Applied Computing, Computer Science, and Advanced Communication -  Luo Qi

Applied Computing, Computer Science, and Advanced Communication (eBook)

First International Conference on Future Computer and Communication, FCC 2009, Wuhan, China, June 6-7, 2009. Proceedings

(Autor)

eBook Download: PDF
2009 | 1. Auflage
XI, 260 Seiten
Springer-Verlag
978-3-642-02342-2 (ISBN)
Systemvoraussetzungen
32,05 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book constitutes the proceedings of the First International Conference on Future Computer and Communication: Applied Computing, Computer Science, and Advanced Communications, FCC 2009, held in Wuhan, China, in June 2009. The 32 revised full papers presented were carefully reviewed and selected from 110 submissions. The papers deal with agents, knowledge-based technologies, bioinformatics engineering, computer architecture and design, computer networks and security, data mining and database applications, high performance networks and protocols, multimedia and web services, network reliability and QoS, neural networks and intelligent systems, software engineering and agile development, antennas and propagation, information theory and coding, multiple access techniques, optical communications and photonics, RFID and microwave devices, satellite, space and wireless communications, signal and image processing, 3g, 4g mobile communications, communications IC design, instrumentation and control, as well as VLSI design.

Preface 5
Organization 6
Table of Contents 8
The Model of the Statistical Geography Information System in Grid 11
Introduction 11
The Statistical Geography Information System in Grids 12
The Infrastructure of the Statistical Geography Information System in Grids 12
The Ways Solving the Problems 13
Application Instance and Key Problems 14
Concrete Flow 14
Several Key Problems and Solutions 15
Conclusion 17
References 17
Line-Scan Camera Control Pavement Detection System Research 18
Introduction 18
GPS and SCM Serial Port Communication as Well as Control Realizing Method 19
SCM Control the Line- Scan Camera in Real-Time 20
Image Analysis and Comparison 21
Conclusion 22
References 22
Emergency Command System Based on Satellite Link 24
Introduction 24
The Function of Emergency Command System 25
The System Composition and Operating Principle 26
System Configuration and the Parameters 28
System Debugging and Application 28
Summarize 29
References 30
SLA Monitoring Based on Semantic Web 31
Introduction 31
SLA Monitoring Motivations 32
Construction for the SLA Monitoring Based on Semantic Web 33
Service Requirement Management 33
Ontology Construction Process 33
SLA Monitoring Process Generation 36
Conclusion 37
References 38
Research and Application on Bloom Filter 40
Introduction 40
Bloom Filter 41
Simulation Scheme 43
Test Results and Discussion 44
Conclusion 44
References 45
Research on the DDS to Generate MSK Signal 46
Introduction 46
Principle of MSK Modulation 46
Principle of Direct Digital Synthesizers 48
Implement of MSK with AD9852 49
Conclusion 50
References 51
Establishment and Application of GIS Database in Urban Heritage Conservation 52
Introduction 52
Needed Data for Database Establishment 53
Needed Data for Urban Heritage Inventory 53
Needed Data for Urban Visual Management 53
Needed Data for Evaluation of Historical District Renewal 53
GIS Database for Urban Heritage Conservation 54
GIS Database for Urban Heritage Inventory 54
GIS Database for Urban Visual Management 55
GIS Database for Evaluation of Historical District Renewal 56
Application of GIS Database 57
Brief History of Case Study Area 57
Case Study 58
Conclusion 59
References 59
RFID Middleware Design Research 60
RFID Introduction 60
RFID Technology 60
RFID Tag 61
RFID Middleware 61
RFID Middleware Design 62
Filtering and Aggregation 62
Messaging 64
Reading from and Writing to a Tag 64
Reader Integration in IT-Service Management 65
RFIDStack 65
Conclusion 66
References 66
RFID Applications of Consumer Perceptions and Privacy Concerns 67
Introduction 67
Consumer Survey Results 68
RFID and Consumer Privacy 69
Database Security Issues 71
References 71
RFID Application of Addressing Consumer Privacy Challenges 74
Introduction 74
Addressing Consumer Privacy Challenges: Best Practices and Principles 75
Existing Industry Practices and Standards 75
Regulatory Approaches 77
Technological Approaches 78
References 79
New Interleaving and Forward Error Correction Strategies for Streaming 82
Introduction 82
Sender Based Repair 83
Forward Error Correction Technique 84
FEC Redundancy Control 84
Interleaving 85
Interleaving and FEC 86
Adaptive Model Based Burst Loss 88
Conclusion 90
References 90
Adjusting Forward Error Correction for Media Streaming 92
Introduction 92
Fectechique 93
Fec Performance Metrics 94
Interleaving 95
Proposed Protocol 98
Simulation Experiments 98
Conclusion 100
References 101
AR RAAM: A Reliable Routing Algorithim Using Ant Agents for Manets 102
Introduction 102
Proposed Algorithm 104
Experimental Results 106
References 106
Traffic Video Based Cross Road Violation Detection and Peccant Vehicle Tracking 110
Introduction 110
Mixture of Gaussian Background Model 111
Lane Line Detection Based on Hough Transformation 112
Vehicle Detection Based on Background-Frame BDWT and Cross Road Violation Detection 113
Background-Frame BDWT 113
Cross Road Violation Detection 114
Mean-Shift Tracking the Peccant Vehicle 114
System Frame and Experimental Results 116
Conclusions 117
References 117
An Anomaly Detection Immune Model Inspired by the Mechanism of DC- T Cell Interaction 119
Introduction 119
Related Work 120
Previous Work 120
The Mechanism of DC-T Cell Interaction in Danger Theory 121
An Anomaly Detection Immune Model 122
The Anomaly Detection Immune Model Overview 122
DC Functional Module 123
T Cell Functional Module 124
Conclusion 125
References 126
Design and Realization of Encoding Module for UHF RFID Based on FPGA 127
Introduction 127
ISO18000-6C Standard 128
The Principle and Realization of PIE Coding 128
The Principle of Digital Communication 128
PIE Coding Principle 129
The Realization of PIE Encoding Circuit 129
The Effect of Design 130
Conclusions 131
References 131
FPGA-Based CMOS Image Acquisition System 132
Introduction 132
The Structure Performance and Working Principium of CMOS Image Sensor 132
The Structure of System Design 133
Operating Principle and Implementation of System Modules 133
Implementation of CMOS Image Acquisition 133
The Module of VGA 135
The Results of This Design 135
Conclusions 136
References 136
Parallel Implementation of A5/2 Algorithm 138
Introduction 138
The Introduction of A5/2 Algorithm 139
The Parallel Realization of A5/2 Algorithm 140
The Parallel Realization of the Initialization 140
The Parallel Realization of Clock Controlling Stream Generation 141
The Parallel Realization of Clock Controlled Stream Generation 142
The Parallel Realization of Key Stream Generation 143
Analysis and Comparison of Performance 144
Analysis of Performance 144
Comparison of Performance 144
Conclusion 145
References 145
The Study of Model for Portfolio Investment Based on Ant Colony Algorithm 146
Introduction 146
Multi Objective Decision-Making Model of Portfolio Investment 146
Ant Colony Algorithm 148
Computation Example 149
Conclusion 150
References 150
Design of Embedded Network Interface Controller Based on ARM9 and ARMLinux 152
Introduction 152
Operating Principle of Embedded Network Interface Controller 153
Hardware Platform of Embedded Network Interface Controller 153
Selection of Embedded Operating System 154
Realizing Conversion between Ethernet Data and Serial Port Data 155
The Development Environment and Network Programming of Application Programs 155
Software Design 155
Application Examples of Embedded Network Interface Controller 158
Summary 159
References 159
The Design of Body Welding Line Base on the Virtual Manufacturing and Assembling Environment 160
Introduction 160
The Virtual Design System in Body Welding Line and Key Technology of Design 161
Welding Line Process Modeling 161
Welding Line Process Simulation 162
Welding Line Process Design 163
Examples of Designed Operation 163
The Design Feature of Body Welding Line Base on the Virtual Manufacturing and Assembling Environment 164
Effective Utilization of the Existing Designs and Resources Is the Core of Welding Line Design Base on the Virtual Manufacturing and Assembling Environment 164
Full Utilization of the Advanced Computer Technique Is the Means of Welding Line Design Base on the Virtual Manufacturing and Assembling Environment 165
Flexible Design Is the Trend of Development of Welding Line Design Base on the Virtual Manufacturing and Assembling Environment 165
Combination Design Is the Model of Welding Line Design Base on the Virtual Manufacturing and Assembling Environment 165
The Optimal Selection of Outsourced Manufacturing Enterprise Should Be Considered Simultaneously in the Course of Welding Line Design 165
Conclusion 166
References 166
Modeling Economic Spatial Contact among Cities with the Intensity and Structure Model of Urban Flow 167
Introduction 167
Database and Methodology 168
Database 168
Methodology 168
Result and Analysis 170
Intensity and Direction 170
Structure Difference 171
Discussion and Conclusion 172
References 172
Development of USB Device Driver in WinCE.Net 174
Introduction 174
USB Host Software Architecture in WinCE.Net 174
Development of USB Device Driver in WinCE.Net 175
Required Entrypoints for USB Device Driver 175
Stream Interface Driver 177
USB Device Driver Load Process 178
USB Device Driver Unload Process 180
Conclusion 180
References 180
Time-Varying Weighting Techniques for Airborne Bistatic Radar Clutter Suppression 181
Introduction 181
STAP and Bistatic Clutter 182
Bistatic STAP 182
Nonstationary Bistatic Clutter 182
Time-Varying Weighting Techniques 185
Derivative-Based Updating Algorithm (DBU) 185
Nonlinearly Time-Varying Weighting Algorithm (NTVW) 186
Simulation Results 187
Summary 188
References 188
Factor Analysis of Competencies of Software Project Managers in China 189
Introduction 189
Research 190
Data Analysis and Results 193
Conclusion 195
References 196
Radio Propagation Characteristics for Short Range Body-Centric Wireless Communications 197
Introduction 197
Radio Propagation with the Presence of Human Body 198
Shadowing Effect of Human Body 199
Conclusion 201
References 201
A New Efficient Multiple Messages Signcryption Scheme with Public Verifiability 203
Introduction 203
Preliminaries 204
Proposed Signcryption Scheme 205
Setup Phase 205
Key Generation Phase 205
Multiple Keys Generation Phase 206
Signcryption Phase 207
Unsigncryption Phase 207
Non-repudiation and Public Verification Phase 208
Analysis of the Proposed Scheme 208
Security 208
Efficiency 209
Conclusions 210
References 210
Research and Implementation of Reconfigurable Multiplier over Galois Field Targeted at Stream Cipher 211
Introduction 211
Applications Analysis 212
Design of the Reconfigurable Galois Field Multiplier 213
Introduction of Composite Field Multiplier 213
The Theory of Conversion of Basis 214
Design of the Reconfigurable Galois Field Multiplier 215
Performance and Analysis 216
Performance of This Design 216
Compare with Other Designs 217
Conclusion 218
References 218
Research of Grey Relation Theory Algorithm for Customer Classification of Manufacturing Enterprise 220
Introduction 220
Evaluation Index System for Customer ClassificationManagement 221
Model and Method of Customer Classification Grey Relation Evaluation 223
Case Study 224
Conclusions 226
References 226
General Structural Model and Application of Intelligent Decision Support System Based on Knowledge Discovery 228
Introduction 228
Structure and Limitation of Traditional Decision Support System 229
New Type Intelligent Decision Support System Based on Knowledge Discovery (IDSSKD) 230
Theoretical Foundation of IDSSKD 230
Overall Structural Model of IDSSKD 231
The Core Components of IDSSKD 231
Main Modules of IDSSKD 231
Application of IDSSKD 233
Conclusions 234
References 235
Application of Improved GA in System of Public Vehicle Dispatching 236
Introduction 236
Related Works 237
The Establishment and Analysis of Public Vehicle Dispatching Model 238
Dispatching Principle Analysis 238
Time of Vehicle Arriving 239
Time of Passengers Waiting 239
Optimize of Public Vehicle Dispatching Model 240
The Analysis of Public Vehicle Company Model 240
The Analysis of Passenger Optimize Model 240
Application of Improved GA in $^F1_min$ and $^F2_min$ 241
Results and Discussion 243
Conclusion and Future Work 243
References 244
Design and Implementation of Chat Room Based on UDP 245
Introduction 245
The Basic Principles of Socket 246
The Definition of Socket 246
Two Types of Operation of Socket 246
The Mechanism of Chat Room 247
The Part of Server 247
The Part of Server 248
The Final Effect of Design 249
Conclusion 249
References 249
Emotion Recognition in Modern Distant Education System by Using Neural Networks and SVM 250
Introduction 250
Affective Computing 252
Speech Emotion Recognition Based on Neural Networks 254
Facial Emotion Recognition Based on SVM 255
Conclusion 257
References 257
Author Index 258

Erscheint lt. Verlag 1.1.2009
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Datenbanken
Mathematik / Informatik Informatik Netzwerke
Informatik Software Entwicklung User Interfaces (HCI)
Informatik Theorie / Studium Algorithmen
Schlagworte algorithms • Calculus • classification • Computer • Computer Science • Database • FPGA • LA • Linux • Modeling • Radio-Frequency Identification (RFID) • Routing
ISBN-10 3-642-02342-8 / 3642023428
ISBN-13 978-3-642-02342-2 / 9783642023422
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 10,1 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Eine praxisorientierte Einführung mit Anwendungen in Oracle, SQL …

von Edwin Schicker

eBook Download (2017)
Springer Vieweg (Verlag)
34,99
Unlock the power of deep learning for swift and enhanced results

von Giuseppe Ciaburro

eBook Download (2024)
Packt Publishing (Verlag)
35,99