design a method to get the affection support degree by affection recognition and analyzing goods emotional attributes, we use Gabor and SVM to recognize people’s feelings, and use it in apriori algorithm besides number support degree of traditional algorithm. Experiment shows the efficiency and ability of our method.

Wang Gang, Yin Fenxia
Study on Index System of Enterprise Security Support System and Comprehensive Evaluation Model

The index system of enterprise security support system includes many indicators. The four-level indicators and 16 secondary indicators were constructed. The optimistic weighting coefficient selection method and the selection of scores were discussed, and a support system for enterprise security support model was established. The application results show that the model can solve the evaluation problem of the enterprise security support system.

Wan Xi, Li Qiang, Lin Shi Gang
SOLAP Based on Novel Spatial Dimensions

The ratio of spatial dimensions to all dimensions in data cube is very small, and spatial dimensions do not contain a wealth of spatial information, all these become a bottleneck of current space online analytical processing (SOLAP). Aiming at these problems, this paper proposed a new method to build novel dimensions, auxiliary spatial dimensions. With the help of SQDL-G, relationships between central theme and neighborhood objects are introduced into the new spatial dimensions, and data cube will contain more spatial information. The case study demonstrates that this method makes full use of topological operations, quantifies spatial relationship, and promotes the analytical capacity of SOLAP.

ChengZhi Xu, Phillip C-Y Sheu
Workflow Instance Migration Responding to Process Evolution

Workflow processes sometimes need to undergo dynamic evolutions, i.e., changing existing workflows while they are in operation. To manage changes to workflow processes properly, the evolution of workflow instances should be considered. In this paper, we primarily address the upward compatibility issues of models related to structural changes. Upward compatibility is the ability of running workflow instances to migrate to a newer workflow process definition. Regarding this kind of compatibility, we distinguish five levels to identify the degree of compatibility. The analysis techniques of Petri net based on language and reachability graphs can be applied to check the compatibility constraints. By offering a formal foundation for the compatibility analysis of workflow process evolution, this work provides concrete guidelines for redesigning a workflow process model, and successfully migrating of workflow instances..

Ping Sun
A New Defuzzification Method for Enhance Performance of Fuzzy Logic Control System

Fuzzy logic control is the actual process of mapping from a give input to and output using fuzzy logic. For the performance of a fuzzy logic controller depends on its control rules and membership functions, this paper provide a new method (Improved Semi Linear Defuzzification) of defuzzification for enhance the performance of control system. This method is knowledge based, may improve the performance of defuzzification, and perform with minimal steady state error and a large overshot.

Li Na, Weng Jing
A Combination of Inference Method for Rule Based Fuzzy Classification

In this paper, we provide a combination of inference method for Rule Based Fuzzy Classification. Rule based Fuzzy classification provides an effective way to present the approximate and inexact nature of the real world, especially when the systems are not suitable for analysis by conventional quantitative technique or when the available information on the systems is uncertain or inaccurate. For improve the performance of Rule Based Fuzzy Classification System, novel inference method based on ordered weighted averaging family was introduced.

Li Na, Huang Xiaojuan
Individual Three-Dimensional Human Model Animation Based on Conformal Geometric Algebra

In this paper, the geometric language was used to establish a new algorithm of 3D human model animation. The joint points were extracted from the standard three-dimensional grid model of the human body, and then the connections of joint points were constructed as the human model skeleton. The body model deformation was driven by the joint points to get the key frames, and then insert value between frames to realize three-dimensional human model animation. We uses conformal geometric algebra method to describe three-dimensional human body model, and geometric language was implemented directly (not the coordinate) to do geometry calculations, a stable, fast and efficient algorithm was proposed, also combined with the hierarchical thinking of radial basis function (RBG), to deal with grid distortion caused by the mesh deformation around the joint points and we achieve very good results.

Liangwen Hu, Kuangrong Hao, Xin Huang, Yongsheng Ding
Visual Servo Control System of 2-DOF Parallel Robot

This paper establishes a parallel manipulator visual servo control system. With the study object of 2-DOF redundant parallel manipulator and the monocular industrial camera as the vision sensor, a real-time detection system is realized, it provides the movement parameters and trajectory ofthe parallel manipulator, and feedback the information to the host computer and convert them to the corresponding parameters of compensation, so as to realize the visual servo control of parallel manipulator and allow the manipulator to be able to complete the trajectory drawing rapidly and accurately. In this paper, the gate centroid tracking algorithm is used to track the moving platform of the parallel manipulator and the description of the motion trajectory can meet the demands of parameters of servo control. The test proves that this method can rapidly and accurately carry out parallel manipulator visual servo control and validates the feasibility of this system.

Na Zhou, Kuangrong Hao, Chongbin Guo, Yiwen Dou
Research on Knowledge-Based Rapid Design Optimization

To obtain the competition advantages, the methodology of rapid design (RD) is applied widely in enterprises. Product oriented knowledge applied into product optimization based on design instances can avoid the repeated modeling and analyzing and result in improved design efficiency. Firstly, rapid design technology is overviewed. Secondly, general mathematical model of mechanical product rapid optimization is introduced. Thirdly, the process of knowledge-based rapid optimization combined with genetic algorithm is derived and the fitness determination of GA Optimization is discussed in detail. The research in this paper, however, is beneficial to the application of rapid design and optimization.

Tong Yifei, He Yong, Gong Zhibing
Human Body Shape Digital Correction Based on Bone Rotation

This paper presents special shape digital correction method which is based on bone rotation matrix. It combines the calculation advantages of the rotation matrix with the special shape correction to reach digital correction for personalized made to measure. The special digital correction has realized on extraction features of standard shape, definition of skeleton model, and correction on shoulders and legs based on standard shape. The proposed digital correction method is simple, rapid and accurate. Customers can have the comprehensive, objective and scientific decision-making when they buy clothes online. It also has great research value and extensive application in the future.

Jiao Fang, Kuangrong Hao, Xin Huang, Yongsheng Ding
Leakage Prediction Model Based on RBF Neural Network

Pipe breaks and leaks in water distribution networks may bring about economic, environmental and safety issues. It is critical to evaluate the current and future condition of the system for maintenance decision-making. RBF neural network model was proposed for forecasting pipe leakage. Two models based on RBF neural network were established according to previous leakage data set. The goal of the pipe leakage time prediction model is to forecast the leakage time of each pipe and the goal of the leakage time series prediction model is to forecast the future leakage trend of pipelines. The date set used for analysis comes from a city of north China. The results show that the models provide good estimates for pipe leakage and can be useful for water utilities in pipe inspection and maintenance. Active leakage control in pipe networks can be achieved using the models and the blindness maintenance will be reduced.

Wang Lijuan, Zhang Hongwei, Niu Zhiguang
A Leak Detection Method Based on EPANET and Genetic Algorithm in Water Distribution Systems

The deterioration of pipes in water distribution systems can lead to pipe breaks and leaks which may result in a reduction in the water-carrying capacity of pipes and lead to economic, safety and environmental issues Leakage can be detected by correlating changes in flow characteristics to changes in a hydraulic model for the network. This paper presented a nonlinear model-based leak detection method making use of monitoring pressure heads obtained from a test network. The leakage was simulated by the test work. The software EPANET was used to perform the hydraulic simulation of the network. The model was optimized by the genetic algorithm. The results show that model built can estimate the leakage location and leakage amounts. It was suitable for estimating small pipe leakage and the results satisfied the engineering applications, which is useful for water utilities in pipe inspection and maintenance.

Wang Lijuan, Zhang Hongwei, Jia Hui
Optimal Licensing Schemes for Quality-Improving Innovation in the Bertrand Market

Based on the model of Bertrand duopoly, this article considered one of the enterprises was the innovator of a quality-improving technology and analyzed the optimal licensing strategy of the innovator. The main conclusions of our research are as follows: the inventor will not license its technology in the way of a fixed- fee licensing; When it choose a royalty licensing, if the innovation is small, it would license, otherwise it will not; When the difference of the product quality is large, the inventor also will license in the royalty licensing way.

Qingyou Yan, Shunqing Xu, Liufan, Lili Zhu
The Empirical Analysis on the Quality of the Financial Services in China Rural Areas

Financial services can meet the need for capital. To study the quality of financial services in rural China, this paper brought out 4 variables denoting insurance, loan in China rural areas. With the time series from 1982-2009 on the 4 variables mentioned above, the author measured the quality of the financial services in China rural areas through the cointegration test and the VAR model. The result indicates that there are 4 cointegration relations among those 4 variables. That is to say, the quality of financial services in China rural areas is stable in the long run.

Hong Jin
Formal Specification of Reconfigurable Architecture

Widespread popularization of Internet and emergence of many novel software paradigms such as pervasive computing and grid computing have taken lots of application domains to reconfigruable software architecture. However, existing formal methods for reconfigurable software architectures almost haven’t enough facilities to involve specification of structure, behaviour and reconfiguration. Moreover, they can’t effectively validate structural correctness and behavioural consistency of evolving architectures. In this paper, we formalize reconfigurable software architecture on structure, behavior and reconfiguration, and ensure reconfigurable architecture well-formed and consistent.

Zhiming Chang, Yonghua Cui, Xueyan Han, Junan He
Optimizing Technology Research of Test Case Based on Fuzzy Cognitive Map

Regression Testing is one of the very important but expensive process during software test. Testing cost and time is becoming the bottleneck in re-testing all code as the increasing size of software. So choosing a set of test case become a research hot of regression testing. The test case suite could cover all modifications and all codes that affected by modifications, and must be as small as possible. Fuzzy cognitive map is introduced based on this ideal to solve the interrelation between all segment codes which were reflected by weight of nodes. All the segment codes could be found by learning and evolution of the fuzzy cognitive map. This method can obtain the minimum test suite and achieve maximum coverage in the experimental analysis.

Huo Minxia, Duan Lunqian, Ding Xiaoming, Zhou Zhurong
Software Process Management Assessment Towards CMM a Systematic Approach to Optimize Internal Process Improvement

There are currently a number of holistic approaches available in relation to software process improvement. The search for new ideas and innovations to improve software development productivity and system quality continues to be a key focus of industrial and academic research. The CMM is a software process maturity model, which well known and most widely used model for Software Process Improvement (SPI). The SEI is continuing to evolve the CMM concepts, primarily in its current work on CMM integration, which addresses software, systems engineering, and integrated process and product development. This model attempts to quantify a software organization’s capability to consistently and predictably produce high-quality software products by involving process modeling, assessment, metrication, and technology transfer/ implementation to a greater or lesser extent. This paper provides a synthesis of prescriptions for successful software process improvement found from an extensive review of the quality management, organizational learning, and software process assessment process.

Gebeyehu Belay G., Zhongshi He, Dongsheng Zou
Research on University Student Employment of Tourism Management Applied by Knowledge Management

With rapid expansion of higher education in a short time, higher education of China is gradually from elite education to mass education. Facing to reality of difficult employment of university student, how to walk out from the traditional employment mode and seek for a suit of the university student employment management method of adapting to contemporary society, which will become a new subject of university student supervisors. In this paper, knowledge management theory which has been implemented and applied in enterprise management will be introduced into university student employment management, and combine with practical situation of tourism management students employment, it is hoped to walk from the traditional mode of thought and management so as to promote employment by improving employment core competitiveness of tourism management student. Thereby a theory innovation is encouraged about talent cultivation and employment management.

Jun Bi
Semi-supervised Discriminative Orthogonal Locality Preserving Projections for Face Recognition

Locality Preserving Projections (LPP) has been a popular method for feature extraction techniques. However, when applied to classification problems in a supervised setting, LPP only focuses on the intraclass geometrical information while ignores the interaction of samples from different classes. To enhance the performance of LPP in classification, a new algorithm termed as Semi-supervised Discriminative Orthogonal locality preserving projections (SDOLPP) is proposed in this paper. SDOLPP takes into account the labeled and unlabeled samples, changes the objective function, and then orthogonalizes the basis vectors of the face subspace. The proposed method was compared with LPP, DOLPP and SLPP on the AR and YaleB face databases. Experimental results verify the performance of the proposed approach.

Lintao Lü, Bei Fang, Minghua Zhao, Hui Lü
Research on Collaborative Forecasting Model Based on CPFR

Aimed at solving the forecasting problems in Collaborative Planning, Forecasting & Replenishment (CPFR), this paper uses grey model and time series model to predict the demand of manufacturer and retailer separately. Combining the results of single forecasting based on induced ordered weighted averaging (IOWA) which can empower the estimation value after sorting by prediction accuracy at each point of time. This paper sets up a collaborative forecasting model and obtains the collaborative forecasting value. The practical application results show that the collaborative forecasting model can improve the precision of demand prediction. Moreover, this model can help both manufacturer and retailer cooperate with each other more closely and share the information, thus it can reduce the inventory of supply chain and enhance efficiency.

Guorui Jiang, Ying Liu
Research on Product Cost Estimation Method of Machine Tool Based on Principal Component Analysis and Artificial Neural Network

This paper proposed a product cost estimation method based on principal component analysis (PCA) and artificial neural network (ANN) for generalized modular design of machine tool. In the first stage, PCA was applied to identify the principal components of product modular features, which was conducted by analyzing the product cost components and their influencing factors driven by features of modules firstly, and then by calculating the eigenvalue and eigenvector of correlation coefficient matrix to reduce the dimension of the data, later by defining the first few principal components which contain most of the feature variables. In the second stage, the mapping from the restructured product modular feature to the product cost was established by general regression neural network (GRNN). At last, the simulation results demonstrate that the proposed algorithm is effective and speedy.

Zhengying Lin
A Linguistic IRS Based on Prioritized Aggregation of Triangular Fuzzy Numbers

Information retrieval (IR) is the science of searching for documents, for information within documents, and for metadata about documents, as well as that of searching relational databases and the World Wide Web. In this paper we present a linguistic information retrieval system (IRS) based on prioritized aggregation of triangular fuzzy numbers, for dealing with such a problem. The advantage of this method with respect to other works is the use of the fuzzy prioritized weighting information that facilitates the expression of information needs and its ability of trade off between criteria with different priority levels. Another advantage of the method is that triangular uninorms are used to deal with the criteria priority in the process, more generality and flexibility is then obtained.

Songxin Wang
A Framework for Image Retrieval Based on Uncertainty Description Logic U-ALC

A framework is proposed in which information about images(s form and information about image’s content are addressed in a principled way. The framework relies on the an uncertainty description logic U-ALC, which is also newly proposed in this paper, for (i) representing the semantics of images and (ii) for defining the retrieval process in terms of logical entailment. The overall framework thus extends current image retrieval systems with the use of qualitative uncertainty semantic information processing.

Songxin Wang, Hailiang Huang
UML Approach on Chain-Hotel Reservation MIS Demanding Analyzing

This paper introduces the UML approach implementation in demanding analysis phase when developing “Hotel Reservation Management System”. CASE of UML and Visio2003 are used as tools for analyzing and realizing. The original numerous demands from users are sorted and elaborated effectively by adopting the graphic approaches including use case view, interaction view, sequence view, state view. Therefore, the results provide effective foundation for subsequent system developing and implementing.

Xiaoyan Li, Jianping Cai
The Equivalence Property of Max Margins

The equivalence property of vector dual norms is shown by introducing the definition of dual norm and the equivalence of vector norms. Basing on arbitrary norm projection on a plane, the equivalence property of max margins on three kinds of norms is proved in this paper. At last, the optimization question and dual question in three general kinds norm of SVM are given, and their applied scope are also proposed.

Meiqin Pan, Zhijun Ding
QT Programming Technology and Application with Linux

This paper mainly introduced QT programming and application. Firstly, it explained the communication mechanism between objects— the signal and slot in detail; Secondly, in order to describe deeply the theory and implement of the mechanism, then it gave the programming example of time reminder. Finally, it provided the summary of QT programming.

Qing-Xiu Wu, Jun Ou
Temperature Monitoring and Information Releasing System in Linux

This paper introduced Qt’s characteristic and basic method of Qt Programming. It explained the use of QT programming, combining the hardware to realize temperature monitoring and information releasing system. Finally, Qt’s programming features was concluded.

Qing-Xiu Wu, Jun Ou
Security Downgrading Policies for Competitive Bidding System

There are many information flows from high security level to low security level. Security downgrading policies control information flow and permit information release from a high security level to low security level. In this paper, the security downgrading policies are present. The security downgrading policies supports downgrading in competitive bidding system. Each downgrading step is annotated with some operations when some conditions are satisfied.

Jianbo Yao, Ye Tang
A Method of Secure Information Flow Based on Data Flow Analysis

The secure information flow based on data flow analysis have studied for many years. The existing methods tend to be overly conservative, giving “insecure” answers to many “secure” programs, or to be overly attention to location information leak, existing location information leak does not imply there is information leak in a program. The method described in this paper is designed to be more precise than previous syntactic methods. The soundness of the analysis is proved.

Jianbo Yao
Research on Multi-dimensional Association Rules Algorithm Based on Rough Set

Aim at resolving the problem of repeatedly accessing the database for mining association rule, this paper analyses the relation between rough set and association rule, then proposes a multi-dimensional association algorithm based on equivalence class in rough set. In this algorithm, the computing of multi-dimensional frequent items is converted to computing of equivalence class with multi-attributes. So, the number and content of multi-dimensional frequent items and association rules produced by this algorithm are limited by interesting dimensions which are assigned by user. Compared with Apriori algorithm, this algorithm reduces the number of accessing and scanning database. So this algorithm decreases the time of computing association rules and is efficient.

Zhu Feixiang, Liu Jiandao
Optimization for Cylindrical Cup Drawing Based on Multi-Objective Genetic Algorithm

In cylindrical cup drawing, roundness of the flange profile and drawing depth are often used as important indicators of material formability. The two varies with the change of blank holder force and friction coefficient, and conflict each other always. Optimization for cylindrical cup drawing is often considered as a multi-objective optimiation problem. Design of experiment method and genetic algorithm are often combined together to cope with this multi-objective optimization problem. An multi-objective optimization strategy for cylindrical cup drawing was suggested based on Genetic Algorithm. Latin Hypercube Sampling method was introduced to design the rational experimental samples, the objective function was defined based on roundness factor and drawing depth factor, the accurate response surface model for drawing process was built, Multi-objective Genetic Algorithm was adopted in optimization and Pareto solution was selected. To conduct numerical simulation with the optimal process parameters, the result has proved this strategy suitable for optimization design of cylindrical cup drwaing process.

Zhiguo An, Daniel Chang, Yu Zhang
Investigation on the “Black Box” Model of VSCF Doubly-Fed Wind Power Generation System Based on Pan_Boolean Algebra

Based on the analyses of the dynamic characteristics and operation data of variable speed constant frequency (VSCF) doubly-fed wind power generation system that is consisted of wind turbine, variable speed gear box and doubly-fed induction generator, this paper built an new logic math model of VSCF doubly-fed wind power generation system by use the tools of Pan-Boolean algebra theory. The model input variables are wind speed, generator stator power, and generator rotational speed. The model output variables are paddle angle, generator rotator power. A sets of Pan-Boolean algebra equations are used to describing the system control characteristics. The simulation results are shown that this model method is correct. It is significance for the wind power generation system control.

Jin Chen, Yue Liu, Zhenhua Wang, Jin Zhou, Haihui Song, Zhihua Hu, Yang Li
Implementation of LwIP TCP/IP Protocol Stack Based on S1C33E07

To meet the monitoring requirement of the high real-time remote control system , an implementation method of embedded TCP/IP protocol stack LwIP on ROS33 OS is described in this paper. Based on the hardware platform combining, microprocessor S1C33E07 with Ethernet controller DM9000A, the transplantation of LwIP 1.3.2, and the drivers realization have been introduced in detail. Test results have shown that the designed system can communicate by Internet accurately and steadily.

Qi Hui, Li Qi
Information Entropy and GIA Based Unmanned Aerial Vehicle 3-D Track Plan Optimum Seeking Algorithm

n order to solve the Unmanned Aerial Vehicle (UAV) 3-D track planning problems, according to UAV flight are subject to different threats, UAV flight track was established optimal decision-making system, and the fuel consumption, radar threats, missile threats, anti-aircraft threats and atmosphere threats are determined as the evaluation index of objective function, and optimal mathematical model of UAV flight track is constructed. Experience evaluation method is often used to weight calculation, but there is certain subjectivity .Therefore information entropy method is adopted to determine the weights by the set of track plans .And then GIA method is adopted to the gray correlation information between the various indexes and it is used to solve the model. Finally, the optimal model is used to scheme selection for flight track planning problem with fourth eat radar points, five missile threat points, six artillery threat points and four climate threat points to the threat point of flight track planning scheme options. And get the flight track with the best overall performance and minimum comprehensive cost, the research result will provides be helpful for further studying of UAVs swarm cooperative attack track planning.

Ke Zhao, Qi Xu, Zhong-hua Hu
Position Precise Control System of Ball Head Pin Riveting Machine’s Axis

The paper describes a car parts – Riveting Machine’ axis position precise control system. Through the use of laser position sensors accurately measure and the precise positioning of micro-position of fine-tuning nuts by step motor, the system achieve the drop of riveting position precise control of the axis. Actual product tests show that the axis poition precise control system for absolute position error is ± 0.01mm. The system is used in car parts – auto riveting and package for ball head pin. For the automatic position precision improvement of measurement calibration, the pass rate of the product is increased from 60% to 98%, productivity is raised by 30%.

Zhenhua Wang, Chenjin, Xiaohang Liu, Caiping Liang
A Reliability Metric Framework for Composite Web Service

Constructing reliable web service applications according to user demand is one of the key problems for services engineering. The reliability of composite service is subject to the environment and user demand, which are usually uncertain. As thus, the traditional reliability measurements are not suitable for the service environment. This paper presents a reliability metric framework of composite web service based on the service interactive network, and gives the reliability metric model of the composite services aimed at topological structure of web services, in considering the dynamic changes in loading, environment and demands. The reliability model can effectively reflect the trend of the composite service reliability while the service and environment dynamics changing, and improve the survivability of services software.

Xizhe Zhang, Ying Yin, Bin Zhang
In-Motion Alignment Algorithm of Sins for Marching Vehicle

Based on multiplicative quaternion nonlinear error model under large misalignment angles, initial alignment algorithm for vehicle-based strap down inertial navigation system (SINS) was presented. In this algorithm, initial coarse alignment is unnecessary by a simplified SSRUKF algorithm method, which reduced the calculation burden, improved the computing speed, and made the number of sampling points decreased from 2n+1 to n+2. And the alignment was achieved with proper precision through SINS/GPS system for the velocity and position matching algorithm and multiplicative quaternion nonlinear error model. In the end, in-motion initial alignment for SINS simulation tests are executed, and the results verify that this algorithm is meet the requirement of alignment for marching vehicle. The maneuverability of the vehicle is improved by the algorithm.

Minyue Wang, Suilao Li, Rong Ma, Jichao Jia, Yuexiang Leng
A Hybrid P2P Model of a Super-Node Functional Division

In hybrid P2P model, the super-node provides other nodes with information collection, retrieval and other services. The super-node load can affect the performance of systems directly. Designing a hybrid P2P in a cluster that contains the management super node and the query super node, studies the number of super node’s messages, load and so on under the two models. The theory and simulation show that the model can achieve the load separation of the system and reduce the processing time of the query message.

Guo Jun, Chen Chen
An Intelligent Surveillance System Base on Accelerated Human and Face Detection

In this paper, we propose a system to acquire high resolution face image of a human in surveillance scene. Firstly, the system detects a full or partially occluded human body in the scene and zooms in to it automatically. And then a face detection and zooming process is running. Finally, a high resolution face image is captured and saved. The system can run real-time as the algorithms are accelerated by multi-core CPU and GPU. Experiments show that the system can capture most high resolution face image of human in the scene and can be implemented in the real surveillance systems. Our system provides an alternative method with better result to acquire high resolution face image comparing to face super-resolution methods.

Song XiaoFeng, Xie Di, Chen Deren, Zhang Weize, Tong RuoFeng
An Improved Simulation-Based Modeling Method for Electronic System

Multi-signal model is an effective modeling method applicable to large scale complex system. In this paper, an improved modeling method based on simulation is put forward, in which, the Monte-carlo run-times are estimated based on experience to reduce the simulation time cost, and the adaptive method is used to determine the threshold range with improvement of model precision. At last, the effectiveness of the method is verified. The work in this paper is valuable for future further research of complex system test and diagnosis based on multi-signal model.

Xiaomei Chen, Xiaofeng Meng
Web Services Discovery with QoS Based on P2P

Web services provide a loosely coupled paradigm for distributed processing. But the traditional Web services discovery mechanism is based on the centralized UDDI, which lead to performance bottlenecks if a large number of clients visit it and there is also a potential single-point fault. To achieve the high scalability and efficiency, the decentralized Web services discovery approach based on P2P can be used. Combining P2P and Web services together can solve the centralized UDDI problems. In this paper, the novel architecture for Web services discovery based on P2P taking into account QoS characteristics has two layers. The main registry peers in the top layer can be form DHT system based on the basic Chord algorithm. In lower layer topology, some registered node of Web services form the unstructured topology.

Jin Li, Bo Song
Web Services Integration in Intelligent Telephony System

Intelligent telephone system can not only satisfy the customers to use Internet information, but also provide a new increase space of incomes for telephone communication system providers. Although users can gains Web services through hyperlinks, this method has not enough filtering ability for Web services information and typically requires multiple retrieval. Telephone communication system providers and ICP also hope to there is a more efficient way in accounting and security. All the requirements can be performed in Web services integration platform. Web services integration platform in intelligent telephony system not only supports integration of Web Services, but also supports heterogeneous database integration. The platform makes the Web Services integration more flexible and convenient because the providers of the Web Services can maintain their services on-line through internet and the platform needs no work, and this process doesn’t involve programming.

Jin Li, Yongyi Zhao
Application and Illustration of Wavelet Analysis in Petroleum Sequence Stratigraphy

As a mathematic method wavelet analysis can be used to solve some problems in the research of petroleum sequence stratigraphy. Its geological concept is that the log curve is the superposition of the sediment cycles in different periods which can be reflected by some characters in the stratum, in another hand, wavelet analysis can identify the cycles in different frequencies which are superposed in log curve. From this it can be found that the sediment cycles in different periods can be identified by using wavelet analysis of well log curves. So this method can be used to identify sequence units. In terms of the principle of the selection of wavelet, wavelet db5 is chosen for the cycle classification of logging curve. The correlation of cycle of sedimentation classified according to different logging curves is also made. This method not only could be used in the inter bedded sand and shell stratum, but also could identify the sequence units in a heavy mono litho logy layer.

Wei Zhao, Zaixing Jiang, Qun Zhang
Hyperspectral Endmember Detection Method Based on Bayesian Decision Theory

Endmember detectiopon in hyperspectral imaginary data set is a difficult problem, this paper provide a method for hyperspectral endmember detection based on Bayesian decision theory. This Endmember detection may decrease the residual error when we using endmembers represent data points and the means of the endmember distributions may match the true endmembers more closely.

Zhiming Liu, Weng Jing
Solving Finite Element Problem through Parallel Method Based on Cluster

This paper provide a parallel method for solving finite element problem. Finite element method is a major method for many engineering disciplines: structural analysis, fluid dynamic, structural optimization, etc. To solve a large system of simultaneous linear equations in the equation solver phase may consume too much computational resources. By using parallel method based on cluster, via vector computational techniques and redesigning sequential algorithms, more large scale finite element problem can be solved efficiently.

Zhiming Liu, Xiaojuan Huang
Ship Maintenance Decision Support System Based on Data Base and Expert System

To solve the problem of maintenance deficiency and surplus emerges in the ship schedule maintenance mode, we developed intelligent condition-based maintenance decision support system. We adopted a multi-parameters synthetic condition assessment model based on fuzzy theory and set up a fault diagnosis model in terms of reasoning machine based on expert knowledge. Then the results from the above models may help the managers to make a maintenance decision. All of these operations were completed with the assistance of the data base. The software was programmed with C++ Builder as the basic tool. As a general platform, the system has integrated functions of condition assessment, fault diagnosis and maintenance decision. On the basis of the support system, we can inspect and maintain the ship or part of that effectively and economically.

Zunfeng Du, Song Chai, Zhendong Tan
Application of Analysis and Forecast Model in Product Supply Information Analysis

Against the background of economic globalization, information plays a more and more important role in product markets; the society’s demand for product information becomes greater and greater; accurate forecast of product markets is vital to the direction of production, the flow of production, and production consumption. Therefore, it is more and more vital to forecast product markets timely and accurately. This essay explains the basic concepts of such three forecast models as the moving weighted average forecast, single variable linear stationary time series forecast and grey forecast and combined forecast and also their implementation methods respectively. In addiction, taking the wheat output as an example, it performs forecast by applying combined forecast method and shows out the forecast results in figure.

Zou Ruirong
Resource Classification and Service Matching of the Mold Manufacturing Grid Service Platform

In this paper, a prototype system of mold design and manufacture service platform was set up based on manufacturing grid. The structure of service platform consist of the node layer, the core middleware layer, the user case layer and application layer is proposed. Manufacturing resources associated with the total lifecycle of mold are classified and clustered. To classify and establish mold manufacturing resources conviently, this paper divides mold design and manufacturing resources into mold design and analysis resources, mold manufacturing equipment resources, mold information service resources ,mold knowledge and technology resources and mold talent resources.The mold grid resource service match mechanisms and its implementing algorithms are proposed. This research provides the theoretical basis to realize information engineering and network manufacturing for the die and mold enterprises.

Fanxin Kong, Jianmin Zuo, Mengling Wu, Jiao Zhang
A Zero Standby Power Remote Control System

The transmitter in a zero standby power remote control system for household appliances has been designed and verified. The chip in transmitting unit is fabricated in 0.18um CMOS technology and occupies a core area of 0.47mm2. It works around 915MHz and has a max output power of 0dBm. The total working power consumption of the chip is 16.45mW. The energy recoveries blocks and ASK demodulation block in the receiving unit are verified. This remote control system is proposed to overcome the continuous power consumption by watching circuits in other two methods. Compared with those two, this new remote control system can remote control appliances turning on/off with zero standby power.

Li Shengduo
A Water-Saving Irrigation Monitoring System Based on Wireless Data Acquisition Network

In this paper, a wireless data acquisition network was designed and implemented to water-saving irrigation monitoring. Low cost, reliability and portability were three main goals of this design. All the system units were designed and implemented by author. In the system, Basic unit (PU), sensor and valve cost under 100$, 200$ and 210$, respectively. ValCon was developed by authors to monitor and save soil moisture data with date and time. Thus growers would know the irrigated places and accordingly would make decision for irrigation period to reach desired irrigation level.

Li Shengduo
Mining Typical Features of Highly-Cited Papers

In this paper, the method to detect the future highly-cited papers (HCPs) in citation network was discussed. Considering the growing process of one paper, the content features describing the “rewards” that papers obtained in their earlier stage were extracted to characterize their quality mechanism. Integrating the content features and the external features obtained from the social view of papers’ communication process, the feature space used to model HCPs was established. Basing on the feature space, the typical features of HCPs were extracted by the framework of rough set reduction. It shows that the papers’ inner qualities and the external features mainly presented as the reputation of authors and journals make joint efforts to generating HCPs in future.

Mingyang Wang, Guang Yu, Daren Yu
Characterizing the Knowledge Diffusion Strength: A Case for Nanoscience and Nanotechnology

In this paper, the knowledge diffusion strength among disciplines was evaluated, with taking Nanoscience & Nanotecnology (N&N) as the example. Basing on the citation data in Journal Citation Reports 1998-2007 of N&N, the mutual-citation networks were constructed to investigate the diffusion strength among disciplines. A strong convergent character was found. Among all the nano-related subjects, Material Science, Physics, Chemistry, N&N, Electrical & Electronic and Metallurgy & Metallurgical Engineering provide at least eighty percent citation relations with N&N. And the promoting forces from the outside environment, including Material Science, Physics and Chemistry, make the foremost contributions to the development of N&N.

Mingyang Wang, Guang Yu, Daren Yu
The Study of Lighting Controller Routing Algorithm Design

City street light system is an important part of the city construction, and its intelligence reflects the city’s modernization, which the important part is the street light controller. The lamp controller design part includes hardware design and software design. In this paper, the main research is the algorithm research of the software part, we design of a street lamp controller in the new routing algorithm ,the algorithm combined with ant colony optimization and routing algorithm, make the performance of the network to play the best as far as possible. This paper describes the new routing algorithm for a concrete realization of the process, and designed a new routing scheme, Finally, establishment of a specific mathematical model, verify the effectiveness of the improved algorithm with the detailed mathematical reasoning.

Zhang Jun-chao, Chen Jun-jie
Discussion of Apply Virtual Hand Techniques Adjuvant Therapy Upper Limb Rehabilitation

For the current status of the drawbacks of upper limb rehabilitation. Proposed use virtual hand techniques apply treatment and rehabilitation of upper limb, Mobilization initiative of patients. System implementation can be based on visual information input gesture, Gesture recognition can used the background Gaussian mixture model method,Hausdorff–Maximum likelihood identification algorithm and Neural network method.

He Gu, NianFeng Li, Dan Shao
The Study on Library Service’s Transformation and Innovation Based on Web 2.0

The advent of Web2.0 era clearly shows the arrival of a revolutionary change age to us. It not only has great impacts on the present library service, but also brings the library new opportunities and unprecedented challenges. But one thing is certain that the ultimate goal of the extensive use of modern technology on library is to provide better and super service to users. The service tenet of “People oriented, customer first, to serve the user wholeheartedly, and to provide satisfied service to users” never changes. Pursuing quality service is always the eternal theme of the library.

Wu Jianjun
The Research on China’s Economic Growth

In this paper, we propose that the success story of the Chinese economy between 1979 and 2008 can be best described as followings: the expansion of secondary industry has played the key role in overall growth of GDP in China during the reform period in two ways, that is, the secondary industry has been the key industry in the development processes in China during the reform period, since it is the secondary industry that revealed appreciable increasing returns to scale, which are assumed to be spread over economy as a whole and the second reason is explained by labor reallocation between industries. When surplus labor forces are assumed, transferences of surplus labor into secondary industry with higher productivity might well result in higher overall productivity of an economy as a whole.

Chen Lijuan
A Power Flow Solution by Newton-Raphson and Time Domain Simulation

Digital simulation has been an increasingly important trend for researchers to perform power network analysis. Power flow calculation is the fundamental part of power system analysis and a method of power flow simulation in time domain based on PSAT was proposed. Firstly, a mathematical model of power network and its solution of Newton-Raphson was given. Then the process of power flow simulation was introduced, and a power flow simulation of power network of WSCC including three machine-nine nodes was carried out. The result shows that the power flow calculation is a fast and a high-precision process, and can meet the need of power simulation.

Changqing Kang, Lei Yuan
Application of Quartus II and FPGA Technology in Experiment of Principles of Computer Composition

Concrete realization of experiment teaching of principles of computer composition course using Altera Corporation’s Quartus II software design system and FPGAhardware platform system is discussed in the paper. The students can set up relevant type of files utilizing Quartus II software,proceed synchronous analogue simulation and hardware read-inusing FPGA device. The output value of experiment can beobserved by changing the input value so as to achieve the goal ofunderstanding and researching for each experiment functional characteristics of principles of computer composition.

Fenghua Zou, He Gu, Nianfeng Li
Comprehensive Application Platform Development of Rice Planthopper Monitoring System Based on Internet of Things

Rice planthoppers is one of the major pests which seriously harm China’s rice production. It has four characteristics, “international, migratory, fulminating and devastating”, so all major rice production regions in China have taken it as the focus of prevention and treatment. Under such a situation, research on rice planthopper morning system has important theoretical significance and extensive practical value. Considering the currently actual demand for early warning and assessment of pests and diseases, this paper adopt technology of internet of things, computer network and dynamic webpage, and multi-disciplinary knowledge to design a comprehensive application platform of rice planthopper monitoring system. The technical framework of the system takes Active Server Page (ASP) as the major open language, and SQL Server 2000 as its database. Meanwhile, this system combines the script, Hyper Text Markup Language (HTML), components, and database access and other functions together with the help of Dreamweaver8.0 development platform to create a comprehensive application platform with advantages of simple operations, timely message, friendly interface and easy management, so as to lay a foundation for achieving a scientific, systematic and quantitative monitoring and evaluation of rice planthopper.

Keqiang Wang, Ken Cai, Yu Tang, Xiaoying Liang
Recursive Software Rejuvenation for High Available E-Business Cluster Systems

The demand for high availability e-Business applications such as transaction-handling systems, require dynamic Quality of service (QoS) guarantee from service servers. While with the increasing complexity, the systems are liable to failure even aided by the redundant techniques. In this paper, we build the recursive software rejuvenation model to improve system availability, Negotiated with the redundant techniques both on the in- node level and on the system level. Calculating the service availability Marko-vain model for unified failure-recovery mechanism, we get the maximized steady-state availability and the optimal rejuvenation schedules under different level scenarios. Numerical examples illustrate that this strategy can lower the cost for rejuvenation and improve the system’s availability; this provides strategies for improving E-Business system’s availability.

Wang Jiwen
On Reusability Metric Model for Software Component

Reusability is the main feature of soft component which differs from other software. It affects the improvement of quality and the effectiveness of component library, that how to adopt an accurate, application based method to evaluate the reusability of component. In terms of the concrete characteristics of component quality, this paper obtains reusability metric model based on the reusability of component. Method that was used to adjust the values according to the feedback information is described. Experiment results demonstrate the effectiveness of the proposed method.

Li Yingmei, Shao Jingbo, Xia Weining
Research on Pervasive Computing Model

Through pervasive computing, people could acquire any interested information anytime, anywhere and transparently. The pervasive computing makes the information space and physical space into a unified whole. Meanwhile, with the growing development of the wireless sensor networks technology, pervasive computing will also become a reality. In this paper, by the research on pervasive computing model based on wireless sensor networks, we propose a pervasive computing model based on wireless LAN. Among the model, wireless sensor networks nodes and other pervasive devices execute context-aware, wireless LAN makes the information space integrated with the physical space. So that the users perceive information by pervasive devices in wireless LAN anywhere and anytime.

Guiquan Jiang, Bing Li, Xiao Yu
The Application of Semantic Grid in Digital Library Knowledge Management

With Grids’ further development and the acceleration of Grid technology, there’ll be the consequence of reduced transparency for user as huge amount of resources and services are not easily interpreted by the human user. Utilizing semantic web technology interprets the resources and services will greatly reduced human efforts and use the resources and services more efficiently. Semantic Grid can bring different communities together to solve large-scale problem, so human’s interest on grid is increasing, and a secure foundation enable technology providers to collaborate and share information is urgently needed. The Author research on the grid technology with aims of solving the problems of interoperability and heterogeneous resource in constructing the federated Digital Library (DL) for knowledge management, applying both the grid and semantic web technology in the research of DL.

Li Yi
The Application of Factor-Criteria-Metric Model in Network Security Evaluation

FCM (Factor-Criteria-Metrics) model think that the quality of software is decided by some Factors, each Factor is decided by some Criteria, each Criteria is decided by some Metrics. The measure method based on Multi-data and Layer has certain likeness with network safety valuation, because the core task of network safety valuation is to measure the target network on the aspects of managing strategy and technique , the two safety valuation factors, whether it matches the request of appointed safety protection grade. In this paper, we proposed a network security evaluation based on Factor-Criteria-Metrics.

Zhou Mingji
The Research on AD HOC Networks Security

An Ad Hoc Network is a network that is built spontaneously as devices connect. It consists of a collection of nodes capable of communicating with each other without help from a network infrastructure. Nodes can feely join and leave the network with or without notice, this will allow Ad Hoc networks to be formed, merged together or partitioned into separate networks on the fly without the need for any form of centralized management or services. The main goal of this paper is to draw a general state of the art view of the main concepts in relation to Ad Hoc security, from network vulnerability, types of attacks to proactive and reactive security approaches.

Zhou Mingji
The Financing Policy Analysis on Medium and Small Enterprises Based on Role Theory

Financing gap always is the major element lead to the element shortage of the SMEs developing capacity directly or indirectly. It needs financing policy supporting when achieving the zero SMEs development capacity gap. While the government implements financing policy, they should plan as a whole and make deeply thought to confirm the angle and extend of the policy as aim at the SMEs development capacity gap forming and it’s rooting in some specific industry. This article focuses on the theoretical exploring to the relationship between SME development capacity gaps and financing policy decision-making accordance, so as to provide a specific analytical framework and ideas for directly focus on the SMEs development capacity gap in some special industry and Practice Analysis to the financing policy decision-making accordance.

Wu Chunan
The Government Financing Guidance in Venture Investment Based on Extended Model

This paper explores a basic model and adds the government as a new participant into this framework. And then, I analyze the government financing guidance in venture investment based on extended model. Three conclusions can be made on government financing guidance. The improvement of basic expectation in venture investment is positive related to "example effect" of government financing guidance.

Wu Chunan
The Criminal Law Legal Status in Judicial Specific Application

Judicature practice work has put in a claim for reassessment to criminal law and other department laws. The application of the criminal law, especially in the conviction and sentencing of administrative offenders, should deal efficiently with the relationship between the criminal law and other department laws. The particularity of adjustment way is the theoretical basis of making criminal laws become department laws. The non-independence and the strictness of the criminal adjustment object decide the universality, ultimatum and modest restraint of criminal law. The guiding role and safety value of the law claim that criminal law must keep consistent with other department laws. In spite of that, criminal law is equal to other department laws. Independent foundation of criminal law and the relationship between criminal law and other department laws decide the status of criminal law in legal system which not only produces an effect on enacting of criminal law but also plays an important guiding role in specific application of criminal law.

Li Wei
The Study on Invading Personal Information Crime in Criminal Law

Article 7 of Criminal Law Amendment (VII) newly adds the crime of selling or illegally providing personal information and the crime of illegally acquiring personal information. The objects of both crimes should be appropriately extended to all the personal information that is worth protected by Criminal Law. The legal interest of Protection Law should be extended from a person’s right to privacy to control rights over personal information and should also includes property rights in personal information and personal credit rights. The facts about a crime should also be further perfected.

Liu Lu
An Empirical Analysis on China’s Regional Knowledge Productivity Efficiency Based on SFA

This paper aims to discover the differences and affecting factors of China’s regional knowledge productivity efficiency. Based on literature review, a full-scale empirical study on regional knowledge productivity efficiency is made applying stochastic frontier function model based on the panel data of eight regions in 1994—2008. The result shows regional knowledge productivity efficiency is about 0.6 and is distributed uniformly spatially. To promote regional knowledge productivity efficiency, we need to activate regional knowledge stock, promote economic development level and advance industry openness properly.

Wenbo Li, Xiuling Xu
An Improved Algorithm H-Vegas for Enhancing Compatibility with TCP Reno

With the development of the Internet, network congestion problem are more and more serious. It is an important subject how to improve the existing congestion control algorithm. In order to solve the problem, there are many congestion control algorithms. They can be divided into end-to-end congestion control and based on the network congestion control. This paper mainly focuses on end-to-end congestion control. By analyzing the TCP Vegas and its related improved algorithm based on the incompatible of TCP Vegas sharing bandwidth with TCP Reno, it has proposed an improved algorithm of TCP Vegas, namely H-Vegas. The new algorithm has combined the characteristics of TCP Reno and TCP Vegas, enhanced the compatibility with TCP Reno by improving congestion avoidance algorithm. According to the results of simulation on NS2, the algorithm is validated.

Zhang Hua, Liao Ming-hua
Key Issues of the Remote Monitoring-control System of Sluice Gate in the Tarim River Basin

It is the inevitable trend that the sluice gates are remotely monitored based on the information technologies of network communication in the drainage basin. The remote monitoring-control system for sluice gates was established from the current and future development in the Tarim River Basin. The information technologies of sense organ, measure and control, network communication, digital video frequency, etc, were applied. Some key points about technological methods, data deriving, network communication, database design, visit strategy, integrative display were also discussed. Using the data warehouse management technology, theory of the integrative spatial and attribute data, seamless integration of multi-source data, and B/S and RDS with three-tier architecture, the remote monitoring-control system of sluice gates were achieved in the Tarim River Basin. It has the very import theoretical and practical significances for carrying out the real-time adjustability for water resources, science decision-making, general management and applied study of ecological environment, and promoting information development in the Tarim River Basin.

Xiangwu Li, Zhenglong Yan, Rui Zhuo
Spectrum Warping Based on Sub-glottal Resonances in Speaker-Independent Speech Recognition

In an effort to reduce the degradation caused by variation of different speaker in speech recognition, a new perceptual frequency warping based on subglottal resonances to speaker normalization is investigated. A new warping factor is extracted from the second subglottal resonance that is based on acoustic coupling between the subglottis and vocal tract. Second subglottal resonance is independent of the speech content, and it embodiment speaker character more than the third format. Then it normalizes the PMVDR coefficient, which is a speech coefficient based on perceptual minimum variation distortionless response (PMDVR), and is more robust and anti-noise than traditional MFCC, which uses the normalized coefficients to speech mode training and recognition. The experiments show that the word error rate compared with Mel frequency cepstrum and the spectrum warping by the third formant, decreases by 4% and 3% in clean speech recognition. The results demonstrate that this method improves the word recognition accuracy of speaker-independent recognition system.

Hou Limin, Du Min, Xie Su, Huang Zhenhua
Extenics Data Mining and Its Application in Satellite Data Processing

The paper introduces the concept of extenics data mining, builds a matter-element model of electric filed in space ionosphere and presents a method in defining the classical field and sectional field of matter element. Through mining data of electric filed in space ionosphere happened 12 days before the Wenchuan earthquake, the paper acquires two abnormal data points and calculates the support and confidence as well. From the confidence of new knowledge, there isn’t a good way to forecast earthquake.

Li Zhong, Wang Ai-ling, Sun Xiao-ling, Zhang Wei, Zhang Xue-min
Retrieving Land Surface Temperature in FuZhou Base on Landsat ETM+ Image Data

Remote sensing data from Landsat 7 systems were utilized to retrieve urban area Land Surface Temperature. Using Radiative Transfer Equation method to retrieve the Land Surface Temperature of Fuzhou area and get the region’s surface temperature distribution, and calculate the surface temperature variations in different surface types. The result shows that city centre surface temperature significantly is higher than that of suburban area, and downtown outward present surface temperature gradually decreasing trend. The average surface temperature reaches 14.04 ℃ in the entire area studied.

Deng Jiao, Li Hu, Wang Zuo, Yu Tao, Cheng Tian-hai, Xie Dong-hai
Risk Management in the Application of Subway Construction

This article first briefly introduces the development process of the MTR, taking the accident of Shanghai Line four for instance, leads to the core of this paper ——risk management of metro construction. Based on the specific situations in our country, puts forward some critical issues of subway projects and suggestions to achieve low risk of subway construction in China, in the hope that they would generate more public discussions.

Wang Li, Hu Yalan
Dynamic Programming Based Grid Workflow Scheduling Algorithm

In order to automate scientific process, workflow has been used to orchestrate tasks to be executed in grid. The scheduling of workflow applications is critical to the performance of grid system. A grid scheduling algorithm based on dynamic programming is proposed, which partitions dependent tasks into different subset as corresponding stage using extended topological sorting algorithm. To get the optimal task-resource mapping, the algorithm allocates resources the optimal objective function based on the cost of computing and communication in current stage and resource distribution of previous stage. The experimental results prove that our algorithm is better than Max-Min, Min-Min and HEFT in load balancing and makespan when considering resource dynamic load.

Hui-min Luo, Chao-kun Yan, Jun-wei Luo
Research on Infrared Radiation Characteristics of Target Based on NETD and Atmospheric Transmittance

The influence of the vapor, carbon dioxide and aerosol in the atmospheric to infrared radiation attenuation of target was researched in this paper. The connection of atmospheric transmittance and water vapor content was worked out according to the linear regression. Finally, the vision distance between target and infrared detection system was carried out in the processes of infrared detection system parameter NETD.

Xia Chen, Junshan Li, Yu Tang
Temperature Distributing Contrast between Vehicle and Background

Simulation of temperature fields for vehicle was built and worked out in this paper. Meanwhile, the temperature of background was worded out according to the finite element method, and the graph of temperature distribution of vehicle and background was got out. The simulated data was accord with the measured value. The model is important for studies of vehicle infrared thermal image, infrared identification and infrared stealth.

Xia Chen, Junshan Li, Yu Tang, Bo Hu
IDSA-UP: An Improved Dynamic Spectrum Access Algorithm Based on User’ Priority

In this paper, with the aim of improving spectrum utilization, we proposed an improved dynamic spectrum access algorithm which was based on users’ priority (IDSA-UP). In IDSA-UP, cognitive users with different priorities collaborated with each other, and power control was used to ensure that there was no interference between secondary and primary users(PUs) and the interference between secondary users (SUs) should meet the constrain. Then graph coloring was used to allocate the spectrum. Performance analysis and simulation results show that IDSA-UP algorithm can improve the spectrum utilization compared with color sensitive graph coloring (CSGC) algorithm and color sensitive graph coloring with tags deleted (CSGCTD). Consider that the number of secondary user is 10 in a square service area of size 100 × 100m2, the interference one SU suffered from other SUs is limited in 5% of the primary user’ covering radius, the spectrum utilization increase 40%.

Shijiao Zhang, Pinyi Ren, Chao Zhang
The Technical Research of Ferrography Division of Morphology

During the ferrographic image analysis and its technical research, the accuracy of the ferrography segmentation directly affect the analysis accuracy of the ferrograph’s particle. In order to realize the automatic and quick analysis of ferrographic image, First of all, we do morphological close operation to the binary image to eliminate the small holes in the target area, and then use the morphological reconstruction to filter the bright and dark area of the image. In the end, the reconstructed ferrographic image segmentation based on morphological watershed technique. Through this method, we effectively avoided the over-segmentation and realized automatic detection of the objective area and divided the attached and overlapped particles, which largely improved the accuracy of image analysis. Moreover, because we use morphological method to process image, the speed was increased, which satisfied the real time requirements in the practical application. In this paper, the algorithm is realized C++ language, and the effectiveness and accuracy of this application were proved by experiment results.

Jin Lu, Jingqiu Wang, Chao Wang
Study on the Application of Ant Colony Clustering in Fault Early Warning of Equipment Management

In recent years, with the rapid development of scientific technology, the process of industry production which utilizes a great number of equipments becomes more and more complex. How to keep watching on the state of the working and the trouble of the equipments so as to ensure the production regularly work becomes the urgent thing that the production unit concerns about.

This paper firstly analyzed the early warning of equipment failure and ant colony algorithm, completed the algorithm of ant colony cluster failure warning design and implementation of the model. On this foundation, this paper verified the data from transmitter by ant colony algorithm. Experiments have shown that the early warning model is highly simple and efficient; it was provided a reference for enterprise equipment to establish reasonable maintenance strategy.

Guixian Xu, Huaichang Du, Hongsheng Wang, Jing Meng
Asymmetric Random Subspace Method for Imbalanced Credit Risk Evaluation

In this paper, an asymmetric random subspace method is proposed for imbalanced credit risk evaluation. Asymmetric random subspace method integrates one of the advanced sampling methods, Synthetic Minority Over-sampling Technique (SMOTE), with random subspace to solve the imbalanced data problem. On the one hand, the advanced sampling method, SMOTE, combines informed over-sampling of the minority class with random under-sampling of the majority class and can solve the problems of basic sampling methods. On the other hand, it can also use random subspace strategy to enhance the performance of base classifiers. For illustration and verification purposes, two real world credit data sets are used as testing targets. Empirical results demonstrate that the proposed asymmetric random subspace method is a very promising method to the imbalanced credit risk evaluation.

Gang Wang
Application of Matlab/Simulink and Orcad/PSpice Software in Theory of Circuits

Matlab is an interactive software system for numerical computations and graphics, it is especially designed for matrix computations. PSpice is a world standard that has proven itself in the area of circuit design. The powerful, highly-visual simulation world of Orcad/PSpice is a great tool for understanding circuit theory and electronic design, giving the student the ability to explore difficult aspects of the topic. In this paper, we illustrate this process through a series of simple examples using Matlab/Simulink and Orcad/PSpice software package. the simulation results using Matlab/Simulink are in good accordance with the simulation results using Orcad/PSpice corresponding to the same circuit.

Liangyu Peng, Lei Bao
A Clusters Algorithm Based on the Threshold for Wireless Sensor Network

Nodes need constant detect channel of LEACH agreement in clusters processing. According to strength of the cluster head signal, it determines to join what clusters. This process also needs to consume more energy. On the basis of this agreement, a new algorithm uses CSMA mode in the process of grouping clusters. It introduces a signal intensity threshold to decide that nodes should join what clusters. The nodes still adopt the conversion of work and dormancy state. The new algorithm reduces the receiving nodes. And it processes the signals that cluster head nodes and other nodes send. The simulation shows that the new algorithm consumes lower energy than LEACH algorithm and prolongs the network life cycle.

Liao Ming-hua, Zhang Hua
Research of TD-SCDMA Joint Data Detection Algorithm

A new method to implement the Block-FFT algorithm is investigated based on the comparative study of the computation of the inverse of the system matrix which is the crucial part of Joint data Detection algorithms, and the computational complexity, memory requirements and the BER performance of the proposed Block-FFT algorithm is compared to that of standard Cholesky decomposition algorithm and approximate Cholesky decomposition algorithm. The simulation results indicate that the proposed Block-FFT algorithm exhibits same BER performance with the other two algorithms while whose computational complexity and memory requirements are sharply decreased . Furthermore, it is more tractable to realize.

Zhao Shuaijun, Zhang Huaqing, Zhang Lulu, Wang Jiaye
An Efficient Data Encrypting Approach Based on DBMS Kernel

This paper presents an efficient approach about encrypting data based on DBMS kernel. By using security dictionary and expending SQL, we implement the storage and efficient query about the encrypted data.Moreover,we test the query performance in the open source postgresql and validate the efficient and feasibility.In the future,we will further study the encryption Granularity,multi-table join and multi-condition query.

Duan Guoding
The Study on College Education Method Reform Based on Online Teaching Mode

Using online course in traditional classroom teaching provides new ideas and new perspectives for the reform of teaching in college. Successful hybrid Learning needs careful design of curricular activities, a reasonable presentation sequence of learning tasks and activities, and various evaluation methods of activities, etc. It also needs a great effort made by teachers and the supporting policies from the department; also it depends on the level of student’s independent learning.

Zhao Wanhua
Research on Automatic Monitoring System for Temperature and Humidity of Granary Based on DSP

A 1-wire bus mounted temperature and humidity sensor is been designed to form the sensor monitoring network. By the adoption of DSP as the site monitoring controller, CAN bus for communication with upper machine, as well as with LCD Technology, acousto-optic alarm device, ventilation and temperature controlled circuit, combined with data acquisition and processing by C language programming, the software and hardware design in the automatic monitoring system for temperature and humidity which based on DSP was accomplished. This system possesses practical applications.

Xinmin Xiong, Wei Zheng, Zhiqiang Li, Zhenhai Liu
The Application of WEB-Based Data Mining on Electronic Information Commerce Statistics

The Web site of E-Commerce has millions of on-line transactions and visitation, which makes a lot of data about customers. But the beneficial information in these data has not been fully mined or used. The inherent complexity of Web has determined that traditional data mining model can not be used for Web mining; data mining has been successfully used in knowledge discovery of database; for increasing Web documents and Web activities, we need to study effective data-mining algorithm and design of mining system frame, and apply them on e-commerce sites’ construction to meet clients’ need better in data statistics. Based on the self-construction of Web mining system, this paper has carried research on Web log data mining; made deep research on how to mine Web log data and transactions; analyzed the e-commerce data mining, based on which, discussed a WEB data mining system applied on e-commerce statistics.

Xing Nana, Wei Jia, Yang Yuanfan
A Novel Data Mining Algorithm Based on Rough Set

Using rough set theory on the advantages of attribute reduction, decision table attribute reduction, remove the irrelevant attribute, as extracted directly from the appropriate decision table decision-making rules, the same time, based on rough set attribute reduction algorithm is improved Classical association rules mining algorithm of the system and to make the existing algorithms on the proposed improvement and optimization.

Yufeng Yao
Fuel Cell Network Monitoring System Based on the Embedded Web Server

This paper presents a fuel cell network monitoring system which is based on the embedded WEB server. Transplanting uClinux to the embedded system implements an embedded WEB server. Running a monitoring program obtains the fuel cell working status data from CAN bus. Using the status data updates the WEB page to publish the fuel cell working status. Finally, PC obtains the fuel cell working status by visiting the WEB page. Test results shows the system has the advantages of good reliability and high efficiency, excellent expansibility and can be widely implemented in many different industrial monitoring and control domain.

Zhang Yi, Xiao Duo, Zhao Hui-zhang
Design and Implementation of Online Training System of Fire Fighting Certification Examination

This system’s design and development is to meet the needs of cadres at all levels of the fire department public security departments for reviewing, taking mock examinations and other preparations before certification examination. This paper has realized the question bank management, mock examinations, system management, and other major functions by using development platform of Visual Studio 2008, ASP.NET technology, SQL Server 2005 database. Practice shows that the system has a certain practical value with advantages of friendly interface, clear functions, and simple operation.

Wang Wei
BRM—A Behavior Based Requirements Modeling Method

Software behaviors have long been recognized to be essential components involved in requirements modelling process by many researchers both from academia and industry. In this paper, we propose a divide and conquer modeling method – Behavior based Requirements Modeling method (BRM), to modeling behaviors of software system. The target system is decomposed into sub-domains, ViewPoints(VPs), and scenarios at successive levels. Requirements modeling could be carried out in different VPs respectively. Behaviors of the target system are identified within each scenario. A formal description language – Behavior Description Language (BDL) is proposed to describe these behaviors, as well as the model of the target system.

Li Wan, Bo Huang, Xiang Ling, Guoqing Wu
A Pulse Denoising Method Based on Wavelet Transform

Donnoho et have proposed a method for de-noising by threshold, which has been used in many signal de-noising and compression problems. But the method of Dohono is not successful for impulsive noises. We have proposed a method, which detect and wipe off impulse noise, then de-noising by shift-invariant wavelet . Simulation results indicate that: it can better detect and reduce the impulsive noise and it can reduce the noise while keeping the signal edges better compared to other wavelet based denoising algorithms.

Li Guang-hui, Zhang Xing-hui
Backmatter
Metadaten
Titel
Software Engineering and Knowledge Engineering: Theory and Practice
herausgegeben von
Yanwen Wu
Copyright-Jahr
2012
Verlag
Springer Berlin Heidelberg
Electronic ISBN
978-3-642-03718-4
Print ISBN
978-3-642-03717-7
DOI
https://doi.org/10.1007/978-3-642-03718-4