Proceedings of the 2012 2nd International Conference on Computer and Information Application (ICCIA 2012)

+ Advanced search
453 articles

A Novel Data Access Scheme in Cloud Computing

Xiaowei Gao, Zemin Jiang, Rui Jiang
Recently, Hota et al. present a Capability-based Cryptographic Data Access Control in Cloud Computing. This scheme implements data storage, user authorization, data access and integrity checking. However, we find two fatal attacks in the data exchange between CSP and User. These attacks makes a registered...

Dynamic Evolution of Requirement Goal Deployed on Network Environment

Yang Liu, Jinzhao Wu
Under the network environment, it inevitably exists inconsistency and dynamic information in users’ requirements because of the complicated and volatile network, update, restructuring and so on. This paper studies how to handle the inconsistent information and keep correctness of the requirement goals...

Research On DB2 Performance Testing Automation

Lei Zhuang, Zhen Gao, Hao Wu, ChunXin Yang, Miao Zheng
Software testing play a significant role in modern software development and maintenance process, which is also an important means to ensure software reliability and improve software quality. With the continuous improvement of quality requirements of the software products and software engineering technology...

Remote Video Surveillance System Based on DirectShow and Image Compression

Shangfu Gong, Ligang Wu, Yanjun Wang
Video surveillance, convenience and rich information, has been widely used in security, protection, monitoring and other occasions, and has already been one of the most important precautionary measures in commercial, residential and transportation areas. However, considering the massive data transmission...

The Implementation of Serial Communication CSerial the Port Class

Naining Wen, Shangfu Gong, Yanjun Wang
Illustrating the advantages and disadvantages of several commonly used methods to develop serial communication program under Microsoft Windows, this article uses a serial communication class through a third party, namely the use the Remon Spekrijse provided free serial port class CSerial the Port class,...

The Globally Linear Embedding Algorithm

Jieyun Xia, Shuaibin Lian
LLE is a very effective non-linear dimension reduction algorithm and widely explored in machine learning, pattern recognition, data mining and etc. ‘Locally linear, Globally non-linear’ has always been regarded as the features and advantages of LLE. However, the theoretical derivation presented in this...

A Performance Tool for Earth System Models Development

Hang Li, Zhongzhi Luan
We present a performance tool for Earth system models development to aid in analyzing the performance of the climate modeling applications. It is difficult for existing tools to handle with the complex, coupled structure and the long execution time of models. Our performance tool implements rapid analysis...

Improvements based on the IPSec VPN Secuirity

Ya-qin Fan, Ling Lv, Mei-lin Liu, Fei Xie
In this paper, through specific description of the concept of virtual private network VPN, operating principles and the IPSec protocol, and using the OPNET software for performance simulation of IPSec VPN network, we get the result of IPSec VPN throughput of the network, which is unstable. o though IPSec...

Research on K-Anonymity Algorithm in Privacy Protection

Chen Wang, Lianzhong Liu, Lijie Gao
Nowadays, people pay great attention to the privacy protection, therefore the technology of anonymization has been widely used. However, most of current methods strictly depend on the predefined ordering relation on the generalization layer or attribute domain, making the anonymous result is a high degree...

Imbalanced Data Detection Kernel Method in Closed Systems

Youli Lu, Jun Luo
Under the study of Kernel Methods, this paper put forward two improved algorithm which called R-SVM & I-SVDD in order to cope with the imbalanced data sets in closed systems. R-SVM used K-means algorithm clustering space samples while I-SVDD improved the performance of original SVDD by imbalanced sample...

A method for Chinese Noun Phrase Recognition Base on Word Co-occurrence Directed Graph

Xinglin Liu
This paper proposes a recognition method for Chinese Noun Phrase based on word co-occurrence directed graph. An input document is firstly scanned in which noun word string is retrieved. Atomic word table and word co-occurrence directed graph is then generated according to the word strings. A search is...

Optimizing the Conditions for Polysaccharides Ultrasonic-assisted Extraction in Mycelium of Paecilomyces tenuipes Pt196 Using Statistical Approach

Linna Du, Wenting Bu, Wenlin Pan, Chen Shao, Jiahui Lu
[Purpose] In order to enhance the extraction rate of polysaccharides, a series of statistical approach was used to optimize the ultrasonic-assisted extraction conditions from the mycelium of Paecilomyces tenuipes Pt196. [Method] The optimization of conditions was carried out in two stages. Firstly, the...

Bargaining in a Push Supply Chain System under Partial Cross Ownership

Jiguang Chen, Qiying Hu
Supply chain under partial cross ownership (PCO) refers to the dyad in which each one holds part of its partner’s shares. In a two-echelon push supply chain under the partial cross ownership, when the operational decisions are bargained, the supply chain is coordinated, and the allocation of the chain...

Support Vector Clustering for Outlier Detection

Hai-Lei Wang, Wen-Bo Li, Bing-Yu Sun
In this paper a novel Support vector clustering(SVC) method for outlier detection is proposed. Outlier detection algorithms have application in several tasks such as data mining, data preprocessing, data filter-cleaner, time series analysis and so on. Traditionally outlier detection methods are mostly...

Distributed Computing Design Methods for Multicore Application Programming

Qian Yu, Tong Li, ZhongWen Xie, Na Zhao, Ying Lin
In order to solve the serial execution caused by multithreaded concurrent access to shared data and realize the dynamic load balance of tasks on shared memory symmetric multi-processor (multi-core) computing platform, new design methods are presented. By presenting multicore distributed locks, multicore...

A New Energy-Efficient On-Demand Routing Protocol for Green Wireless Mesh Networks

Yinpeng Yu, Yuhuai Peng, Lei Guo, Meng Song
In order to solve the green energy saving problem with the wireless routing technology, a new energy-efficient survivable routing protocol, called Energy-efficient Survivable AODV (ES-AODV) for unicast demand in green Wireless Mesh Networks (WMNs), is proposed in this paper. The routing protocol uses...

A Improve Robust Watermarking Algorithm for Binary Images

Lei Zhang
A improve robust watermarking algorithm is proposed for binary images. The primary focus of the proposed algorithm lies in finding more flippable pixels and enhancing the robustness of watermarking. Based on Haar Wavelet Transform, the more flippable pixels was found not only in the neighbourhood but...

Application of Link Prediction in Temporal Networks

Haihang Xu, Lijun Zhang
Link prediction is an important research hotspot in complex networks. Correlational studies merely use static topology for prediction, without considering the influence of network dynamic evolutionary process on link prediction. We believe that the links are derived from the evolutionary process of network,...

Application of Ant Colony Algorithm Based on Optimization Parameters in Equipment Material Transport

Xi Li, Liyun Chen, Aizhen Liu, Sen Liu
In order to solve the path selection problem in the transport of equipment and materials, while improving the quality of solutions, this paper uses ant colony algorithm based on optimization parameters to achieve. Through genetic algorithm to solve the parameters of ant colony algorithm, resulting in...

Data Extraction method for Heterogeneous Database Based on EJB

Zhenyou Zhang, Bochen Sun, Zhi Cao
Data island exists in most of the information system. And the system platform integration could eliminate the existence of the information island. This paper visited database information system through the EJB component technology, and using the metadata way to extracted data information from the heterogeneous...

Development Trend Analysis on Corn Futures Price in Our Country by Multiple Regression Model

Junyi Chen, Pingyuan Xi
As the main influence factors on price fluctuations of corn futures is more complex, so analyzing these factors that is very difficult. In this paper, China's consumer confidence index and consumer price index are selected as variables of the rational expectations so that the econometric model is created...

Research of Node Energy consumption Based on Dynamic Power Management in Wireless Greenhouse Control System

Yongxian Song, Juanli Ma, Xianjin Zhang
The resources of wireless sensor nodes are limited, and the power of nodes is supplied with battery whose capacity is very limited, once the energy of battery is run out, the nodes will lose their effect, so there are serious energy constraint in wireless sensor network. In this paper, the specific energy...

WS-SIM: A Toolkit for Modeling and Simulation of Service Composition

Fan Zhang
Web service has been rapidly developed in recent years. Web service selection is an important issue in web service composition and lots of service selection algorithms have been presented. As lots of them select an atomic service during runtime, it is not an easy task to evaluate the quality of the composited...

Harmony Search Algorithm Based on Cloud Theory

Lifu Wang, Zhi Kong, Xingang Wang
The parameter bw is a distance bandwidth between 0 and 1 in harmony search algorithm, which helps the algorithm in finding globally and locally improved solution. In this paper, a new harmony search algorithm is proposed in order to improve the convergence speed and the global search algorithm of the...

Research and Application of Parallel Computing under Linux

Xuechun Wang, Quanlu Zheng
Parallel computing is in parallel computer system for parallel processing of data and information, often also known as the high performance computing or super computing. The content of parallel computing were introduced, the realization of parallel computing and MPI parallel programming under Linux environment...

Based on local structural similarity image denoising algorithm

Zehua Zhou, Weitang Zhang
The image is a kind of important information source, through the image processing can help people understand the connotation of the information. However, the image in the process of generation and transmission by all kinds of the noise, the information processing, transfer and storage caused tremendous...

Teaching Agent Model Construction Based on Web Cooperative Learning System

Yaolin Li, Yanhua Zhong, Zongfu Zhang
The research tries to solve the problems related to teaching agent technology in cooperative learning system. Aiming at the fact of present learning system being unable to realize real-time intelligent teaching for students, a creative idea of teaching agent mode based on web cooperative learning system...

An Energy-efficient Routing Algorithm for Disruption Tolerant Networks

Yukun Yao, Wenxi Zheng, Zhi Ren
In Disruption Tolerant Networks (DTN), information is exchanged between mobile nodes with the same transmit power. It is an energy-consuming process and highlights the need for energy-efficient power control mechanisms. If the transmit power of nodes is too low, they might miss many of the opportunities...

The Realization of Math Score Query on the Wireless Internet

Guang Yang
Wireless internet is gaining wide spread usage in teaching affairs, especially in score query system development. This paper explores how simple Math score query system can be developed for mobile devices and introduces general framework for designing such score query applications. Using the framework,...

A Comprehensive Test Compression Scheme based on Precomputed Test Sets

Zhijian Tian, Fayong Zhao
To cope with increasingly rigorous challenges that large scale digital integrated circuit testing is confronted with, a comprehensive compression scheme consisting of test-bit rearrangement algorithm, run-length assignment strategy and symmetrical code is proposed. The presented test-bit rearrangement...

A Feature Weight Algorithm for Text Classification Based on Class Information

Yongfei Li
TFIDF algorithm was used for feature weighting in text classification. But the result of classification was not very well because of lack of class information in feature weighting. The known class information in the training set was used to improve the traditional TFIDF feature weight algorithm. Class...

Design and Implementation of Encryption Scheme in Web-based Examination System

Yongfei Li
Requirements on encryption of web-based examination system were analyze, and different encryption technologies were used to meet the needs on three levels, including important data, core processing logic and some restricted functions. For important data, its confidentiality and integrity were realized....

Research and Development of Online Examination System

Qiaofang Zhao, Yongfei Li
Examination System was necessary to separate teaching and testing. A web-based Examination System was developed with Java Web technologies. The system provided the functions, including question management, paper generation and test online. Also the combination of client-side programming and server-side...

Application of Ontology Technology in Agricultural Information Retrieval

Jincui Kang, Jinglong Gao
The agricultural information on the internet become more and more, it is very difficult to search accurate related information from such different information, in order to improve the efficiency of information retrieval on the internet, the intelligent searching technology of agricultural information...

Game Theory-Based Routing Algorithms for Wireless Multi-hop Networks

Zhi Ren, Shuang Peng, Hongjiang Lei, Jibi Li
In wireless multi-hop networks, the quality of service provided by the system heavily depends on the cooperation between nodes. However, nodes are reluctant to cooperate with each other to save their limited resources. This tendency will put a limit on the application of the current wireless multi-hop...

Security Policy on Logistics Management Information System Based on Web

Linna Huang, Fenghua Liu
With the internet development and further development of information technique applications, information management system is used more and more widely in logistics enterprises, but consequent security issues of network information have become increasingly prominent. The paper was set in information...

Aggregation of Systematic Operational Capability of Armaments

Xinhua He, Yinan Ma, Qiong Wang
Aggregation of systematic operational capability of armaments is significant for armaments systems' developing, constructing and using. As holistic avalanche and operational capability's nonlinear character of armaments systems, the feedback mechanism among capability indexes is researched and an aggregate...

Teaching Reform of data structure based on CDIO Educational Concept

Fengxia Yang
Data structure is a strong theoretical and practical course, but the traditional teaching methods can not meet the demands of engineering personnel training. The author of this article introduces “learning in doing” and “project-based teaching and learning” based on CDIO educational concept to data structure...

LD Longitudinally Pumped Nd:YAG 946nm Lasers Optimization Analysis

Jingquan Li, Jingyuan Shi, Changli Qiu, Wei Quan, Siming He
In this paper, the best crystal length and transmission of quasi-three-level 946nm Nd:YAG laser is analyzed and optimized. Under the different condition of pump power loss of cavity and mode matching the analysis show that one should select different length of laser crystal and different transmission...

A Direct Filling Algorithm of Isogram in Complex Boundary

Linna Huang, Guangzhong Liu
On basis of summarizing the existing isogram filling algorithm, this paper puts forwards a direct filling algorithm of isogram in complex boundary. Compared with the point-by-point scanning method and algorithm of area filling, this new algorithm has no necessity not only in point-by-point calculation...

A study on the System Architecture and Key Technologies of Telematics Based on 3G

Lifang Tang, Chuanjin Wang
Telematics, the application of Internet of Things technology in the intelligent transportation system, has attracted keen attention of research mechanism at home and abroad. By introducing the basic conception of Telematics, the paper makes a summary and research on the technologies adopted in the system...

Computer Simulation Technology Application in Hydraulic System Analysis and Design

Xiaoping Hu, Zhangping You
With the development of mechanics and computer technology, computer simulation has become an important tool in the hydraulic system analysis and design. The application of computer simulation technology in hydraulic system is introduced in this paper. A hydraulic servo system was modeled by standard...

A principal components analysis self-organizing neural network model and computational experiment

Jifu Nong
We propose a new self-organizing neural model that performs principal components analysis. It is also related to the adaptive subspace self-organizing map (ASSOM) network, but its training equations are simpler. Experimental results are reported, which show that the new model has better performance than...

Research in Serial Port Communication Mechanism Based on Android Mobile

Zhengrong Lei, Xiaoli Long, Waixi Liu
In this paper, the authors carry out an introduction to the principles of implementing serial port communication by Android mobile and give a detailed explanation to this implementation process through a case. In other words, through .NET serial port communication realizing serial port communication...

Modeling and Simulation of Voltage Frequency Ratio Control System for Asynchronous Motor

Jun Rong, Yuejiao Ding, Xi Chen, Li Wan, Yiming Li
Alternating current (AC) machine speed regulation system plays a very important role in our industrial and agricultural production. This paper focuses on the three-phase asynchronous motor which account for most of the proportion of the AC machines. Firstly, this paper establishes three mathematical...

Modeling and Simulation of Asynchronous Motor in Coordinate System Based on Matlab

Yiming Li, Yuebin Wang, Quanfeng Yan, Wei Huang
Asynchronous motor has simple structure, low cost, comparable to DC motor control performance when using the vector control technology. This paper focuses on the three-phase asynchronous motor which account for most of the proportion of the AC machines. Firstly, this paper builds the vector control system...

On Applications of Cell phone Two-dimensional Code in China

Mengdi Chen, Luling Liu, Bin Huang
Cell phone two-dimensional code is the product of the combination of the two-dimensional code technology and mobile terminal cell phone, applied to give full play to the superiority of the two-dimensional code recognition technology with the convenience of mobile cell phone use. With the upgrading of...

An Applied Research On Experiential Marketing In M-commerce

Minzhen Yang, Bin Huang
The rapidly developing M-Commerce has changed the developmental model of small and medium-sized enterprises. A traditional marketing model is a single supply chain. Thus, in the environment of E-Commerce, enterprises should change their marketing models. Based on the requirements of the customers, Experiential...

Image Feature Extraction of Moment of Inertia Based on Otsu Threshold Segmentation

Qing Liu, Liming Zhao, Lijun Zhang
In order to better extract image feature and recognition, a novel feature extraction algorithm of the binary image processing using Otsu combined with normalized moment of inertia (NMI) is put forward. Firstly, the image is processed into binary image and the target area is effectively segmented utilizing...

Strategies for The Security of Online Payments in E-commerce

Chen Zhang, Shijie Jiang, Bin Huang
Online payment is apparently the key for the online transactions, so its security issue becomes the center of focus in the e-commerce development. In China, however, the information leakage, transaction fraud and other security issues have occurred so frequently that they have severely affected the customer...