4 IEEE. Symposium on Intelligent. Security Informatics (IITSI 2010) 2010 Third International. Information Technology and. Jian, China.

Size: px
Start display at page:

Download "4 IEEE. Symposium on Intelligent. Security Informatics (IITSI 2010) 2010 Third International. Information Technology and. Jian, China."

Transcription

1 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (IITSI 2010) Jian, China 2-4 April 2010 Editors: Fei Yu Haiwen Liu Xuange Peng Jian Shu Roy Ng 4 IEEE IEEE Catalog Number: CFP1007G-PRT ISBN: TIBAJB Hannover

2 Third International Symposium on Intelligent Information Technology and Security Informatics ViMtiifMM^^ IITSI2010 Table of Contents Message from the IITSI 2010 Symposium Chairs IITSI 2010 Organizing Committee IITSI Committee Members xvii xviii xix IITSI 2010 Technical Papers Skin Segmentation Based on Double-Models 3 Hao-kui Tang and Zhi-quan Feng A Small World Network Based Grid Resource Discovery Mechanism 8 Weichun Huang, Min Chen, and Jian Liu Adaptive Hybrid Function Projective Synchronization for Two Different Chaotic System with Uncertain Parameters 12 Chengrong Xie and Yuhua Xu A Quay Crane Assignment Approach for Berth Allocation Problem in Container Terminal 17 Zhi-Hua Hit Performance Analysis of an Improved Single Neuron Adaptive PID Control 22 Wu Wang and Zheng-min Bai A Mixture Conjugate Gradient Method for Unconstrained Optimization 26 Hailin Liu Distributed Key Management Scheme for Large Scale Pay-TV Application 30 Jia-Yin Tian, Cheng Yang, Yi-chun Zhang, andjian-bo Liu SECTrust: A Secure and Effective Distributed P2P Trust Model 34 Jianli Hu, Xiaohua Li, Bin Zhou, and Yonghua Li v

3 Representing Non-deterministic Actions within the Situation Calculus for Autonomous Characters 39 Xiangyang Huang, Xiao Xin, and Wenjun Wu Study on Service Selections Based on Ontology and Qos 43 Wang Gang and Yin Fengxia On the Way to Design an Optical Camera Lens for River Sediment in Underwater Imaging 48 Xu-yan Zhou, Bing Tan, BingZhu, Xuan-ge Peng, and Xue-mou Liu Research on MAC Communication Mechanism of Air-to-Ground Data Link Based on 3G: The MSDU Frame Subsection and RTS/CTS Handshake Mechanism 54 Minghui Li, Jingbo Xia, and Yaoguo Wang The Application Research of Wireless Sensor Network in the Prison Monitoring System 58 Wan Zhou, Zhang Xuehua, XiongXin, and WuJiande Research on k-means Clustering Algorithm: An Improved k-means Clustering Algorithm 63 Shi Na, Liu Xumin, and Guan Yong A Verifiable Copyright-Proving Scheme Based on Lifting Wavelet Transformation 68 Li Lizong, Gao Tiegang, Git Qiaohtn, and Bi Lei Design and Implementation for Real-Time Property of Serial Communication Based on WINDOWS CE 73 YuXiang Jiang, Cheng Xu, LaLu Zhang, and ShanQin Wang Design of Panoramic Mosaic Surveillance Platform in Severe Circumstance 77 Yu Liu, Jimchan Du, andfeng Ji Analysis on the Integration of ERP with E-business 81 Wu Qunli An Integrated P2P Mobile Learning Model for Timely Farming Guidance 84 Xiaoming Yao, WencaiDu, Baodan Chen, andzhongzhi Yuan An Integrated Network Performance Monitor System 88 Hungjie Sun Pattern-Based Blind Spatial Image Watermarking 92 Xiaoming Yao, WencaiDu, Mei Huang, Weihua Wu, andjundongfu Genetic Algorithm-Based Evaluation Model of Teaching Quality 97 Hongfa Wang, Feng Yu, Chen Xing, and Zhimin Zhou Study on Incremental Data Mining Based on Rough Set Theory 101 ShanGuo Lv andhongli Chen Study on Ontology Model Based on Rough Set 105 HongLi Chen and ShanGuo Lv vi

4 A General Method of Constructing the Reversible Full-Adder 109 Lihui Ni, Zhijin Guan, and Wenying Zhu Automatic Construction of Web-Based English/Chinese Parallel Corpora 114 Bin Tan andxu-yan Zhou Research on Component Composition with Formal Semantics 118 RuzhiXu, Quansheng Wu, Hongquan Gong, and Leqiu Qian Multi-modal Medical Image Registration Based on Gradient of Mutual Information and Hybrid Genetic Algorithm 125 Xiaosheng Huang and Fang Zhang An Improved Ant Colony Algorithm for VRP Problem 129 Geng-Sheng Wang and Yun-Xin Yu A Robust EMD-Like Stegnographic Scheme 134 Xiaoming Yao, Wencai Du, Weihua Wu, Mei Huang, and Jimdong Fu SOM-Based Classification Method for Moving Object in Traffic Video 138 Jie Xia, Jian Wu, Yan-yan Cao, and Zhi-ming Cui The Study of Electrocardiograph Based on Radial Basis Function Neural Network 143 Guangying Yang and Yue Chen SAR Image Segmentation Based on SWT and Improved AFSA 146 Miao Ma, Jian-hui Liang, Li Sun, and Min Wang The Research of High Noise Image's Restoration and Recognition of Train's Plates 150 Xiangang Jiang, Dean Ma, and Longfeng Tao Property Preservation of Time Petri Net Reduction 154 ChuanliangXia and Zhendong Liu Regional Logistics System Bi-level Programming with Elastic Demand by Using Fuzzy C-means Clustering 160 Ming-bao Pang, Fang Dong, and Xin-ping Zhao A Strong Deviation Theorem Based on Laplace Transform on a Non-homogeneous Tree 165 Shaohua Jin, Chongguang Ding, Yongxue Wang, Yanmin Zhang, and Jie Lv Some Strong Limit Theorems for Hidden Markov Models Indexed by a Non-homogeneous Tree 169 Shaohua Jin, Yongxue Wang, Huitao Liu, Ying Tian, and Hui Li Dynamic Evolution Simulation of Corporate Governance Based on Swarm 173 Rong-jie Lv and Yu-hongAn Integrated Security Framework for Secure Web Services 178 Wenjun Zhang A Preferable Method on Digital Filter in ECG Signal's Processing Based onfpga 184 Nianqiang Li, Yongbing Wang, and Guoyi Zhao vii

5 A New Scheme on Multifunction Wireless Medical Surveillance System Based on FPGA 188 Nianqiang Li, Yongbing Wang, and Guoyi Zhao Research on Application of Region-of-Interest in Face Detection 192 Deng-feng Zhou, Shui-sheng Ye, and Shao-hua Hu A Study of Image-Based Algorithms of River Sediment Measurement 195 Bing Zhu, Xu-yan Zhou, Bin Tan, Xuan-ge Peng, andxue-mou Liu A Hybrid Model of RST and DST with its Application in Intrusion Detection 202 Qing Ye, Xiaoping Wu, Yongqing Liv, and Gaofeng Huang Detection of Aircraft In-flight Icing in Non-steady Atmosphere Using Artificial Neural Network 206 Sibin Ying and Jianliang Ai Two Sub-swarms Quantum-Behaved Particle Swarm Optimization Algorithm Based on Exchange Strategy 212 Zhihua Liu, Hui Sun, and Haizhi Hu A Quantifying Metric for Privacy Protection Based on Information Theory 216 Feng Gao, Jingsha He, Shufen Peng, andxu Wu A Cloud Model Inference System Based Alpha-Beta Filter for Tracking of Maneuvering Target 221 Huang Jianjun, Zhong Jiali, and Li Pengfei A PSO Based Array Shape Calibration Utilizing Cyclostationarity 226 Jianjun Huang ZigBee-based Vehicle Access Control System 232 RongZhou, Chunyue Zhao, LiliFu, Ao Chen, and Meiqian Ye The Design and Implementation of Electronic Farm System Based on Google Maps 236 Meiyu Zhang and Jinghua Mei A Method of Honey Plant Classification Based on IR Spectrum: Extract Feature Wavelength Using Genetic Algorithm and Classify Using Linear Discriminate Analysis 241 Yan Yang, Peng-Cheng Nie, and Yong He Classification Based on Particle Swarm Optimization for Least Square Support Vector Machines Training 246 Lin Yang andhui Ting Wang Automated Assessment System for Subjective Questions Based on LSI 250 Xinming Hu and Huosong Xia A Study of User Downloading Behavior in Mobile Internet Using Clickstream Data 255 Yanbin Liu and Ping Yuan Vehicle Edge Detection Based on Multi-structure Mathematical Morphology 258 Yanyan Cao, Hengjun Yue, Man Wu, Jianming Chen, and Zhiming Cui viii

6 Estimating Typhoon Rainfall over Sea from SSM/I Satellite Data Using a Back-Propagated Network 263 Wen-Huan Chine, Hsiao-Ping Wei, Keh-Chia Yeh, Li Chen, Gin-Rong Liu, and Chang-Hung Chiu Preparation and Piezomagnetic Effect of FeSiB Amorphous Powders /IIR Composite Film 268 Da-guo Jiang and Zhao-hui Liu Design and Implementation of ICAP-Client Based on Improved LRU Algorithm 271 Shi Lan, Shao Xia, and Zhao Ying Air Conditioning Load Prediction Based on DE-SVM Algorithm 276 Zhonghai Chen, Yong Sun, Guoli Yang, Tengfei Wit, Guizhu Li, and Longbiao Xin Comparative Study between the Magic Formula and the Neural Network Tire Model Based on Genetic Algorithm 280 Chen Long and Huang Chen The Security Issues of Scientific-Workflow Technique in Network Grid Computing 285 Feng Wang, Hid Deng, Wei Dai, Sheng Zheng, and Bo Liang A Historical Role-Based Fast Negotiation Model in Open Ding Hong and Zhao Yizhu Design and Application ofnew Topology of Transverse Flux Network 289 Permanent-Magnet Motor with Driving System 294 Huan Wang, Yi-kai Shi, Jian-kang Lu, andxiao-qing Yuan Emotion Recognition of Electromyography Based on Support Vector Machine 298 Guangying Yang and Shanxiao Yang A Test Platform for Evaluation of Web Service Composition Algorithm 302 Dong Li and Chun-Hui Yang A Trust Evaluation Model for Web Service Selection 306 Dong Li and Chun-Hui Yang DW 2.0-Oriented Metadata Evolution Management 311 Ding Pan The Application of Random Forest and Morphology Analysis to Fault Diagnosis on the Chain Box of Ships 315 Zhiyuan Yang and Qinming Tan Threshold Secret Sharing Based Trust Security in Structured P2P Network 320 Cai Biao, Li Zhishu, and Luo Zhen The Research of Privacy-Preserving Clustering Algorithm 324 Yanguang Shen, Junnii Han, and Huifang Shan An Improved Algorithm of Collision Detection in 2D Grapple Games 328 Kaiqiang Guo and Jiewu Xia ix

7 Game Theory Based View to the Quantum Key Distribution BB84 Protocol 332 Mahboobeh Houshmand, Monire Houshmand, andhabib Rajabi Mashhadi A New Method for Tracing by Using Corner Detecting and k-nearest Neighbor Zhang Yang, Gao Liqun, and Ye Shufan SPIHT Algorithm Combined with Huffman Encoding 341 Wei Li, Zhen Peng Pang, and Zhi Jie Liu Research on the Knowledge Flow in Supply Chain Based on the Core Enterprise 344 Liang Xu and Yuanyuan Sun Efficient Scheduling of Task Graphs to Multiprocessors Using a Combination of Modified Simulated Annealing and List Based Scheduling 350 Mahboobeh Houshmand, Elaheh Soleymanpour, Hossein Salami, Mahya Amerian, and Hossein Deldari A Noise Robust Endpoint Detection Algorithm for Whispered Speech Based on Empirical Mode Decomposition and Entropy 355 Xue-Dan Tan, He-Ming Zhao, Ji-Hua Gu, and Zhi Tao IRC Botnets' Homology Identifying Method Based on Improved LB_PAA Distance of Communication Characteristic Curves 360 Yan Jia, Runheng Li, Liang Gan, and Guangqiang Chen A Novel Measure of Diversity for Support Vector Machine Ensemble 366 Kai Li and Hongtao Gao An Improved Genetic Algorithm Based on Polygymy 371 Gu Min and Yang Feng 337 Reconstruction of Normal Speech from Whispered Speech Based on RBF Neural Network 374 Zhi Tao, Xue-Dan Tan, Tao Han, Ji-Hua Gu, Yi-Shen Xu, and He-Ming Zhao An NPT Watermarking Algorithm Using Wavelet Image Combination 378 Ji-Hua Git, Yun Shang, and Bei-jing Huang Modeling Document Summarization as Multi-objective Optimization 382 Lei Huang, Yanxiang He, Furu Wei, and Wenjie Li New Lattice-Based Public-Key Cryptosystem 387 Yali Jiang, XiulingJu, and Feng Shi A Route-Nearest Neighbor Algorithm for Large-Scale Vehicle Routing Problem 390 Ruhan He, Weibin Xu, Ying Wang, and Wei Zhan The Algorithm Study of Sensor Compensation in MWD Instrument Based on Genetic Elman Neural Network 394 Li-li Jit, Xhi-fang Wang, Sai Ma, and Chun-ming Wei X

8 Identification of Nutrition Elements in Orange Leaves by Laser Induced Breakdown Spectroscopy 398 Mingyin Yao, Mulma Liu, Jinhui Zhao, andlin Huang An Adaptive Fast Algorithm for Coding Block Mode Selection 402 Weixing Zhu, Yong Ma, and Rixia Wang The Analysis and Enhancement of Voting Behaviors in P2P Networks 407 Bowei Yang, Guanghua Song, and Yao Zheng Efficient Group Key Management Scheme in Wireless Sensor Networks 411 GuoruiLi, Ying Wang, and Jingsha He An Improved Key Management of ZigBee Protocol 416 Bing Zhang and Li Chen An Improved Method for Similar Handwritten Chinese Character Recognition 419 Fang Yang, Xue-Dong Tian, Xin Zhang, andxin-biao Jia Application of Clipboard Monitoring Technology in Graphic and Document Information Security Protection System 423 Shaobo Li, Shulin Lv, Xiaolmi Jia, and Zhisheng Shao Optimization of a Subset of Apple Features Based on Modified Particle Swarm Algorithm 427 Weixing Zhu, Dajun Hou, Jin Zhang, and Jian Zhang Automated Monitoring System of Pig Behavior Based on RFID and ARM-LINUX 431 Weixing Zhu, Fangkui Zhong, and Xiangping Li The Solution of Printing on University Human Management System 435 Wei Yang, Chen Guo, andxuan Ge Peng Research and Application of USB Filter Driver Based on Windows Kernel 438 Shaobo Li, Xiaohui Jia, Shulin Lv, and Zhisheng Shao The Feasible Control Lyapunov Function of Nonlinear Affine-Control Systems 442 XiaoDan Chen and ShaoBai Chen On the Upper Completeness of Quasi-metric Spaces 446 XiaoDan Chen and ShaoBai Chen P2PKMM: A Hybrid Clustering Algorithm over P2P Network 450 Zhong/un Deng, Wei Song, and Xuefeng Zheng The Modeling and Simulation of Negotiation Process for High-Tech Virtual Enterprise Based on UML and Petri Net 455 Changyuan Gao, Shuchen Zhang, andxiaoxing Zhang RFID System Security Using Identity-Based Cryptography 460 Youqin Chen, Zhide Chen, and Li Xu Intrusion Detection Model Based on Improved Support Vector Machine 465 Jingbo Yuan, Haixiao Li, Shunli Ding, andlimin Cao xi

9 Dynamic Replica Selection Using Improved Kernel Density Estimation 470 Yin Pang, Kan Li, Xin Sun, and Kaili Bu Design of Temperature Control System for a Special Shortwave Infrared Spatial Remote Sensor Based on FPGA 475 Zhipeng Xu, Qianting Zhou, and Jim Wei Associating IDS Alerts by an Improved Apriori Algorithm 478 Wang Taihua and Guo Fan Three-Dimensional Multiscale Texture Synthesis 483 Junyu Dong, Yuliang Wang, Yan Song, and Guanglin Cheng Aesthetic Evolution of Staged L-systems for Tiling Pattern Design 488 Yang Li and Chong-chong Zhao Study on the Convergence of Hybrid Ant Colony Algorithm for Job Shop Scheduling Problems 493 Xiaoyu Song and Lihua Sun Negotiation Problem Processing System of High-Tech Virtual Enterprise 498 Lili Zhai andfuguo Chang A Flexible Fuzzy Comprehensive Evaluation Method 502 Juan Chen A High Security Dynamic Secret Key Management Scheme for Wireless Sensor Networks 507 Lanying Li and Xin Wang An Efficient and Secure Key Establishment Scheme for Wireless Sensor Network 511 Eric Ke Wang and Yunming Ye A Focused Crawler Based on Naive Bayes Classifier 517 Wenxian Wang, Xingshu Chen, Yongbin Zou, Haizhou Wang, and Zongkun Dai Economic Grid Resource Scheduling Based on Utility Optimization 522 Juan Chen A Study on CRL Issue by P2P Network 526 Zhao Qiu, Mingrui Chen, and Jun Huang Design of Multi-mode E-commerce Recommendation System 530 Zhao Qiu, Mingrui Chen, and Jun Huang 4-Step Face Authentication Algorithm Based on SVM 534 Fang-jun Luan, Lan Lin, and Yong-hui Wang A Security Architecture for Intranet Based on Security Area Division 539 Gao Fuxiang, Li Sha, Wang Xiaolu, and Yao Lan Attack Simulation and Signature Extraction of Low-Rate DoS 544 Zenghui Liu andliguo Guan Research on the Directional Interferences Canceling 549 Bin Zhang xii

10 An Ontology for Vulnerability Lifecycle 553 Ratsameetip Wila, Nattanatch Jiamnapanon, and Yunyong Teng-anvmay A Prototype System of Software Reliability Jintao Zeng, Jinzhong Li, Xiaohui Zeng, and WenlangLuo Prediction and Estimation 558 How to Construct a Divisible Online/Offline Signature 562 Yilian Zhang, Zhide Chen, and LiXu Mining Maximal Patterns Based on Improved FP-tree and Array Technique 567 Hua-jin Wang and Chun-an Hu Research on Active Controllable Defense Model Based on Zero-PDR Model 572 Kehe Wu, Tong Zhang, and Fei Chen Optimization Design of Supervising and Controlling on the SOFC Integration System 576 Suying Yang, Meng Wang, Jianying Lin, and Kuijun Meng A Visual Domain Recognition Method Based on Function Mode for Source Code Plagiarism 580 Suying Yang andxin Wang A Multi-mode P2P Live Media Broadcasting Middleware 585 Yin Zhou and Wei Zhu Automatic Summarization for Chinese Text Based on Combined Words Recognition and Paragraph Clustering 591 Chang-jin Jiang, Hong Peng, Qian-li Ma, and Jian-chao Chen The Design and Implementation of Host-Based Intrusion Detection System 595 Ying Lin, Yan Zhang, and Yang-jia Ou An Improved Pattern Matching Algorithm 599 Jingbo Yuan, Jisen Zheng, and Shunli Ding Autonomy-Oriented, Self-Equilibrium Routing Model in Traffic Networks 604 Chunyan Yu, Dong)>i Ye, Xiaosheng He, and Mmghui Wu A New Agent Oriented Model for AutoMotive Computing Platform 609 Chunyan Yu, Dongyi Ye, and Minghui Wu Mediated Hierarchical Identity-Based Combined Public Key Schemes 614 Pingjian Wang, Jingqiang Lin, Jiwu Jing, and Yongquan Xie IIS Security Mechanisms 619 Ping Zhang, Yan Zhang, Zhengjiang Wu, and Weifeng Du The Research on Two Important Counter-Examples of Four-Color Problem 623 Jinbiao Wang and Shu Qin Characteristics of Network Non-optimum and Extensionality Security Mode 627 Teng Ping and He Ping Electronic Commerce Technology and its Security Xinqiang Ma and Youyuan Liu Problems 631 xiii

11 An Implementation of Object-Based Storage System Access Control Based on IBE 635 Junjicm Chen, Dan Feng, and JingningLiu Cascaded SVMs in Pattern Classification for Time-Sensitive Separating 640 Ruihu Wang, Bin Fang, Zhangping Hu, Liang Chen, and Weihua Wang The Detecting Methods of Geostationary Orbit Objects 645 Min Wei, HaiNing Chen, TianYun Yan, QinZhang Wu, andbin Xu Research on the Key Technology of Secure Computer Forensics 649 Yan Zhang and Ying Lin The Method of Early Real-Time Fault Diagnosis for Technical Process Based on Neural Network 653 Yingjun Guo, Lihua Sun, and Haichao Ran Overcoming Disadvantages by Making Full Use of Extrinsic Objects: Advancing Information Resource Construction by ISA 658 Zhonghua Deng and Ying Wu Efficient Modeling of Spam Images 663 Qiao Liu, Zhiguang Qin, Hongrong Cheng, andmingcheng Wan Mobile Intelligence Sharing Based on Agents in Mobile Peer-to-Peer Environment 667 Ye Liang A Novel Real-Time Face Tracking Algorithm for Detection of Driver Fatigue 671 Qiufen Yangon, Weihua Gui, and Huosheng Hu Research on High Performance RFID Code Resolving Technology 677 Huifang Deng and Haiyan Kang An Improved Task Scheduling Algorithm in Embedded Systems 682 Xiong Yumei and Chen Yimin Product Feature Extraction with a Combined Approach 686 Zhixing Li An Algorithm of Webpage Information Hiding Based on Class Selectors 691 Guang Sun An Improved Particle Swarm Optimization Algorithm with Synthetic Update Mechanism 695 Fei Li Study of Privacy Preserving Data Mining 700 Haisheng Li Model of CSR in Chinese Medicine E-commerce Finn: Strategic Management Perspective 704 Jian Li and Wengeng Shi Modeling and Simulating of Ecological Community in Digital Creative Industry 708 Xiaojun Ma, Sa Li, and Weihui Dai xiv

12 Modeling and Simulation of Double-tube Hydraulic Damper External Characteristic 713 Changcheng Zhou and Jie Meng Research on a High Efficient Intrusion Prevention Model 720 Xiao-hiii Zeng, Wen-lang Luo, Jin-iao Zeng, Yan-ping Chen, and Shi-yao Jin Application of Data Mining for Decision Tree Model of Multi-variety Discrete Production and Manufacture 724 Jianfang Sun A Multiple Population Genetic Algorithm and its Application in Fuzzy Controller 729 Yukang Tian and Huy Quan Vu Knowledge Mining for Intelligent Decision Making in Small and Middle Business 734 Huamin Li, Xingsen Li, and Zhengxiang Zhu A New Method of Sea-Sky-Line Detection 740 Chunliang Jiang, Hanhong Jiang, Chaoliang Zhang, and Jie Wang Modeling and Dynamic Simulation of Electric Power Steering System of Automobile Using Bond Graph Technique 744 Lin-an Wang, QiangLi, and Xiao-juan Liang Design and Implementation of Quantum Factorization Algorithm 748 Xiangqun Fu, Wansu Bao, and Chun Zhou A Medium Field Multivariate Public Key Signature Scheme with External Perturbation 753 Li Tian and Wansu Bao Towards a Theory of Cloud Computing in the Protocol-Composition Framework 758 Huafei Zhu Research on Logistics System Architecture Based on SOA 763 Xin Yu and Zhiguang Wei The Construction and Test for a Small Beowulf Parallel Computing System 767 Wen-lang Luo, An-dong Xie, and Wen Ruan Research of Image Acquisition Device for River Sediment 771 Xuange Peng, YingXiao, and Bing Zhu A Collaborative Filtering Algorithm Based on Time Period Partition 777 Yuchuan Zhang and Yuzhao Liu A Blind Watermark Algorithm for Color Image Based on Dual Scrambling Technique 781 Hongqin Shi and Fangliang Lv Artificial Neural Network Method for the Analysis of 1-D Defected Ground Structure 786 Shan Wang, Yang Jiang, Minghua Gao, Chuanyun Wang, andhaiwen Liu XV

13 Volume Rendering Effect Analysis with Image Preprocessing Technology Based on Three Dimension Anisotropic Diffusion 789 Xiangang Jiang, Lunlun Xu, and Dean Ma An Intelligent Security Defensive Software Scheme and Realization 793 Kim Wang, Jin-dong Wang, Liu-qing Shen, and Zhen-hua Han Author Index 797 xvi

Workshop on Internet and BigData Finance (WIBF)

Workshop on Internet and BigData Finance (WIBF) Workshop on Internet and BigData Finance (WIBF) Central University of Finance and Economics June 11-12, 2015 In a 2013 study, IBM found that 71 percent of the banking and financial firms report that the

More information

Capability Service Management System for Manufacturing Equipments in

Capability Service Management System for Manufacturing Equipments in Capability Service Management System for Manufacturing Equipments in Cloud Manufacturing 1 Junwei Yan, 2 Sijin Xin, 3 Quan Liu, 4 Wenjun Xu *1, Corresponding Author School of Information Engineering, Wuhan

More information

Information Security Practice and Experience

Information Security Practice and Experience Kefei Chen Robert Deng Xuejia Lai Jianying Zhou (Eds.) Information Security Practice and Experience Second International Conference, ISPEC 2006 Hangzhou, China, April 11-14, 2006 Proceedings } Spri nger

More information

Program 2014 Tsinghua-Sanya Workshop on Big Data: Opportunities, Challenges and Innovations Dec. 27 Dec. 30, 2014 Sanya, China

Program 2014 Tsinghua-Sanya Workshop on Big Data: Opportunities, Challenges and Innovations Dec. 27 Dec. 30, 2014 Sanya, China Program 2014 Tsinghua-Sanya Workshop on Big Data: Opportunities, Challenges and Innovations Dec. 27 Dec. 30, 2014 Sanya, China Dec 27, Saturday 09:00 am - 09:30 am Opening Ceremony 09:30 am - 10:20 am

More information

Modeling Risk Management in Sustainable Construction

Modeling Risk Management in Sustainable Construction Desheng Dash Wu Editor Modeling Risk Management in Sustainable Construction 4^ Springer Contents Part I Enterprise Risk Management in Supply Chains An Improved Approach for Supplier Selection in Project

More information

Open Access Research on Database Massive Data Processing and Mining Method based on Hadoop Cloud Platform

Open Access Research on Database Massive Data Processing and Mining Method based on Hadoop Cloud Platform Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2014, 6, 1463-1467 1463 Open Access Research on Database Massive Data Processing and Mining Method

More information

Research on the UHF RFID Channel Coding Technology based on Simulink

Research on the UHF RFID Channel Coding Technology based on Simulink Vol. 6, No. 7, 015 Research on the UHF RFID Channel Coding Technology based on Simulink Changzhi Wang Shanghai 0160, China Zhicai Shi* Shanghai 0160, China Dai Jian Shanghai 0160, China Li Meng Shanghai

More information

A New Method for Traffic Forecasting Based on the Data Mining Technology with Artificial Intelligent Algorithms

A New Method for Traffic Forecasting Based on the Data Mining Technology with Artificial Intelligent Algorithms Research Journal of Applied Sciences, Engineering and Technology 5(12): 3417-3422, 213 ISSN: 24-7459; e-issn: 24-7467 Maxwell Scientific Organization, 213 Submitted: October 17, 212 Accepted: November

More information

Design call center management system of e-commerce based on BP neural network and multifractal

Design call center management system of e-commerce based on BP neural network and multifractal Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(6):951-956 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Design call center management system of e-commerce

More information

A Network Simulation Experiment of WAN Based on OPNET

A Network Simulation Experiment of WAN Based on OPNET A Network Simulation Experiment of WAN Based on OPNET 1 Yao Lin, 2 Zhang Bo, 3 Liu Puyu 1, Modern Education Technology Center, Liaoning Medical University, Jinzhou, Liaoning, China,yaolin111@sina.com *2

More information

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW 1 XINQIN GAO, 2 MINGSHUN YANG, 3 YONG LIU, 4 XIAOLI HOU School of Mechanical and Precision Instrument Engineering, Xi'an University

More information

The Study on Logistics Management Patterns based on Fuzzy Comprehensive Evaluation Method

The Study on Logistics Management Patterns based on Fuzzy Comprehensive Evaluation Method The Study on Logistics Management Patterns based on Fuzzy Comprehensive Evaluation Method School of Management Shanghai University, Shanghai Baoshan 200072 School of Foreign Yiwu Industrial & Commercial

More information

CAO Jiming Professor

CAO Jiming Professor CAO Jiming Professor PhD Advisor Position: ViceDirector,LargeComplex Project Management Institute Department: Department of Construction Management and Real Estate Email: caojm@tongji.edu.cn Office Phone:

More information

Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup

Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor

More information

1 Study of City-Level Management System of Air-Conditioning... 3. 2 Information System Scm Rationality in the Decision Making... 9

1 Study of City-Level Management System of Air-Conditioning... 3. 2 Information System Scm Rationality in the Decision Making... 9 Contents Part I Web, Engineering and Applications 1 Study of City-Level Management System of Air-Conditioning... 3 Junwei Yan, Haihang Xu, Haijie Lin and Lei Zhong 2 Information System Scm Rationality

More information

Study on Secure File Transfer Scheme on ARM9-based Security

Study on Secure File Transfer Scheme on ARM9-based Security Study on Secure File Transfer Scheme on ARM9-based Security Authentication Platform * (School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, 411201) * Email:idlink@163.com

More information

Metaheuristics in Big Data: An Approach to Railway Engineering

Metaheuristics in Big Data: An Approach to Railway Engineering Metaheuristics in Big Data: An Approach to Railway Engineering Silvia Galván Núñez 1,2, and Prof. Nii Attoh-Okine 1,3 1 Department of Civil and Environmental Engineering University of Delaware, Newark,

More information

Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1388-1392. Research Article. E-commerce recommendation system on cloud computing

Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1388-1392. Research Article. E-commerce recommendation system on cloud computing Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1388-1392 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 E-commerce recommendation system on cloud computing

More information

Genetic Algorithm Based Interconnection Network Topology Optimization Analysis

Genetic Algorithm Based Interconnection Network Topology Optimization Analysis Genetic Algorithm Based Interconnection Network Topology Optimization Analysis 1 WANG Peng, 2 Wang XueFei, 3 Wu YaMing 1,3 College of Information Engineering, Suihua University, Suihua Heilongjiang, 152061

More information

A Dynamic Approach to Extract Texts and Captions from Videos

A Dynamic Approach to Extract Texts and Captions from Videos Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

Appendix 1: Search strategies for randomized controlled trials on Chinese herbal medicine for symptom management in cancer palliative care

Appendix 1: Search strategies for randomized controlled trials on Chinese herbal medicine for symptom management in cancer palliative care Appendix 1: Search strategies for randomized controlled trials on Chinese herbal medicine for symptom management in cancer palliative care i) The Cochrane Central Register of Controlled Trials (CENTRAL)

More information

Optimization of PID parameters with an improved simplex PSO

Optimization of PID parameters with an improved simplex PSO Li et al. Journal of Inequalities and Applications (2015) 2015:325 DOI 10.1186/s13660-015-0785-2 R E S E A R C H Open Access Optimization of PID parameters with an improved simplex PSO Ji-min Li 1, Yeong-Cheng

More information

Database Modeling and Visualization Simulation technology Based on Java3D Hongxia Liu

Database Modeling and Visualization Simulation technology Based on Java3D Hongxia Liu International Conference on Information Sciences, Machinery, Materials and Energy (ICISMME 05) Database Modeling and Visualization Simulation technology Based on Java3D Hongxia Liu Department of Electronic

More information

Development of a Web-based Information Service Platform for Protected Crop Pests

Development of a Web-based Information Service Platform for Protected Crop Pests Development of a Web-based Information Service Platform for Protected Crop Pests Chong Huang 1, Haiguang Wang 1 1 Department of Plant Pathology, China Agricultural University, Beijing, P. R. China 100193

More information

en fi lm af Zhang Yang instruktøren bag den kinesiske fi lmperle Badeanstalten Premiere 31. oktober

en fi lm af Zhang Yang instruktøren bag den kinesiske fi lmperle Badeanstalten Premiere 31. oktober produced by Harvey Wong, Liu Qiang producer Stanley Tong co-producer Michael J. Werner, Wouter Barendrecht producer Er Yong, Zhang Yang screenplay by Zhang Yang, Wang Yao director Zhang Yang Line producer

More information

Method of Fault Detection in Cloud Computing Systems

Method of Fault Detection in Cloud Computing Systems , pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,

More information

Demand Forecasting Optimization in Supply Chain

Demand Forecasting Optimization in Supply Chain 2011 International Conference on Information Management and Engineering (ICIME 2011) IPCSIT vol. 52 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V52.12 Demand Forecasting Optimization

More information

Master of Science in Computer Science

Master of Science in Computer Science Master of Science in Computer Science Background/Rationale The MSCS program aims to provide both breadth and depth of knowledge in the concepts and techniques related to the theory, design, implementation,

More information

Analysis of China Motor Vehicle Insurance Business Trends

Analysis of China Motor Vehicle Insurance Business Trends Analysis of China Motor Vehicle Insurance Business Trends 1 Xiaohui WU, 2 Zheng Zhang, 3 Lei Liu, 4 Lanlan Zhang 1, First Autho University of International Business and Economic, Beijing, wuxiaohui@iachina.cn

More information

Identifying Peer-to-Peer Traffic Based on Traffic Characteristics

Identifying Peer-to-Peer Traffic Based on Traffic Characteristics Identifying Peer-to-Peer Traffic Based on Traffic Characteristics Prof S. R. Patil Dept. of Computer Engineering SIT, Savitribai Phule Pune University Lonavala, India srp.sit@sinhgad.edu Suraj Sanjay Dangat

More information

2014 Second International Conference on Advanced Cloud and Big Data

2014 Second International Conference on Advanced Cloud and Big Data 2014 Second International Conference on Advanced Cloud and Big Data (CBD 2014) Huangshan, China 20-22 November 2014 IEEE Catalog Number: ISBN: CFP1403Y-POD 978-1-4799-8067-3 2014 Second International Conference

More information

A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique

A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique Aida Parbaleh 1, Dr. Heirsh Soltanpanah 2* 1 Department of Computer Engineering, Islamic Azad University, Sanandaj

More information

A Cloud Computing-Based ERP System under The Cloud Manufacturing

A Cloud Computing-Based ERP System under The Cloud Manufacturing A Cloud Computing-Based ERP System under The Cloud Manufacturing Environment 1 Nan Yang, 2 Dongbo Li, 3 Yifei Tong 1, First Author Department of Industry Engineering,Nanjing University of Science and Technology,Nanjing210094,People

More information

Automatic Mining of Internet Translation Reference Knowledge Based on Multiple Search Engines

Automatic Mining of Internet Translation Reference Knowledge Based on Multiple Search Engines , 22-24 October, 2014, San Francisco, USA Automatic Mining of Internet Translation Reference Knowledge Based on Multiple Search Engines Baosheng Yin, Wei Wang, Ruixue Lu, Yang Yang Abstract With the increasing

More information

The 2014-2016 Board of Directors

The 2014-2016 Board of Directors The 2014-2016 Board of Directors President Yang, Honggang, Ph.D. 杨 红 钢 Dean, School of Humanities and Social Sciences Nova Southeastern University yangh@nova.edu Vice President Chen, Jie, Ph.D. 陈 捷 Dean,

More information

The multilayer sentiment analysis model based on Random forest Wei Liu1, Jie Zhang2

The multilayer sentiment analysis model based on Random forest Wei Liu1, Jie Zhang2 2nd International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2016) The multilayer sentiment analysis model based on Random forest Wei Liu1, Jie Zhang2 1 School of

More information

Network traffic monitoring system design based on the unconstrained

Network traffic monitoring system design based on the unconstrained Networ traffic monitoring system design based on the unconstrained clustering queuing School of Telecommunications and Information Engineering, Xi'an University of Posts & Telecommunications, Xi an Shaanxi,

More information

Research on Trust Management Strategies in Cloud Computing Environment

Research on Trust Management Strategies in Cloud Computing Environment Journal of Computational Information Systems 8: 4 (2012) 1757 1763 Available at http://www.jofcis.com Research on Trust Management Strategies in Cloud Computing Environment Wenjuan LI 1,2,, Lingdi PING

More information

Development of cloud computing system based on wireless sensor network protocol and routing

Development of cloud computing system based on wireless sensor network protocol and routing Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 204, 6(7):680-684 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Development of cloud computing system based on wireless

More information

A Health Degree Evaluation Algorithm for Equipment Based on Fuzzy Sets and the Improved SVM

A Health Degree Evaluation Algorithm for Equipment Based on Fuzzy Sets and the Improved SVM Journal of Computational Information Systems 10: 17 (2014) 7629 7635 Available at http://www.jofcis.com A Health Degree Evaluation Algorithm for Equipment Based on Fuzzy Sets and the Improved SVM Tian

More information

RESEARCH INTERESTS Modeling and Simulation, Complex Systems, Biofabrication, Bioinformatics

RESEARCH INTERESTS Modeling and Simulation, Complex Systems, Biofabrication, Bioinformatics FENG GU Assistant Professor of Computer Science College of Staten Island, City University of New York 2800 Victory Boulevard, Staten Island, NY 10314 Doctoral Faculty of Computer Science Graduate Center

More information

The Security Evaluation of ATM Information System Based on Bayesian Regularization

The Security Evaluation of ATM Information System Based on Bayesian Regularization JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014 1587 The Security Evaluation of ATM Information System Based on Bayesian Regularization Lan Ma School of Air Traffic Management, Civil Aviation University

More information

International Conference on Education, Management and Computing Technology

International Conference on Education, Management and Computing Technology International Conference on Education, Management and Computing Technology (ICEMCT 2014) Advances in Intelligent Systems Research Volume 100 Tianjin, China 14-15 June 2014 ISBN: 978-1-63439-016-3 Printed

More information

The Combination Forecasting Model of Auto Sales Based on Seasonal Index and RBF Neural Network

The Combination Forecasting Model of Auto Sales Based on Seasonal Index and RBF Neural Network , pp.67-76 http://dx.doi.org/10.14257/ijdta.2016.9.1.06 The Combination Forecasting Model of Auto Sales Based on Seasonal Index and RBF Neural Network Lihua Yang and Baolin Li* School of Economics and

More information

One Map Database and Its Importance

One Map Database and Its Importance Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Journal, 2015, 9, 105-109 105 Open Access Study on One Map Organizational Model for Land Resources Data Used in Supervision

More information

Introduction. Research methodology

Introduction. Research methodology A Primary Study of the Size in Working Area of Librarians Ko-Li Chen Associate Professor, Department of Architecture, Tunghai University Li -Wen Pan Library Clerk, Nan-Kai Institute of Technology Introduction

More information

Flexible Configuration Mechanism of Control and Data Management

Flexible Configuration Mechanism of Control and Data Management Flexible Configuration Mechanism of Control and Data Management In a Process Monitor System 1 LI Wei, 2 XU Qiang, 3 ZHANG Li 1, College of Information Science & Engineering Chongqing Jiaotong University,

More information

SU Qiang Professor ---------------------------------------------------------------------------------------------------------------------------------

SU Qiang Professor --------------------------------------------------------------------------------------------------------------------------------- SU Qiang Professor PhD Advisor Department: Department of Management Science and Engineering Email: suq@tongji.edu.cn Office Phone: +86-21-65981443 ---------------------------------------------------------------------------------------------------------------------------------

More information

Kaiquan Xu, Associate Professor, Nanjing University. Kaiquan Xu

Kaiquan Xu, Associate Professor, Nanjing University. Kaiquan Xu Kaiquan Xu Marketing & ebusiness Department, Business School, Nanjing University Email: xukaiquan@nju.edu.cn Tel: +86-25-83592129 Employment Associate Professor, Marketing & ebusiness Department, Nanjing

More information

Study on IOT based Architecture of Logistics Service Supply Chain

Study on IOT based Architecture of Logistics Service Supply Chain , pp.169-178 http://dx.doi.org/10.14257/ijgdc.2014.7.1.15 Study on IOT based Architecture of Logistics Service Supply Chain Wei Liu and Zhijun Gao College of Transport and Communications, Shanghai Maritime

More information

An Introduction to Data Mining

An Introduction to Data Mining An Introduction to Intel Beijing wei.heng@intel.com January 17, 2014 Outline 1 DW Overview What is Notable Application of Conference, Software and Applications Major Process in 2 Major Tasks in Detail

More information

ISBJ Special Issue Conference on Exploring Entrepreneurial Activity and Small Business Issues in the Chinese Economy

ISBJ Special Issue Conference on Exploring Entrepreneurial Activity and Small Business Issues in the Chinese Economy ISBJ Special Issue Conference on Exploring Entrepreneurial Activity and Small Business Issues in the Chinese Economy 25-26 August 2012 China Development and Research Centre, Durham Business School, Durham

More information

Study on Tacit Knowledge Identification of Independent Documentary Film Directors

Study on Tacit Knowledge Identification of Independent Documentary Film Directors Study on Tacit Knowledge Identification of Independent Documentary Film Directors Ming-Shu Yuan Associate Professor Graduate Program and Department of Information and Communications Shih Hsin University

More information

Technical Program 研 讨 会 程 序 手 册

Technical Program 研 讨 会 程 序 手 册 Technical Program 研 讨 会 程 序 手 册 The International Workshop on Information Technology for Chinese Medicine (ITCM2011) 2011 国 际 中 医 信 息 学 研 讨 会 In Conjunction with IEEE-BIBM2011 ( 与 IEEE-BIBM2011 共 同 举 行

More information

Zhejiang University SPIE Student Chapter Annual Report September 2014

Zhejiang University SPIE Student Chapter Annual Report September 2014 Zhejiang University SPIE Student Chapter Annual Report September 2014 2014 Chapter Officers President: Kai Hu Vice President: Lingchen Huang Secretary: Yingchen Wu Treasurer: Jinyang Liu Advisor: Prof.

More information

Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model WangLinjing1, ZhangHan2

Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model WangLinjing1, ZhangHan2 3rd International Conference on Machinery, Materials and Information Technology Applications (ICMMITA 2015) Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model

More information

The Visualization Simulation of Remote-Sensing Satellite System

The Visualization Simulation of Remote-Sensing Satellite System The Visualization Simulation of Remote-Sensing Satellite System Deng Fei, Chu YanLai, Zhang Peng, Feng Chen, Liang JingYong School of Geodesy and Geomatics, Wuhan University, 129 Luoyu Road, Wuhan 430079,

More information

ASEM Seminar on Capacity Building on Air Pollution Prevention and Control LIST OF PARTICIPANTS

ASEM Seminar on Capacity Building on Air Pollution Prevention and Control LIST OF PARTICIPANTS ASEM Seminar on Capacity Building on Air Pollution Prevention and Control co-sponsored by China, Singapore and Switzerland Beijing, China, October 22-23, 2013 LIST OF PARTICIPANTS Australia 1. Brunei 2.

More information

life science data mining

life science data mining life science data mining - '.)'-. < } ti» (>.:>,u» c ~'editors Stephen Wong Harvard Medical School, USA Chung-Sheng Li /BM Thomas J Watson Research Center World Scientific NEW JERSEY LONDON SINGAPORE.

More information

Modeling and Prediction of Network Traffic Based on Hybrid Covariance Function Gaussian Regressive

Modeling and Prediction of Network Traffic Based on Hybrid Covariance Function Gaussian Regressive Journal of Information & Computational Science 12:9 (215) 3637 3646 June 1, 215 Available at http://www.joics.com Modeling and Prediction of Network Traffic Based on Hybrid Covariance Function Gaussian

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014 RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer

More information

Proceedings of the 7 th Euro-Asia Conference on Environment and CSR: Tourism, MICE, Hospitality Management and Education Session (Part I)

Proceedings of the 7 th Euro-Asia Conference on Environment and CSR: Tourism, MICE, Hospitality Management and Education Session (Part I) Proceedings of the 7 th Euro-Asia Conference on Environment and CSR: Tourism, MICE, Hospitality Management and Education Session (Part I) Yanling Zhang (Ed.) Proceedings of the 7 th Euro-Asia Conference

More information

Internet of Things for Smart Crime Detection

Internet of Things for Smart Crime Detection Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 749-754 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4685 Internet of Things for Smart Crime Detection Jeong-Yong Byun, Aziz

More information

Hybrid Algorithm using the advantage of ACO and Cuckoo Search for Job Scheduling

Hybrid Algorithm using the advantage of ACO and Cuckoo Search for Job Scheduling Hybrid Algorithm using the advantage of ACO and Cuckoo Search for Job Scheduling R.G. Babukartik 1, P. Dhavachelvan 1 1 Department of Computer Science, Pondicherry University, Pondicherry, India {r.g.babukarthik,

More information

Research on the Performance Optimization of Hadoop in Big Data Environment

Research on the Performance Optimization of Hadoop in Big Data Environment Vol.8, No.5 (015), pp.93-304 http://dx.doi.org/10.1457/idta.015.8.5.6 Research on the Performance Optimization of Hadoop in Big Data Environment Jia Min-Zheng Department of Information Engineering, Beiing

More information

[Chinese Learning Mentor Service]

[Chinese Learning Mentor Service] Computing Information Sciences 1. Xinyu Hu Game and Entertainment Systems Computer Programming for Engineering Applications Engineering Applications Object Orientated Programming (TA) Programming I (TA)

More information

Study on Human Performance Reliability in Green Construction Engineering

Study on Human Performance Reliability in Green Construction Engineering Study on Human Performance Reliability in Green Construction Engineering Xiaoping Bai a, Cheng Qian b School of management, Xi an University of Architecture and Technology, Xi an 710055, China a xxpp8899@126.com,

More information

Lecture Notes in Electrical Engineering Volume 112

Lecture Notes in Electrical Engineering Volume 112 Lecture Notes in Electrical Engineering Volume 112 Liangchi Zhang and Chunliang Zhang (Eds.) Engineering Education and Management Vol 2, Results of the 2011 International Conference on Engineering Education

More information

Product data model for PLM system

Product data model for PLM system roduct data model for LM system Li Yumei, Wan Li, Xiong Tifan (National CAD Support Software Engineering Research Center, Huazhong University of Science and Technology, Wuhan 430074) Abstract: roduct lifecycle

More information

A STUDY ON THE NARRATOR S VOICE IN THE CHINESE TRANSLATION OF A ROOM OF ONE S OWN (1929) LAW TSZ SANG

A STUDY ON THE NARRATOR S VOICE IN THE CHINESE TRANSLATION OF A ROOM OF ONE S OWN (1929) LAW TSZ SANG A STUDY ON THE NARRATOR S VOICE IN THE CHINESE TRANSLATION OF A ROOM OF ONE S OWN (1929) by LAW TSZ SANG A dissertation submitted to the School of Humanities of the University of Birmingham in partial

More information

The Commons China Law and Business Mission

The Commons China Law and Business Mission The Commons China Law and Business Mission - in association with the China Law Society - Sunday, 15 November to Saturday, 21 November 2015 Early Bird Fee: $5545 CDN + applicable taxes [till 9 October 2015]

More information

Design of Electronic Medical Record System Based on Cloud Computing Technology

Design of Electronic Medical Record System Based on Cloud Computing Technology TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.5, May 2014, pp. 4010 ~ 4017 DOI: http://dx.doi.org/10.11591/telkomnika.v12i5.4392 4010 Design of Electronic Medical Record System Based

More information

Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network

Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network Qian Wu, Yahui Wang, Long Zhang and Li Shen Abstract Building electrical system fault diagnosis is the

More information

A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique

A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique Jyoti Malhotra 1,Priya Ghyare 2 Associate Professor, Dept. of Information Technology, MIT College of

More information

The Compound Operations of Uncertain Cloud Concepts

The Compound Operations of Uncertain Cloud Concepts Journal of Computational Information Systems 11: 13 (2015) 4881 4888 Available at http://www.jofcis.com The Compound Operations of Uncertain Cloud Concepts Longjun YIN 1,, Junjie XU 1, Guansheng ZHANG

More information

Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing

Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing www.ijcsi.org 579 Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing Zhang Ming 1, Hu Chunyang 2 1 Department of Teaching and Practicing, Guilin University of Electronic Technology

More information

Random forest algorithm in big data environment

Random forest algorithm in big data environment Random forest algorithm in big data environment Yingchun Liu * School of Economics and Management, Beihang University, Beijing 100191, China Received 1 September 2014, www.cmnt.lv Abstract Random forest

More information

EFFICIENT DATA PRE-PROCESSING FOR DATA MINING

EFFICIENT DATA PRE-PROCESSING FOR DATA MINING EFFICIENT DATA PRE-PROCESSING FOR DATA MINING USING NEURAL NETWORKS JothiKumar.R 1, Sivabalan.R.V 2 1 Research scholar, Noorul Islam University, Nagercoil, India Assistant Professor, Adhiparasakthi College

More information

Data Security Strategy Based on Artificial Immune Algorithm for Cloud Computing

Data Security Strategy Based on Artificial Immune Algorithm for Cloud Computing Appl. Math. Inf. Sci. 7, No. 1L, 149-153 (2013) 149 Applied Mathematics & Information Sciences An International Journal Data Security Strategy Based on Artificial Immune Algorithm for Cloud Computing Chen

More information

01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours.

01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours. (International Program) 01219141 Object-Oriented Modeling and Programming 3 (3-0) Object concepts, object-oriented design and analysis, object-oriented analysis relating to developing conceptual models

More information

Data Mining: Concepts and Techniques. Jiawei Han. Micheline Kamber. Simon Fräser University К MORGAN KAUFMANN PUBLISHERS. AN IMPRINT OF Elsevier

Data Mining: Concepts and Techniques. Jiawei Han. Micheline Kamber. Simon Fräser University К MORGAN KAUFMANN PUBLISHERS. AN IMPRINT OF Elsevier Data Mining: Concepts and Techniques Jiawei Han Micheline Kamber Simon Fräser University К MORGAN KAUFMANN PUBLISHERS AN IMPRINT OF Elsevier Contents Foreword Preface xix vii Chapter I Introduction I I.

More information

Is a Data Scientist the New Quant? Stuart Kozola MathWorks

Is a Data Scientist the New Quant? Stuart Kozola MathWorks Is a Data Scientist the New Quant? Stuart Kozola MathWorks 2015 The MathWorks, Inc. 1 Facts or information used usually to calculate, analyze, or plan something Information that is produced or stored by

More information

Discrete Hidden Markov Model Training Based on Variable Length Particle Swarm Optimization Algorithm

Discrete Hidden Markov Model Training Based on Variable Length Particle Swarm Optimization Algorithm Discrete Hidden Markov Model Training Based on Variable Length Discrete Hidden Markov Model Training Based on Variable Length 12 Xiaobin Li, 1Jiansheng Qian, 1Zhikai Zhao School of Computer Science and

More information

Fourth SIGHAN Workshop on Chinese Language Processing

Fourth SIGHAN Workshop on Chinese Language Processing Fourth SIGHAN Workshop on Chinese Language Processing (IJCNLP 2005) Jeju Island, Korea 14-15 October 2005 ISBN: 978-1-62748-367-4 Printed from e-media with permission by: Curran Associates, Inc. 57 Morehouse

More information

Research of the Combination of Distributed Business Processes Based on Dynamic Planning

Research of the Combination of Distributed Business Processes Based on Dynamic Planning , pp.257-266 http://dx.doi.org/10.14257/ijunesst.2015.8.6.25 Research of the Combination of Distributed Business Processes Based on Dynamic Planning Yuan Gang, Sun Rui-zhi and Shi Yin-xue Key laboratory

More information

Blog Post Extraction Using Title Finding

Blog Post Extraction Using Title Finding Blog Post Extraction Using Title Finding Linhai Song 1, 2, Xueqi Cheng 1, Yan Guo 1, Bo Wu 1, 2, Yu Wang 1, 2 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing 2 Graduate School

More information

QoS EVALUATION OF CLOUD SERVICE ARCHITECTURE BASED ON ANP

QoS EVALUATION OF CLOUD SERVICE ARCHITECTURE BASED ON ANP QoS EVALUATION OF CLOUD SERVICE ARCHITECTURE BASED ON ANP Mingzhe Wang School of Automation Huazhong University of Science and Technology Wuhan 430074, P.R.China E-mail: mingzhew@gmail.com Yu Liu School

More information

Ecosystem of Trust Among Organizations and Service Providers by Delivering Cloud-based Security and Compliance Services RSA Establishes Cloud Trust

Ecosystem of Trust Among Organizations and Service Providers by Delivering Cloud-based Security and Compliance Services RSA Establishes Cloud Trust 85 REFERENCES Abbadi, I. M., & Martin, A. (2011). Trust in the Cloud. Information Security Technical Report, 1-7. Elsevier Ltd. doi: 10.1016/j.istr.2011.08.006. Ahmed, M., & Ali, S. (2010). Above the Trust

More information

IEEE Projects in Embedded Sys VLSI DSP DIP Inst MATLAB Electrical Android

IEEE Projects in Embedded Sys VLSI DSP DIP Inst MATLAB Electrical Android About Us : We at Ensemble specialize in electronic design and manufacturing services for various industrial segments. We also offer student project guidance and training for final year projects in departments

More information

Knowledge Acquisition Approach Based on Rough Set in Online Aided Decision System for Food Processing Quality and Safety

Knowledge Acquisition Approach Based on Rough Set in Online Aided Decision System for Food Processing Quality and Safety , pp. 381-388 http://dx.doi.org/10.14257/ijunesst.2014.7.6.33 Knowledge Acquisition Approach Based on Rough Set in Online Aided ecision System for Food Processing Quality and Safety Liu Peng, Liu Wen,

More information

Denial of Service Attack Detection Using Multivariate Correlation Information and Support Vector Machine Classification

Denial of Service Attack Detection Using Multivariate Correlation Information and Support Vector Machine Classification International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-3 E-ISSN: 2347-2693 Denial of Service Attack Detection Using Multivariate Correlation Information and

More information

The Application Research of Ant Colony Algorithm in Search Engine Jian Lan Liu1, a, Li Zhu2,b

The Application Research of Ant Colony Algorithm in Search Engine Jian Lan Liu1, a, Li Zhu2,b 3rd International Conference on Materials Engineering, Manufacturing Technology and Control (ICMEMTC 2016) The Application Research of Ant Colony Algorithm in Search Engine Jian Lan Liu1, a, Li Zhu2,b

More information

Research on Aggregation Service-oriented Spatial Subdivision Data

Research on Aggregation Service-oriented Spatial Subdivision Data Research on Aggregation Service-oriented Spatial Subdivision Data Storage Scheduling Model 1 Du Gen-yuan, 2 Qiu Ying-yu, 3 Miao Fang 1 International School of Education, Xuchang University, China, xcdgy1974@126.com

More information

Practical Applications of DATA MINING. Sang C Suh Texas A&M University Commerce JONES & BARTLETT LEARNING

Practical Applications of DATA MINING. Sang C Suh Texas A&M University Commerce JONES & BARTLETT LEARNING Practical Applications of DATA MINING Sang C Suh Texas A&M University Commerce r 3 JONES & BARTLETT LEARNING Contents Preface xi Foreword by Murat M.Tanik xvii Foreword by John Kocur xix Chapter 1 Introduction

More information

Effective Product Ranking Method based on Opinion Mining

Effective Product Ranking Method based on Opinion Mining Effective Product Ranking Method based on Opinion Mining Madhavi Kulkarni Student Department of Computer Engineering G. H. Raisoni College of Engineering & Management Pune, India Mayuri Lingayat Asst.

More information

Doctor of Philosophy in Computer Science

Doctor of Philosophy in Computer Science Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects

More information

A COGNITIVE NETWORK BASED ADAPTIVE LOAD BALANCING ALGORITHM FOR EMERGING TECHNOLOGY APPLICATIONS *

A COGNITIVE NETWORK BASED ADAPTIVE LOAD BALANCING ALGORITHM FOR EMERGING TECHNOLOGY APPLICATIONS * International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 1, pp. 31 41, 2016 A COGNITIVE NETWORK BASED ADAPTIVE LOAD BALANCING ALGORITHM FOR EMERGING

More information

Study on the Evaluation for the Knowledge Sharing Efficiency of the Knowledge Service Network System in Agile Supply Chain

Study on the Evaluation for the Knowledge Sharing Efficiency of the Knowledge Service Network System in Agile Supply Chain Send Orders for Reprints to reprints@benthamscience.ae 384 The Open Cybernetics & Systemics Journal, 2015, 9, 384-389 Open Access Study on the Evaluation for the Knowledge Sharing Efficiency of the Knowledge

More information

CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA

CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA Professor Yang Xiang Network Security and Computing Laboratory (NSCLab) School of Information Technology Deakin University, Melbourne, Australia http://anss.org.au/nsclab

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015 RESEARCH ARTICLE OPEN ACCESS Ensuring Reliability and High Availability in Cloud by Employing a Fault Tolerance Enabled Load Balancing Algorithm G.Gayathri [1], N.Prabakaran [2] Department of Computer

More information