Computer, Informatics, Cybernetics and Applications -

Computer, Informatics, Cybernetics and Applications (eBook)

Proceedings of the CICA 2011
eBook Download: PDF
2011 | 2012
XXV, 1704 Seiten
Springer Netherlands (Verlag)
978-94-007-1839-5 (ISBN)
Systemvoraussetzungen
523,23 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
The Conference on Computer, Informatics, Cybernetics and Applications 2011 aims to facilitate an exchange of information on best practices for the latest research advances in the area of computer, informatics, cybernetics and applications, which mainly includes computer science and engineering, informatics, cybernetics, control systems, communication and network systems, technologies and applications, others and emerging new topics.
The Conference on Computer, Informatics, Cybernetics and Applications 2011 aims to facilitate an exchange of information on best practices for the latest research advances in the area of computer, informatics, cybernetics and applications, which mainly includes computer science and engineering, informatics, cybernetics, control systems, communication and network systems, technologies and applications, others and emerging new topics.

Computer, Informatics,Cybernetics and Applications 2
Preface 4
Contents 6
Organization 25
Part ICommunication Technologies andApplications 29
1 Studies on Single Observer Passive Location Tracking Algorithm Based on LMS-PF 30
Abstract 30
1.1…Introduction 30
1.2…The Particle Filter Brief Introduction 31
1.3…The Algorithm Based on LMS-PF for Signal Observer Passive Location Tracking 32
1.3.1 The Algorithm Based on LMS for Single Observer Passive Location Tracking 32
1.3.2 The Algorithm Based on PF for Single Observer Passive Location Tracking 33
1.3.3 The Algorithm Based on LMS-PF for Single Observer Passive Location Tracking 34
1.4…The Signal Observer Passive Location Tracking Eeperiments 35
1.5…Conclusions and Discussion 36
References 36
2 Novel Methods for Extending Optical Code Set for Coherent OCDMA 37
Abstract 37
2.1…Introduction 37
2.2…Definition 38
2.3…Differential Algorithm 39
2.4…Cross Searching Algorithm 42
2.5…Conclusion 43
References 44
3 A Sequential Processing Method for Converted Measurement Kalman Filters Based on Orthogonal Transform 45
Abstract 45
3.1…Introduction 46
3.2…Block CMKF Algorithm 46
3.3…Sequential Algorithm Based on Orthogonal Transform 48
3.4…Simulation Results and Analysis 50
References 52
4 Improvement of an ID-Based Threshold Signcryption Scheme 54
Abstract 54
4.1…Introduction 55
4.2…The Improvement of Fagen Li et al.’ Scheme 56
4.3…Security Analysis of Our Improved Scheme 57
4.4…Conclusion 59
Acknowledgment 59
References 59
5 Cryptanalysis of an Enhanced Event Signature Protocols for Peer-to-Peer Massively Multiplayer Online Games 61
Abstract 61
5.1…Introduction 61
5.2…Review of Chan et al.’s Event Signature Protocol for P2P MMOGs 62
5.2.1 Initialization Phase 63
5.2.2 Signing Phase 63
5.2.3 Verification Phase 63
5.2.4 Re-Initialization Phase 64
5.3…A Replay Attack on Chan et al.’s Protocol 64
5.4…Review of Chun-Ta Li et al.’s Enhanced Event Signature Protocol for P2P MMOGs 65
5.4.1 Initialization Phase 65
5.4.2 Signing Phase 65
5.4.3 Verification Phase 66
5.4.4 Re-Initialization Phase 66
5.5…Cryptanalysis of Li et al.’s Enhanced Protocol 67
5.6…Discussions 67
Acknowledgments 68
References 68
6 Design of CAN Bus and Wireless Sensor Based Vehicle Tire Pressure Monitoring System 69
Abstract 69
6.1…Introduction 69
6.2…The Design of TPMS 70
6.3…Design of System 71
6.3.1 Design of Hardware 71
6.3.1.1 TPMS Receivers 71
6.3.1.2 Wireless Sensors 72
6.3.1.3 Low-Frequency Triggers 72
6.3.1.4 TPMS Displayers 73
6.3.2 Design of System Software 73
6.3.2.1 Software Controlling Policy and Communication Protocol for TPMS Receivers 74
6.3.2.2 Software Controlling Policy and Communication Protocol for Wireless Sensors 74
6.4…Testing 75
6.4.1 CAN Bus Communication Test 75
6.4.2 Test of Wireless Transportation 75
6.5…Conclusion 76
References 77
7 Analysis and Test of the Exposure Synchronization of the Multi-Sensor Aerial Photogrammetric Camera System 78
Abstract 78
7.1…Introduction 78
7.2…Analysis of Exposure Synchronization of Multi-Sensor System 79
7.2.1 Exposure Process and Analysis of Asynchronic Error Source 79
7.2.2 Calculation of the Maximum Exposure Synchronization Difference 80
7.3…Test of Exposure Asynchronization 81
7.3.1 Taking Photographs of a Timer with High Accuracy 82
7.3.2 Using Photodiode Circuit to Capture the Moment when Shutters are Fully Opened 84
7.4…Conclusion 85
References 85
8 Design and Application of Custom RS485 Communication Protocol 86
Abstract 86
8.1…Introduction 86
8.2…System Background 87
8.3…Custom Communication Protocols Definition 88
8.3.1 Set Address Instruction (A4) 89
8.3.2 Communication Test Instruction (A6) 90
8.3.3 Send Information Instruction (AB) 90
8.4…The Mainframe System Programming 91
8.5…Display Terminal Programming 92
8.6…Conclusions 93
References 94
9 Sensitivity of Neurons Exposed to AC Induction Electric Field 95
Abstract 95
9.1…Introduction 95
9.2…Model Simplification 96
9.3…Analysis of Neuronal Sensitivity 97
9.3.1 Firing Patterns 97
9.3.2 Sensitivity Under DC Electric Field 98
9.3.3 Sensitivity Under AC Induction Electric Field 98
9.4…Conclusions 102
References 103
10 Spectra of Discrete Multi-Splitting Waveform Relaxation Methods to Determining Periodic Solutions of Linear Differential-Algebraic Equations 104
Abstract 104
10.1…Introduction 105
10.2…Spectra of DMSWR Operators and Finite-Difference for Solving MSWR Solutions 106
10.2.1 Spectra of DMSWR Operators 107
10.2.2 Finite-Difference for Solving MSWR Solutions 109
10.3…Numerical Experiments 111
10.3.1 Example One 111
10.4…Conclusions 114
Acknowledgments 114
References 114
11 A Low Power Limiting Amplifier Designed for the RSSI of a 5.8 GHz ETC Receiver 116
Abstract 116
11.1…Introduction 117
11.2…Systematic Optimization 117
11.3…Circuit Implementation 120
11.4…Design Validation 120
11.5…Conclusion 122
Acknowledgments 122
References 123
12 A 3rd order Opamp-Based Tunable Low-Pass Filter Design for Data Demodulator of a 5.8 GHz ETC RF Receiver 124
Abstract 124
12.1…Introduction 125
12.2…Operational Amplifier Design 125
12.3…Opam-Based 3rd Order Tunable Low-Pass Filter Design 128
12.4…System Implementation and Validation 129
12.5…Conclusion 131
Acknowledgments 131
References 131
13 Sensor Fusion Using Improvement of Resampling Algorithm Particle Filtering for Accurate Location of Mobile Robot 132
Abstract 132
13.1…Introduction 132
13.2…The Nonlinear Measurement Model Particle Filter 133
13.2.1 The Divisional Resampling of Particle Filter 133
13.2.2 The Prediction Stage 134
13.2.3 Update Stage 135
13.3…Simulation Results 135
13.3.1 Improved Particle 135
13.3.2 Based on Particle Filter Multi-Sensor 138
13.4…Simulation Results are as Follows 138
13.5…Conclusion 140
References 140
Part IIIntelligence and Biometrics Technologies 141
14 Sensor Placement Modes for Smartphone Based Pedestrian Dead Reckoning 142
Abstract 142
14.1…Introduction 143
14.2…Smartphone Based PDR System 144
14.2.1 Mode Filtering 144
14.2.2 Footstep Detection 146
14.2.3 Stride Length Measurement 148
14.2.4 Heading Determination 149
14.3…Experimental Results 149
14.4…Conclusion and Future Work 150
References 151
15 A New Methodology of Judging the Observability of the System 152
Abstract 152
15.1…Introduction 152
15.2…The Correlation Efficient Decomposition to Matrix and the Judgement of the Observability of Linear System 153
15.3…The Algorithm and Examples Which Judge the Observability of Linear System 155
15.3.1 The Algorithm Judge the Observability of Linear System 155
15.3.2 Example 156
References 158
16 Criteria Conditions for Generalized Strictly Diagonally Dominant Matrices 159
Abstract 159
16.1…Introduction 159
16.2…Definition and Lemma 160
16.3…Main Result 160
References 166
17 Nonlinear Retarded Integral Inequalities for Discontinuous Functions and Its Applications 167
Abstract 167
17.1…Introduction 167
17.2…Conclusion 168
17.2.1 A. Conclusion 1 168
17.2.2 B. Conclusion 2 174
17.2.3 C. Conclusion 3 175
Acknowledgments 176
References 176
18 Oscillatory and Asymptotic Behavior of a Second Order Nonlinear Differential Equation with Perturbation 178
Abstract 178
18.1…Introduction 178
18.2…Oscillatory Behavior 180
18.3…Asymptotic Behavior 184
18.4…Example 186
References 186
19 A Expanded Binary Tree Method of Automatic River Coding and Algorithm 187
Abstract 187
19.1…Introduction 187
19.2…The Analysis of River Coding Method 188
19.3…The Design and Implementation of River Coding Algorithm 190
19.3.1 The Process of River Coding 190
19.3.2 The Judgment of Upstream and Downstream 191
19.3.3 The Steps of River Coding 191
19.3.4 The Data Structure of River Network Topology 192
19.3.5 Recursive Code 193
19.3.6 Algorithm 194
19.4…Conclusion 194
Acknowledgments 195
References 195
20 Domain-Specific Ontology Mapping Based on Common Property Collection 197
Abstract 197
20.1…Introduction 197
20.2…Related Work 198
20.3…Overview of Mapping Approach 198
20.4…The Implementation of Ontology Mapping 199
20.4.1 Definitions 199
20.4.2 Mapping Rules 199
20.4.3 Mapping Steps 200
20.4.3.1 Inference Engine 200
20.4.3.2 Ontology Mapping Process 201
20.5…Analysis 202
20.6…Experiment 202
20.7…Discussion 204
20.8…Conclusions 204
Acknowledgments 205
References 205
21 Efficient Mobile Electronic Full Declaration System Based on Smart Device 206
Abstract 206
21.1…Introduction 206
21.2…Paper Preparation 207
21.3…The Function Module Partition and Hardware Design 208
21.3.1 The Data Process and Control 208
21.3.2 The Memory 209
21.3.3 The LVDS 209
21.3.4 RFID Data Acquisition 210
21.3.5 Mobile Internet 210
21.3.6 Power Management 210
21.3.7 Embedded Controller 210
21.4…The Mobile Electronic Full Declaration System Based on Smart Device 211
21.5…The Applications of Declaration for Exported Commodities 212
21.6…Summary 213
Acknowledgments 213
References 214
22 The Predicate System Based on Schweizer--Sklar t-Norm and Its Completeness 215
Abstract 215
22.1…Introduction 215
22.2…Predicate Formal System /forall {{/bf UL}}^{/ast} 216
22.3…Completeness of /forall {/hbox{UL}}^{/ast} 219
22.4…Conclusion 222
Acknowledgments 222
References 222
23 Providing Timely Response in Smart Car 224
Abstract 224
23.1…Introduction 224
23.2…Related Work 225
23.3…The Architecture of the Smart Car 226
23.3.1 System Model 227
23.3.2 Task Model 228
23.4…The Scheduler 228
23.5…Performance Evaluation 230
23.5.1 Test Result 230
23.6…Conclusion 232
Acknowledgments 232
References 233
24 A Study of Position Tracking Technology in Indoor Environments for Autonomous Wheelchair Driving 234
Abstract 234
24.1…Introduction 235
24.2…Position Estimation Method 236
24.2.1 Triangulation 236
24.2.2 Position Estimation Using the RSSI 237
24.3…Realization of Active RFID Module 237
24.3.1 RF Transmission and Receiving 237
24.3.2 Micro Controller for the Control 238
24.3.3 Embodiment of Active RFID Module 239
24.4…Experiment 239
24.4.1 Experiment to Estimate the RSSI Value 239
24.4.2 Position Tracing Experiment in the Test Space 241
24.5…Conclusion 242
Acknowledgments 243
References 243
25 Adaptive Regulation of a Class of Nonlinear Systems with Unknown Sinusoidal Disturbances 245
Abstract 245
25.1…Introduction 245
25.2…System Transformations 246
25.3…Estimation of Disturbances 249
25.4…Adaptive Regulation Laws 250
25.5…Conclusion 253
Acknowledgments 253
References 253
26 Research on Improved Ant Colony Algorithm for TSP Problem 254
Abstract 254
26.1…Introduction 254
26.2…Basic Ant Colony Algorithm 255
26.2.1 Principles 255
26.2.2 Algorithm Model 255
26.3…Ant Colony Optimization Algorithm 256
26.3.1 Algorithm Idea 256
26.4…Simulation Analysis 258
26.5…Conclusion 259
Acknowledgments 259
References 259
Part IIINetworks Systems and Web Technologies 261
27 Research on Internet of Things Technology 262
Abstract 262
27.1…Introduction 262
27.2…Internet of Things Architecture 264
27.3…The Key Technologies in the Internet of Things 265
27.3.1 RFID Technology 265
27.3.2 Sensor Network Technology 266
27.3.3 Embedded Intelligent Technology 267
27.3.4 Nanotechnology 267
27.3.5 Cloud Computing Technology 267
27.4…Development Trends and Prospects 268
References 269
28 Hot Topic Detection Research of Internet Public Opinion Based on Affinity Propagation Clustering 270
Abstract 270
28.1…Introduction 270
28.2…Related Work 271
28.3…Affinity Propagation 272
28.4…Hot Topic Detection of IPO Based on Ap Clustering 273
28.4.1 Data Pretreatment 273
28.4.2 Similarity Matrix Representation 274
28.4.3 AP Clustering for IPO 275
28.4.4 Evaluation Criterion 276
28.5…Experiment and Discuss 276
28.6…Conclusions 277
Acknowledgment 277
References 278
29 TTMP: A Trust-Based Topology Management Protocol for Unstructured P2P Systems 279
Abstract 279
29.1…Introduction 279
29.2…Related Works 280
29.3…TTMP Protocol 281
29.3.1 Overview of TTMP 281
29.3.2 Trust Model 282
29.3.2.1 Computing Rserv of peer j by peer i 282
29.3.2.2 Computing Rcons of peer i by peer j 283
29.3.3 Adaptive Topology Management 284
29.4…Simulation Results 286
29.5…Conclusions 288
References 288
30 Indoor Temperature and Humidity Monitoring System Based on WSN and Fuzzy Strategy 290
Abstract 290
30.1…Introduction 291
30.2…Monitoring System Design 291
30.3…Sensor Node Design 292
30.3.1 Selection of the Embedded Microprocessor 293
30.3.2 Sensor Selection and Interface Design with Microcontroller 293
30.3.3 Design of Send and Receive Wireless Data Module 293
30.3.4 Interface Design Between nRF905 and P89V51RB2 294
30.3.5 Data Transfer Module 294
30.4…Fuzzy Control Strategy 294
30.5…System Software Design 297
30.6…System Test Results and Analysis 298
30.7…Summary 299
Acknowledgments 299
References 299
31 Radioactive Target Detection Using Wireless Sensor Network 300
Abstract 300
31.1…Introduction 300
31.2…Statistical Method 302
31.3…Numerical Algorithms 304
31.4…Simulation Results 306
31.5…Conclusion 307
Acknowledgments 307
References 308
32 Optimization of Air Network Applied in the Express Based on Hub-and-Spoke Network: A Case Study of SF Express 309
Abstract 309
32.1…Introduction 309
32.2…The Model of Hub-and Spoke Network 310
32.2.1 Put Forward the Hub-and-Spoke Network 310
32.2.2 Model Assume 310
32.2.3 Built Model 311
32.3…The Application of Hub-and-Spoke Network on the Chinese Air Network 312
32.3.1 The Optimization of Hub-and-spoke Network in Express Air Network 312
32.3.2 Measure the Real Effectiveness of the Hub-and-Spoke Network 315
32.4…Conclusion 316
Acknowledgment 316
References 316
33 Verification and Analysis for Ethernet Protocols with NuSMV 317
Abstract 317
33.1…Introduction 317
33.2…Modeling CSMA/CD Protocol with NuSMV 318
33.2.1 Description of Formal Specification 319
33.2.2 Synchronous Model and Asynchronous Model 322
33.3…Property Verification 323
33.4…Traces in NuSMV 324
33.5…Conclusion 324
Acknowledgments 326
References 326
34 The Analysis and Modeling on Internet AS-Level Topology Based on K-Core Decomposition 327
Abstract 327
34.1…Introduction 327
34.2…K-core Decomposition: Main Definitions 328
34.3…The Distribution on Coreness of the Nodes 329
34.4…The Linking Trend to Higher Shells 329
34.5…The Distribution on Links to Higher Shells 331
34.6…The Modeling Algorithm Based on Coreness 332
34.7…The Results and Analysis 334
34.8…Conclusion 335
References 335
35 Based on Quasi-IP Address Model of Repeater Coordination 337
Abstract 337
35.1…Introduction 337
35.2…Model Assumptions 339
35.3…Symbols 339
35.4…Coverage of One Repeater 340
35.5…Number of Users Supported by a Repeater 340
35.5.1 Differentiation of Repeaters Through the Use of Subaudible Tone 340
35.5.2 Differentiation of Users Within the Coverage of a Repeater Through the Use of Subaudible Tone 341
35.5.3 Differentiation of Repeaters and Users Through the Use of Subaudible Voice 341
35.6…Building a Circular System 342
35.6.1 Service Area 342
35.6.2 Calculation Method 342
35.7…Summary 344
References 344
36 Fast Dynamic Mesh Moving Based on Background Grid Morphing 345
Abstract 345
36.1…Introduction 346
36.2…Dynamic Mesh Moving Based on Delaunay Graph Mapping 347
36.3…The Ball-Vertex Method 347
36.4…Boundary Improvement 348
36.5…The Improved Method Based on Background Grid 349
36.6…Numerical Examples 350
36.6.1 Rotation of the Airfoil 350
36.6.2 Geometries Composed of Segments 351
36.7…Conclusion 353
References 354
37 Research on Network Congestion Control System Based on Continuous Time Model 355
Abstract 355
37.1…Introduction 355
37.2…The Reasons Caused Network Congestion 356
37.3…The Modeling of TCP Congestion Control Algorithm 357
37.4…The Stability Analysis of Congestion Control System 360
37.5…Summary 361
References 361
38 The Realization of OPNET and MATLAB Co-Simulation Based on HLA 362
Abstract 362
38.1…Introduction 362
38.2…The Mechanism of High Level Architecture 363
38.3…The Framework and Federates of Co-Simulation 363
38.3.1 The Framework of Co-Simulation 363
38.3.2 The OPNET Modeler Federate 363
38.3.3 The MATLAB Federate 365
38.4…Example of OPNET and MATLAB’s Co-Simulation 366
38.4.1 The Realization of OPNET Federation 366
38.4.2 The Realization of OPNET Federation 367
38.4.3 The Process of Co-Simulation 368
Acknowledgments 368
References 368
Part IVData Modeling and ProgrammingLanguages 369
39 Design and Applications of Third Party Integrated Information Security Management System 370
Abstract 370
39.1…Introduction 370
39.2…Technology Trends at Home and Abroad 371
39.2.1 Security Risk Analysis Service 371
39.2.2 Security Evaluation Services 371
39.2.3 Network Vulnerability Analysis Services 372
39.2.4 Network Security Incidents Processing Services 372
39.2.5 Intelligent Decision-Making and Active Defense Services 372
39.3…Application Design of Information Security Management System 374
39.3.1 Planning and Design of the System 374
39.3.2 Whole Framework Design of System 375
39.4…Conclusion 379
Acknowledgments 379
References 379
40 A Protocol for a Message System for the Tiles of the Heptagrid, in the Hyperbolic Plane 380
Abstract 380
40.1…Introduction 380
40.2…The Heptagrid and How To Navigate There 381
40.3…The Communication Protocol 382
40.3.1 Absolute and Relative Systems 382
40.3.2 The Protocol 383
40.4…The Experiment 385
40.5…Conclusion 387
References 387
41 Monitoring Information System Quality: Between Reality and User Expectation at Bina Nusantara University 389
Abstract 389
41.1…Background 389
41.2…Methodology 390
41.3…Theory 390
41.4…Research Result 392
41.5…Conclusion 395
References 395
42 Ordinal-Set Pair Analysis Prediction Model and Application in Liao River Basin 397
Abstract 397
42.1…Introduction 398
42.2…Set Pair Analysis Principle 398
42.3…Annual Runoff Prediction Based on the Ordinal Set Pair Analysis 399
42.3.1 Annual Runoff Prediction Model Based on the Ordinal Set Pair Analysis 399
42.3.2 Steps of Annual Runoff Prediction Based on the Ordinal Set Pair Analysis 400
42.4…Example 401
42.5…Conclusions 403
References 404
43 Integrated RMS Layout and Flow Path Design: Modelling and a Heuristic method 405
Abstract 405
43.1…Introduction 406
43.2…Integrated Design Modelling 406
43.3…Integrated Heuristic Design Method 407
43.3.1 Algorithm Description 407
43.3.2 The Major Procedures in EMLG 408
43.4…Computation Cases 409
43.4.1 Case 1 410
43.4.2 Case 2 and 3 410
43.5…Conclusions 412
Acknowledgments 412
References 412
44 Design and Implementation of Distributed Remote-Reading Water Meter Monitoring System Based on SaaS 414
Abstract 414
44.1…Introduction 414
44.2…Overall Architecture of the System 415
44.3…SaaS Pattern and WCF Communication Model 415
44.4…Design and Implementation of Key Functions in the System 417
44.4.1 Design and Implementation of the Communication Subsystem 417
44.4.2 Design and Implementation of Authentication and Authorization 418
44.4.3 Architecture of Multi-Tenant 419
44.4.4 Design and Implementation of Data Statistics 419
44.5…Summary 421
References 421
45 Enabling the Traceability of Web Information Access in Laboratory Management via E-CARGO Model 422
Abstract 422
45.1…Introduction 422
45.2…E-CARGO Model and Related Definitions 423
45.2.1 E-CARGO Model 423
45.2.2 Related Definitions 424
45.3…Problem in Laboratory Information Security Management and the related Algorithms 426
45.3.1 Algorithm of Harmful Information Reporting 427
45.3.2 Algorithm for Harmful Information Gathering 428
45.3.3 Algorithm for Harmful Information Tracing 428
45.4…Conclusion and Status of Research 429
Acknowledgments 429
References 429
46 An Improved GVF Snake Model Using Magnetostatic Theory 431
Abstract 431
46.1…Introduction 431
46.2…Parametric Snake Model 433
46.3…GVF and MAC Based External Force 434
46.4…Experimental Results 435
46.5…Conclusion 438
Acknowledgments 439
References 439
47 Block Effect Reduction via Model Based Compressive Sensing 441
Abstract 441
47.1…Introduction 441
47.2…Related Works 442
47.3…Model Based Compressive Sensing Theory 443
47.4…Our Approach 444
47.5…Experimental Results 446
47.6…Summary 446
References 447
48 The Design of Logistics Information Platform for the Yangtze River Delta 449
Abstract 449
48.1…Introduction 449
48.2…Status of the Yangtze River Delta Logistics 450
48.3…The requirements of the Logistics Information Platform 450
48.4…Design logistics platform 451
48.5…Yangtze River Delta Key Technology Logistics Information Platform 452
48.6…Summary 454
References 455
49 The Case Study for Three Kinds of Mobile Games 456
Abstract 456
49.1…Introduction 457
49.2…Game Class for Happy Farm Online 458
49.2.1 Class Design 458
49.2.2 Game Frameworks 459
49.2.3 Game Implementations 459
49.3…Game Class for Plants vs Zombies 461
49.3.1 Class Design 461
49.3.2 Game Implementations 463
49.4…Game Class for Gallant Fighter with Double Blade 464
49.4.1 Class Design 464
49.4.2 Gravity Sensing 466
49.4.3 Game Implementations 466
49.5…Conclusions and Future Works 467
References 467
50 New Methods of Specifying and Modeling Stochastic Concurrent Systems 469
Abstract 469
50.1…Introduction 470
50.2…Probabilistic Stochastic Automata 470
50.3…Extended Colored Stochastic Petri Nets 471
50.3.1 Basic Concepts of ECSPNs 471
50.3.2 Modeling Methods of ECSPNs 472
50.3.3 Analysis Methods of ECSPNs 472
50.4…Generalized Stochastic Extended Bundle Event Structures 473
50.4.1 Basic Concepts of GSEBEs 473
50.4.2 Modeling Methods of GSEBESs 474
50.4.3 Analysis Methods of GSEBESs 474
50.5…Comparing Between the Two Methods 475
50.6…Conclusions 475
Acknowledgment 476
References 476
Part VDigital Image Processing 477
51 Digital Image Completion Techniques 478
Abstract 478
51.1…Introduction 479
51.1.1 Problem Description 479
51.1.2 Evaluation Criterion 479
51.2…Categories of Image Completion Techniques 480
51.3…Single Image Based Approaches 481
51.3.1 Structure Propagation Based Methods 481
51.3.2 Texture Synthesis Based Methods 482
51.3.3 Hybrid Methods Based on Structure Propagation and Texture Synthesis 482
51.3.4 Statistical Learning Based Methods 483
51.3.5 Interactive Way for Single Image Based Approaches 484
51.4…Multiple Images Based Approaches 484
51.5…Future Work 485
Acknowledgments 485
References 485
52 Application of 2-D Wavelet Transform in Image Compression Based on Matlab 487
Abstract 487
52.1…Introduction 487
52.2…The Basic Ideal of Wavelet Tranform 488
52.3…Application of Wavelet Transformation on Image Compression Code 490
52.4…Experimental Results and Discussion 492
52.5…Conclusions 493
References 495
53 Fingerprint Image Preprocessing Method Based on the Continuous Spectrum Analysis 496
Abstract 496
53.1…Introduction 497
53.2…Spectrum Analysis Method of Fingerprint Image 498
53.2.1 The Spectrum Analysis of Different Fingerprint Image Regions 499
53.2.2 The 3-Dimension Continuous Spectrum of the Fingerprint Image 500
53.3…Fingerprint Image Segmentation Based on Continuous Spectrum 501
53.4…The Realization of Fingerprint Image Processing Method 503
53.5…Experimental Results 503
53.6…Conclusions and Future Works 506
Acknowledgments 506
References 506
54 A Zero-Watermarking Algorithm for Digital Map Based on DWT Domain 508
Abstract 508
54.1…Introduction 508
54.1.1 Grid Map Watermarking Technology 509
54.1.2 Zero-Watermarking Algorithms 509
54.2…Zero-Watermarking Algorithm for Grid Map 510
54.2.1 Embedding Watermarking 510
54.2.2 Watermark Detection Algorithm 511
54.3…Experiment 513
54.4…Conclusion 515
Acknowledgments 516
References 516
55 A Fault-Tolerance Shortest Routing Algorithm with PDPE on (n, k)-Star Graph for NoC 517
Abstract 517
55.1…Introduction 517
55.2…(n, k)-Star Graph and Routing 518
55.2.1 Definitions and Properties of (n, k)-Star 518
55.2.2 Routing 519
55.3…Fault-Tolerance Shortest Routing Algorithm with PDPE 519
55.3.1 Foundation of PDPE Algorithm 519
55.3.2 The Sorting Rule of Priority of Permutation Elements 520
55.3.3 PDPE Algorithm 520
55.3.4 Fault-Tolerance Analysis of PDPE Algorithm 521
55.4…Simulation 521
55.5…Conclusion 524
References 524
56 A Robust Zero-Watermarking Algorithm for 2D Vector Digital Maps 526
Abstract 526
56.1…Introduction 526
56.2…The Watermarking Algorithm 527
56.2.1 Zero-Watermark Generation 528
56.2.2 Zero-Watermark Extraction 529
56.3…Experiments and Results 530
56.4…Conclusions and Future Work 532
Acknowledgments 533
References 533
57 An Efficient Non-Local Means for Image Denoising 535
Abstract 535
57.1…Introduction 535
57.2…Method 536
57.2.1 Non-Local Means 536
57.2.2 Pre-Classification 537
57.3…Experimental Results 539
57.4…Conclusion 542
Acknowledgments 542
References 542
58 An Efficient Augmented Lagrangian Method for Impulse Noise Removal via Learned Dictionary 543
Abstract 543
58.1…Introduction 543
58.2…AL Based Dictionary Learning Algorithm 544
58.2.1 The Sparseness Characteristic of Salt-and-Pepper Noise 544
58.2.2 The General AL Based Dictionary Learning Framework 545
58.2.3 An Efficient Inner Solver 546
58.3…Results 548
58.4…Conclusion 550
Acknowledgments 551
References 551
59 Motion Object Segmentation Using Regions Classification and Energy Model 552
Abstract 552
59.1…Introduction 552
59.2…Spatial Regions Partition 553
59.3…Initial Regions Classification 554
59.4…Spatio-Temporal Energy Model for Candidate Regions Selection 554
59.5…Post-Processing 555
59.6…Experimental Result 557
59.7…Conclusions 558
References 559
60 A Digital Image Scrambling Method Based on Hopfield Neural Network 560
Abstract 560
60.1…Introduction 560
60.1.1 Hopfield Neural Network 561
60.2…Method of Image Processing 561
60.2.1 Image Block 561
60.2.2 Image Scrambling Method Based on Hopfield Neural Network 562
60.3…Simulation Results 563
60.3.1 Anti-Attacking Test 564
60.3.2 Noise Attack 564
60.3.3 JPEG Compression Attack 565
60.3.4 Cropping Attack 565
60.4…Conclusion 566
References 566
61 Lattice Boltzmann Anisotropic Diffusion Model Based Image Segmentation 567
Abstract 567
61.1…Introduction 568
61.2…Lattice Boltzmann Model 568
61.3…Lattice Boltzmann Model for Anisotropic diffusion 570
61.4…Experimental Analysis 571
61.4.1 Image Segmentation Algorithm Based on LBADM 571
61.4.2 Preferences 572
61.4.3 Experimental Results and Analysis 573
61.5…Conclusion 574
Acknowledgments 574
References 574
Part VIOptimization and Scheduling 576
62 Research on New Distributed Solution Method of Complex System Based on MAS 577
Abstract 577
62.1…Introduction 577
62.2…Information Agent Formal Description 579
62.3…Information Agent Task Specification Decomposition Method 580
62.3.1 Based on GDF Information Agent Task Specification Decomposition Criterion 580
62.3.2 Based on the BN Task Specification Expressed and Decomposes 581
62.4…Conclusions 583
Acknowledgments 583
References 583
63 An Order-Searching Genetic Algorithm for Multi-Dimensional Assignment Problem 585
Abstract 585
63.1…Introduction 585
63.2…Multi-Dimensional Assignment Model 586
63.3…Order-Searching Genetic Algorithm 588
63.3.1 Shortcomings of Order-Searching Algorithm 588
63.3.2 Genetic Algorithm 588
63.3.3 Order-Searching Genetic Algorithm 589
63.4…Simulations 591
63.4.1 Simulation Model 591
63.4.2 Simulation Result Analyses 591
63.5…Conclusions 592
Acknowledgments 592
References 592
64 The Heuristic Algorithm of Stacking Layer for the Three-Dimensional Packing of Fixed-Size Cargoes 593
Abstract 593
64.1…Introduction 593
64.2…Problem Definition 594
64.3…Stacking Layer Method Design 595
64.3.1 The Concept of Stacking Layer Method 595
64.3.2 The Two-Step Solving Algorithm for Stacking Layer Method 595
64.4…Space Utilization Test 597
64.5…Conclusion 599
References 599
65 Research on a Novel Hybrid Optimization Algorithm Based on Agent and Particle Swarm 601
Abstract 601
65.1…Introduction 601
65.2…Hybrid Optimization Algorithm 602
65.2.1 MA-PSO Algorithm 603
65.3…Calculates Example 606
65.4…Conclusions 608
Acknowledgments 608
References 608
66 A Novel BCC Algorithm for Function Optimization 610
Abstract 610
66.1…Introduction 610
66.2…Related Work 611
66.2.1 BC Algorithm Principle 611
66.2.2 BCC Algorithm Principle 613
66.2.3 Chaos Search Strategy 614
66.3…Algorithm 614
66.3.1 Overview 614
66.3.2 Integrating Chaotic Optimization into BCC Algorithm 614
66.3.3 NBCC Algorithm for Function Optimization Problem 615
66.4…Numerical Experiments 616
66.5…Conclusions 617
Acknowledgments 617
References 617
67 Time--Space Hybrid Markov Model 619
Abstract 619
67.1…Introduction 619
67.2…Problem Description 620
67.3…TSHMM Recommendation Algorithm 621
67.3.1 Time model 621
67.3.2 Space model 622
67.3.2.0 One-hop and multi-hop model 622
67.3.2.0 One-hop model 622
67.3.2.0 Multi-hop model 622
67.3.3 TSHMM recommendation algorithm 623
67.3.4 Discussion 624
67.4…Experiments 624
67.5…Conclusion 626
References 626
68 Research on Turning Parameters Optimization Based on Genetic Algorithm 627
Abstract 627
68.1…Introduction 627
68.2…The Objective Functions and Design Variables 628
68.3…Constraints 628
68.4…Turning Parameters Optimization 630
68.4.1 Optimization Result of GA Operation 631
68.5…Conclusion 632
References 633
69 A Power of a Meromorphic Function Sharing 1 IM with Its Derivative 634
Abstract 634
69.1…Introduction 634
69.2…Some Lemmas 636
69.3…Proof of Theorem 1 638
Acknowledgement 641
References 641
70 The Application of Particle Swarm Optimization in Stock Prediction and Analysis 643
Abstract 643
70.1…Introduction 643
70.2…Stock Prediction and Analysis Means 644
70.3…The Application of Particle Swarm Optimization on Stock Prediction 645
70.4…Conclusion 647
References 648
71 Research on a Novel Distributed Multi Agent System Plan Method 649
Abstract 649
71.1…Introduction 650
71.2…Base on Constraint Propagations’ Distributed-Multi-Agent-Plan 651
71.3…Arithmetic Distributed-Multi-Agent-Plan (OPS, CaS, I, G) 652
71.4…Conclusion 654
Acknowledgment 654
References 654
72 A Method of Object Detection Based on Improved Gaussian Mixture Model 656
Abstract 656
72.1…Introduction 657
72.2…Improved Gaussian Mixture Model 657
72.2.1 Improved Algorithm Based on Chroma Space 657
72.2.2 Fast Convergence Algorithm Based on Nearest N-Frame 658
72.2.3 Algorithm Implementation and Result Analysis 659
72.3…Conclusion 662
References 662
73 A Novel Dynamic Resource Allocation Model Based on MAS Coordination 663
Abstract 663
73.1…Introduction 663
73.2…MAS Resources Coordinating 664
73.3…Effectiveness Analyses 666
73.4…Conclusion 668
Acknowledgment 669
References 669
Part VIIEducation and Informatics 670
74 Research on Comprehensive Evaluation of Classroom Teaching Quality Based on Multi-Element Connection Number 671
Abstract 671
74.1…Introduction 671
74.2…Concept of Set Pair Analysis and Multi-Element Connection Number 672
74.2.1 Concept of Set Pair Analysis 672
74.2.2 Concept of Multi-Element Connection Number 673
74.3…Evaluation Process 674
74.3.1 Establish Evaluation Index System 674
74.3.2 Establish the Weight Set 674
74.3.3 Establish the Evaluation Set 675
74.3.4 Establish the Evaluation Matrix 675
74.3.5 First Level Evaluation 676
74.3.6 Second Level Evaluation 677
74.3.7 An Analysis of Comprehensive Evaluation Multi-Element Connection Number mu 677
74.4…Conclusions 678
References 678
75 Program Design of DEA Based on Windows System 679
Abstract 679
75.1…Introduction 679
75.2…The Algorithm Design of C2R Model and BC2 Model 680
75.3…The Computer Program Design of C2R Model and BC2 Model 683
75.3.1 The Structure and Program Design of DEA Software System 683
75.3.2 The Design of the Input and Output System 686
Acknowledgments 687
References 687
76 An Incremental and Autonomous Visual Learning Algorithm Based on Internally Motivated Q Learning 688
Abstract 688
76.1…Introduction 689
76.2…Visual Novelty Based Internal Motivation 690
76.3…Internally Motivated Q Learning 692
76.4…Experimental Result and Analysis 694
76.4.1 Experiment Design 694
76.4.2 Experimental Result and Analysis 695
76.5…Conclusion 697
Acknowledgments 697
References 697
77 Design and Implement of Information System for Water Management Based on SaaS 699
Abstract 699
77.1…Introduction 699
77.2…Introduction of SaaS 700
77.3…Design and Implement of Level 3 Maturity Model 700
77.3.1 Multi-Tenant Data Architecture 700
77.3.2 Custom Data Model 701
77.3.3 Configurable Invoice 701
77.3.4 Configurable User Interface 703
77.3.4.1 Configurable System Menu 703
77.3.4.2 Configurable Page Elements 703
77.3.5 Configurable Functions 704
77.4…Conclusions 705
References 706
78 Pulse-Based Analysis on Teaching Quality Evaluation 707
Abstract 707
78.1…Introduction 708
78.2…Emotion, Pulse and Cognition 708
78.2.1 Emotion and Pulse 708
78.2.2 Emotion and Cognition 709
78.3…Pulse Characteristics Parameters 710
78.3.1 Pulse Position 711
78.3.2 Pulse Rate 711
78.3.3 Pulse Presentation 711
78.4…Teaching Evaluation Model 712
78.4.1 Emotional Model 712
78.4.2 Teaching Evaluation Model 714
78.5…Conclusions 714
References 715
79 French Learning Online Platform: French Livehand 716
Abstract 716
79.1…Introduction 716
79.2…Design and Implementation 717
79.2.1 ExtJS 717
79.2.2 Struts2 718
79.3…Main Functions 718
79.3.1 Intelligent Word-Searching System 718
79.3.2 Translation System 718
79.3.3 Scene System 719
79.3.4 Grammar System 719
79.3.5 User Management System 720
79.4…Conclusion 720
References 721
80 Application of Text Data Mining to Education in Long-Distance 722
Abstract 722
80.1…Introduction 722
80.2…Vector Space Model 723
80.3…The Recommendation of the Corresponding Web Page Hyperlink Method 724
80.4…The Recommended Method Based on Cooperation 724
80.5…Conclusion 727
References 727
Part VIIIFuzzy System and Control 729
81 Adaptive Disturbance Rejection Control of Linear Time Varying System 730
Abstract 730
81.1…Introduction 730
81.2…Preliminary 731
81.3…Main Results 733
81.4…Illustrative Example 735
81.5…Conclusion 736
References 737
82 Nonlinear Predictive Functional Control Based on Support Vector Machine 738
Abstract 738
82.1…Introduction 738
82.2…Support Vector Machine for Regression 739
82.3…PFC Based on SVM 740
82.3.1 Nonlinear Predictive Model Based on SVM 740
82.3.2 Reference Trajectory 742
82.3.3 Modeling Error Compensation 742
82.3.4 PFC Optimal Control law for Step Setpoint 743
82.3.5 PFC Optimal Control law for Ramp Setpoint 743
82.3.6 NPFC Control Algorithm Based on SVM 744
82.4…Simulation Study 745
82.5…Conclusions 746
References 747
83 Analysis and Circuit Simulation of a New Four-Dimensional Lorenz Time-Delay Chaotic System 748
Abstract 748
83.1…Introduction 748
83.2…Description of System Model 749
83.2.1 Simulation of the Constructed Time-delay System 749
83.2.2 Stability Analysis of the New Time-Delay System 750
83.3…Time-Delay Oscillator Circuit 752
83.3.1 Design of Chaotic Switching Circuit 752
83.3.2 Time-Delay Circuit Unit 754
83.4…Conclusion 755
Acknowledgments 755
References 756
84 The Design of Adaptive PI Speed Controller for Permanent Magnet Synchronous Motor Servo System 757
Abstract 757
84.1…Introduction 757
84.2…Mathematical Model of the PMSM 758
84.3…Identification RBFNN Based on IPSO Algorithm 759
84.3.1 RBFNN 759
84.3.2 IPSO Algorithm 760
84.3.3 Identification RBFNN 761
84.3.4 Designe of Adaptive Speed Controller Based on RBFNN 762
84.4…Simulation Results 763
84.5…Conclusion 764
References 764
85 Application of BP Neural Network in Faults Diagnosis of Process Valve Actuator 766
Abstract 766
85.1…Introduction 767
85.2…Experimental Test Rig 768
85.2.1 Pneumatic Control Valve 768
85.2.2 The Set of Available Signals 768
85.2.3 Control Valve Faults 769
85.3…BP Neural Network 770
85.3.1 Network Structure 770
85.3.2 Network Training 771
85.4…Results 772
85.5…Conclusions 773
References 774
86 Optimal Detection of Distributed Target with Fluctuating Scatterers 775
Abstract 775
86.1…Introduction 775
86.2…Problem Formulation 776
86.3…Binary Integrator 777
86.4…Optimal Detection Threshold 778
86.5…Conclusions 781
Acknowledgments 781
References 781
87 Output Feedback Control for an Active Heave Compensation System 783
Abstract 783
87.1…Introduction 783
87.2…Problem Formulation 784
87.3…Adaptive Observer Design 786
87.4…Controller Design 788
87.5…Simulation Results 791
87.6…Conclusions 792
Acknowledgments 792
References 792
88 Models for Multiple Attribute Decision Making with Intuitionistic Trapezoidal Information 793
Abstract 793
88.1…Introduction 793
88.2…Preliminaries 794
88.3…Models for Multiple Attribute Decision Making with Intuitionistic Trapezoidal Fuzzy Information 795
88.4…Conclusion 796
References 797
89 Modeling the Risk Factors in Ergonomic Processes Using Fuzzy Logic 798
Abstract 798
89.1…Introduction 798
89.2…Literature Survey 799
89.3…Mathematical Proposition 800
89.4…Proposed Algorithm 801
89.4.1 Data Set and Analysis 802
89.5…Conclusion 802
References 803
90 Modified Projective Synchronization of Uncertain Chaotic Systems 804
Abstract 804
90.1…Introduction 804
90.2…Synchronization Criteria 805
90.3…Conclusions 809
Acknowledgment 809
References 809
91 Multi-Agent Based Architecture Supporting Collaborative Product Lightweight Design 810
Abstract 810
91.1…Introduction 811
91.2…Related Work 812
91.2.1 Agent and Multi-Agent System 812
91.2.2 Collaborative Product Lightweight Design Systems 812
91.3…Generic System Architecture Supporting Collaborative Product Lightweight 812
91.3.1 Generic System Architecture 812
91.3.2 CAX Agent 814
91.4…Operation Process of the System 815
91.5…Conclusion 816
Acknowledgments 817
References 817
92 Fuzzy Controller Design with Fault Diagnosis System Condition On-line Monitor Using Neural Network 819
Abstract 819
92.1…Introduction 819
92.2…Fuzzy Controller Design 821
92.2.1 Fuzzy Control Strategy 821
92.2.2 Error Percent Determination 824
92.3…System Condition On-line Monitor Using Neural Network 825
92.3.1 Network Structure 825
92.3.2 Training Data 826
92.3.3 Network Training 826
92.4…Practical Implementation 827
92.5…Conclusions 828
References 829
Part IXForensics, Recognition Technologies andApplications 830
93 Fingerprint Orientation Template Matching Based on Mutual Information 831
Abstract 831
93.1…Introduction 832
93.2…Mutual Information 833
93.3…Estimation and Quantization of Fingerprint Orientation 834
93.4…MI of Fingerprint Orientation 834
93.5…Fingerprint Matching 836
93.6…Experimental Results and Conclusion 836
References 837
94 Human Action Recognition Algorithm Based on Minimum Spanning Tree 839
Abstract 839
94.1…Introduction 839
94.2…Human Motion Levels Model 840
94.2.1 Human Body and Texture Model 840
94.2.2 Cluster-Based Motion Model of the Relevant Action 841
94.3…Spanning Tree Algorithm Based on RPC 841
94.4…Human Actions Recognition Algorithm 843
94.4.1 The 2D Model Reasoning Based on the RPC 843
94.4.2 The 3D Human Motion Reasoning 844
94.4.3 Proposal Function 844
94.5…Experiment Analysis 845
Acknowledgments 846
References 846
95 Analysis of Selvi et al.’s Identity-Based Threshold Signcryption Scheme 848
Abstract 848
95.1…Introduction 848
95.2…Preliminaries 850
95.2.1 Bilinear Pairing 850
95.2.2 Computational Problems 850
95.2.3 Identity Based Threshold Signcryption 850
95.3…Review of Selvi et al.’s Identity-Based Threshold Signcryption Scheme 851
95.4…Cryptanalysis of Selvi et al.’s Scheme 852
95.5…Conclusion 853
References 854
96 Analysis of an Authenticated 3-Round Identity-Based Group Key Agreement Protocol 856
Abstract 856
96.1…Introduction 856
96.2…Paper Preparation 857
96.2.1 Bilinear Pairing 857
96.2.2 Computational Problems 858
96.2.3 Introduction of BR Security Model 858
96.3…Review of Gang Yao et al.’s Protocol 859
96.4…Cryptanalysis of Gang Yao et al.’s protocol 861
96.5…Conclusions 862
Acknowledgments 862
References 862
97 Research on ECC Digital Certificate in ATN 864
Abstract 864
97.1…Introduction 864
97.2…The Application of Digital certificates in the ATN Air-Ground Communication 865
97.2.1 Key Establishment Phase 865
97.2.2 Application Service Communication Phase 866
97.3…A ATN-ECC Structure Digital Certificate 866
97.4…Certificate Requests, Issue and Compression 867
97.4.1 Certificate Request 867
97.4.2 Certificate Issue 868
97.4.3 Compression Certificate 868
97.5…Performance Analysis 869
97.5.1 Size of the Key and Certificate 869
97.5.2 Computing Time 870
97.6…Conclusions 871
References 871
98 A Robust Method Based on Static Hand Gesture Recognition for Human--Computer Interaction Under Complex Background 873
Abstract 873
98.1…Introduction 873
98.2…Hand Region Segmentation and Extracting Features 875
98.2.1 Image Binaryzation by Otsu Algorithm 875
98.2.2 Find Contours and Calculate Their Area 875
98.2.3 Extracting Features 876
98.3…Classifier Construction 876
98.3.1 Support Vector Machines 877
98.3.2 Data Set Training 877
98.3.3 Classifying the Hand Gesture and Non-Hand Gestures 878
98.4…Experimental Results 879
98.4.1 Experiments on Testing Samples 879
98.4.2 Tests on Real-Time 879
98.5…Conclusion 880
Acknowledgment 880
References 880
99 Research on Privacy Preserving Based on K-Anonymity 881
Abstract 881
99.1…Introduction 881
99.2…K-Anonymity Model 882
99.3…K-Anonymity Model for the Main Algorithm 882
99.3.1 Generalization and Suppression 882
99.3.2 The Enhanced K-Anonymity Model 884
99.3.2.1 L-Diversity Model 884
99.3.2.2 ( alpha , k)-Anonymous Model 884
99.3.2.3 ( alpha , L)-Diversification K-Anonymity Model 885
99.4…Development Trend and Summary 888
Acknowledgments 888
References 888
100 Existential Forgery Attack Against One Strong Signature Scheme 890
Abstract 890
100.1…Introduction 890
100.2…Preliminary 892
100.3…Review of the GMY Strong Signature 893
100.3.1 Setup 893
100.3.2 Signing 893
100.3.3 Verification 894
100.4…An Existential Forgery to the GMY Strong Signature 895
100.4.1 The Basic Idea 895
100.4.2 Attack 896
100.4.3 Correctness 897
100.5…Conclusion 898
Acknowledgements 898
References 898
101 Improved Min-Sum Decoding Algorithm for Moderate Length Low Density Parity Check Codes 899
Abstract 899
101.1…Introduction 899
101.2…Representation of LDPC Codes 901
101.2.1 Algebraic Representation 901
101.2.2 Tanner Graph Representation 901
101.2.3 LDPC Min-Sum Decoding Algorithm 902
101.3…Modified Min-Sum Decoding Algorithm 903
101.3.1 Variable Message Update Conditions 903
101.3.2 Method for Variable Message Correction 904
101.3.3 Hardware Implementation and Complexity Analysis 905
101.4…Simulation Results 905
101.5…Comparison and Analysis 905
101.6…Conclusion 906
Acknowledgments 907
References 907
102 Cryptanalysis of an Authentication Protocol for Session Initiation Protocol 908
Abstract 908
102.1…Introduction 908
102.2…Review of Chen et al.’s Scheme 909
102.2.1 Setup Phase 910
102.2.2 Mutual Authentication with Key Agreement Phase 910
102.3…Weaknesses of Chen et al.’s Scheme 911
102.3.1 Off-line Password Guessing Attack and Forgery Attack 911
102.3.2 Perfect Forward Secrecy 912
102.3.3 Other Weakness 912
102.4…The Proposed Scheme for SIP 912
102.4.1 Setup Phase 912
102.4.2 Mutual Authentication with Key Agreement Phase 913
102.5…Security Analysis 914
102.5.1 Password Guessing Attack and Smart Card Lost Attack 914
102.5.2 Replay Attack and Forgery Attack 914
102.5.3 Denning--Sacco Attack 914
102.5.4 Known-Key Security and Session Key Security 914
102.5.5 Perfect Forward Security 915
102.6…Conclusions 915
Acknowledgment 915
References 915
103 A Cognitive Model in Biomimetic Pattern Recognition and Its Applications 916
Abstract 916
103.1…Introduction 916
103.1.1 Face Recognition 917
103.1.2 Keywords Recognition 917
103.2…Cognitive Algorithm 917
103.2.1 Cognitive Model 917
103.2.2 Cognitive Algorithm 918
103.2.3 Recognition Algorithm 918
103.3…Application in Face Recognition 919
103.3.1 Experiments and Results 919
103.3.2 Results Analysis 920
103.4…Application in Keywords Recognition 920
103.4.1 Experiments and Results 920
103.4.2 Results Analysis 920
103.5…Conclusion 922
References 923
104 One Way to Enhance the Security of Mobile Payment System Based on Smart TF Card 924
Abstract 924
104.1…Introduction 925
104.2…Related Works 925
104.2.1 Identity Authentication Method in Mobile Payment Process 925
104.2.2 Mechanism of Data Encryption 926
104.3…Smart TF Card Based Security Improvement Method 927
104.3.1 Mobile Phone Client System 927
104.3.1.1 Smart Card 927
104.3.1.2 Firmware of Smart Card 927
104.3.1.3 Mobile Phone Software 927
104.3.2 Double Factor Authentication of User Identity 928
104.3.3 Two-Way Identity Authentication Protocol 928
104.4…Implementation of the Method 930
104.4.1 Internal Structure of Z8D64U Chip 930
104.4.2 State Transition of Firmware 930
104.5…Conclusion 932
References 932
105 Localization on Discrete Grid Graphs 934
Abstract 934
105.1…Introduction 935
105.2…Grid Graphs Planning Tasks 935
105.3…Logical Model 936
105.4…Robot Experimental Setup 937
105.5…Summary 940
References 940
Part XElectronic Applications 942
106 The Research of Chinese Q& A System Based on Similarity Algorithm
Abstract 943
106.1…Introduction 943
106.2…The Theoretical Basis of Chinese Question Answering System 944
106.2.1 HowNet Structure 944
106.2.2 The Classification of Chinese Question Answering System 944
106.2.2.1 Field Classification 944
106.2.2.2 Characteristics Classification 945
106.2.3 Characteristics of Chinese Information Processing 945
106.2.4 Questions Eigenvector Extraction 945
106.3…Chinese Q& A System Model
106.3.1 Framework of Chinese Q& A System
106.3.2 Questions Pretreatment 946
106.3.2.1 Chinese Word Segmentation and Part-of-Speech Tagging 946
106.3.2.2 Determination of Questions Categories 947
106.3.2.3 The Extraction of Keywords 947
106.3.2.4 Keywords Expansion 947
106.3.3 Weighted Feature Statements Similarity Calculation 947
106.3.3.1 Words Similarity 947
106.3.3.2 Morphological Similarity 948
106.3.3.3 The Similarity of Trace Word Order 949
106.3.3.4 Structural Similarity 949
106.3.3.5 The Similarity of Sentence Length 949
106.3.3.6 Semantic Similarity 950
106.3.3.7 Sentence Similarity 950
106.3.4 Answer Extraction 950
106.3.4.1 Track of Sentence Similarity Sorting 950
106.3.4.2 The Mandatory Keywords Filtering Rainfall Distribution 950
106.3.4.3 The Rule Final Answer Extraction Technology 950
106.4…Experimental Results and Analysis 951
106.5…Conclusion 951
References 952
107 A Model-Driven Method for Service-Oriented Modeling and Design Based on Domain Ontology 953
Abstract 953
107.1…Introduction 953
107.2…Our Approach 954
107.3…Domain Modeling 955
107.4…Mapping and Modeling in PIM Layer 956
107.5…Mapping and Modeling in PSM Layer 958
107.6…Conclusion and Future Work 960
References 960
108 Design of Three-Dimensional Garage Monitoring System Based on WinCC 961
Abstract 961
108.1…Introduction 962
108.2…Automatic Three-Dimensional Garage 962
108.2.1 Working Principles 962
108.2.2 Monitoring System Constitutes 963
108.3…Design and Implementation on Monitoring System 963
108.3.1 The Design of Host Computer Software 963
108.3.1.1 The Abstraction of System Model 963
108.3.1.2 The Program of Model Transformation 964
108.3.2 The Implementation of Monitoring System 964
108.4…Communication Realization 965
108.4.1 Control Panel Setting 965
108.4.2 Setting of WinCC 965
108.4.3 The Connection and Realization of the System Communication 966
108.5…Conclusion 967
Acknowledgments 967
References 968
109 A Hybrid Modeling Method for Service-Oriented C4ISR Requirements Analysis 969
Abstract 969
109.1…Introduction 969
109.2…Ontology Definitions 970
109.3…Modeling Process 972
109.4…Conclusions and Future Works 976
References 976
110 Study on Normalized Operation of Internet Drugs Market 978
Abstract 978
110.1…Introduction 979
110.2…Regulation Status in Quo of Internet Drugs Market 979
110.2.1 Current Laws and Regulations 979
110.2.2 Regulation Status 980
110.3…Problems in Normalized Operation of Internet Drugs 981
110.3.1 Related Laws and Regulations of Internet Drugs Transaction are Imperfect 981
110.3.2 Monitoring Methods of Internet Drugs Information 981
110.3.3 Lacking of Consumer Privacy Protection Measures 982
110.4…Countermeasures 982
110.4.1 Legal System of Internet Drug Transactions Regulation 982
110.4.2 High-Tech Means for Internet Drug Transaction Regulation 983
110.4.3 Appropriate Measures to Protect Consumers’ Privacy 983
110.4.4 Regulation on Medicines from International Online Pharmacies 983
110.4.5 Publicity Work 984
110.5…Conclusions 984
References 984
111 Study on Accounting Shenanigan in Universities Using Improved Game Theory 986
Abstract 986
111.1…Introduction 987
111.2…Accounting Shenanigans in Universities 988
111.2.1 Jobbery 988
111.2.2 Organized Crime 988
111.2.3 Small Private Treasury 989
111.3…Accounting Shenanigans Analysis via Improved Game Theory 990
111.3.1 The Evolutionary Game Characteristics of Government and Universities 990
111.3.2 Dynamic Replication Equation between Government and Universities 990
111.4…Stability Analysis of Evolutionary Stable Strategy between Government and Universities 991
111.5…Conclusions 992
References 993
112 Improved Iterative Decoding Algorithm for Turbo Codes 994
Abstract 994
112.1…Introduction 994
112.2…Log-MAP and SOVA 995
112.2.1 Log-MAP Algorithm 995
112.2.2 SOVA 996
112.2.2.1 Computing the Accumulative Path Metric 996
112.2.2.2 Computing a Soft Decision Value 996
112.2.2.3 Computing Extrinsic Information Before Updating Soft Decision Value 996
112.3…Improved Iterative Decoding Algorithm 997
112.3.1 Complexity Reduction by Combining SOVA and Log-MAP Iterations 997
112.3.2 Initializing a Priori Input for Log-MAP Iterations by Selecting Extrinsic Output from SOVA Iterations 998
112.4…Simulations 999
112.5…Conclusions 1001
References 1002
113 Financial Evaluation of the Listed Companies Based on Statistical Analysis Methods 1003
Abstract 1003
113.1…Introduction 1003
113.2…Methods and Sample Analysis 1004
113.3…Comprehensive Evaluation 1007
113.3.1 Factor Analysis Evaluation 1007
113.3.2 Cluster Analysis and Discriminated Results 1009
113.3.3 Cluster Statistical Feature 1010
113.3.4 Cluster Results Evaluation 1010
113.4…Conclusions 1011
References 1011
114 Research of the Timer Granularity Based on Linux 1012
Abstract 1012
114.1…Preface 1013
114.2…Implementation of Clock Granularity Detailing 1013
114.2.1 Choice of Optimization Scheme 1013
114.2.2 Implement of Optimization Scheme 1014
114.3…Experiment 1016
114.4…Conclusion 1018
Acknowledgements 1018
References 1018
115 A New Software to Realize the Optimization of City Sound-Planning 1019
Abstract 1019
115.1…Initial Clue Come from Questing a City Sound Phenomenon 1019
115.2…Three New Theories to Describe the Interactions Between Neighboring Sound Spaces 1020
115.3…A New Database to Represent Sound Spaces 1021
115.4…Realization of the Optimization of City Sound-Planning 1023
115.5…Prospects 1026
References 1026
Part XIGraphics and Visualizing 1027
116 Automatic Classification and Recognition of Particles in Urinary Sediment Images 1028
Abstract 1028
116.1…Introduction 1028
116.2…Theoretical Background 1029
116.3…Algorithm Design 1031
116.4…Experiment Results 1032
116.5…Conclusion and Discussion 1034
References 1034
117 Ultrasound Strain and Strain Rate Imaging of the Early Sage of Carotid Artery with Type 2 Diabetes Mellitus 1036
Abstract 1036
117.1…Methods 1037
117.2…Statistical Analysis 1039
117.3…Results 1039
117.4…Discussion 1039
117.5…Conclusion: 1043
References 1043
118 Rate Control for Multi-View Video Coding Based on Statistical Analysis and Frame Complexity Estimation 1045
Abstract 1045
118.1…Introduction 1045
118.2…The Proposed Rate Control Algorithm for MVC 1046
118.2.1 Target Bit Rate Allocation Scheme for View Level 1047
118.2.2 Target Bit Rate Allocation Scheme for GOP Level 1049
118.3…Experiment Results 1050
118.4…Conclusion and Future Work 1052
Acknowledgments 1053
References 1053
119 Time-Consistent Preprocessing of Depth Maps for Depth Coding in 3DTV 1054
Abstract 1054
119.1…Introduction 1054
119.2…Time-Consistent Preprocessing of Depth Map 1055
119.2.1 Analysis on time-consistency of depth maps 1055
119.2.2 Analysis on SKIP Mode Distribution in Color Video Coding 1056
119.2.3 The proposed time-consistent preprocessing algorithm of depth maps 1057
119.3…Experimental Results and Analyses 1058
119.4…Conclusion 1061
Acknowledgments 1061
References 1061
120 A Mixture of Gaussian-Based Method for Detecting Foreground Object in Video Surveillance 1063
Abstract 1063
120.1…Introduction 1063
120.2…Related Work 1064
120.3…Mixture of Gaussian Background Modeling Algorithm 1065
120.4…Statistics-Based Tracking Algorithm 1067
120.4.1 Object Detector 1067
120.4.2 Object Tracker 1067
120.5…Experimental Result 1068
120.6…Conclusion 1071
Acknowledgments 1071
References 1071
121 Video Deformation Based on ASM 1073
Abstract 1073
121.1…Introduction 1073
121.2…ASM 1074
121.2.1 Shape Model 1074
121.2.2 Local Texture Model 1076
121.2.3 Process of Searching Object 1077
121.2.4 The Result of Video Tracking 1078
121.3…Deformation Technology Based on Feature Segment 1078
121.4…Realization of Video Deformation 1079
Acknowledgments 1081
References 1081
122 An Enhanced Hybrid Image Watermarking Algorithm Using Chaotically Scrambled Technology 1082
Abstract 1082
122.1…Introduction 1082
122.2…Watermarking Embedding Algorithm 1083
122.3…Watermarking Detection and Extraction Algorithm 1085
122.4…Experimental Results and Performance Analysis 1086
122.5…Conclusion 1088
References 1088
123 A Digital Watermarking Technology Based on Wavelet Decomposition 1089
Abstract 1089
123.1…Introduction 1089
123.2…Embedding Watermarks 1090
123.3…Watermark Identifying 1092
123.4…Experiment Result 1092
123.5…Conclusion 1095
Acknowledgments 1095
References 1095
124 An Improved Rate Control Algorithm of H.264/AVC Based on Human Visual System 1096
Abstract 1096
124.1…Introduction 1096
124.2…Analysis of Assessment Effect on Video Quality Produced by Human Visual System 1097
124.3…Adjust Rule Enactment of Rate-Controls Parameter 1100
124.4…Experimental Results 1100
124.5…Conclusion 1101
References 1102
125 Contour Lines Extraction from Color Scanned Topographical Maps with Improved Snake Algorithm 1103
Abstract 1103
125.1…Introduction 1103
125.2…Snake Model 1104
125.3…Improved Algorithm of Tracking 1104
125.3.1 Seed Segments Detection 1105
125.3.2 Internal Energy of Snake Algorithm 1106
125.3.3 External Energy of Snake Algorithm 1106
125.3.4 Process of the Snake Algorithm 1108
125.4…Experiments and Conclusion 1109
References 1110
126 The Aberration Characteristics of Wave-Front Coding System for Extending the Depth of Field 1111
Abstract 1111
126.1…Introduction 1111
126.2…MTF with Aberration 1112
126.2.1 Wave Aberration 1112
126.2.2 The Derivation of MTF With Aberration 1112
126.3…Aberration Characteristics 1113
126.3.1 MTF with Coma 1114
126.3.2 MTF with Spherical Aberration 1114
126.3.3 MTF with Coma and Spherical Aberration 1114
126.3.4 MTF with Defocus, Coma and Spherical Aberration 1115
126.4…Conclusion 1116
References 1116
Part XIIGreen Computing 1118
127 Two Improved Nearest Neighbor Search Algorithms for SPH and Their Parallelization 1119
Abstract 1119
127.1…Introduction 1119
127.2…Basic Principles of SPH 1120
127.3…Algorithm Description 1121
127.4…Time Complexity of Algorithm 1123
127.5…Numerical Simulation and Results Analysis 1124
127.6…Parallel Implementation 1125
127.7…Conclusion 1126
Acknowledgments 1127
References 1127
128 Comprehensive Evaluation of TPL Using Genetic Projection Pursuit Model with AHP in Supply Chain 1128
Abstract 1128
128.1…Introduction 1129
128.2…Appraisal Target System of TPL Providers 1129
128.3…Modeling Process of Projection Pursuit Clustering 1131
128.3.1 Normalization 1131
128.3.2 Design Weights Preliminary 1132
128.3.3 Linear Projection 1132
128.3.4 Fitness of Projection Pursuit 1132
128.3.5 Optimize Projection Direction 1133
128.4…GA to Implement the Projection Pursuit Clustering 1133
128.5…Calculation Case Analysis 1134
128.6…Conclusion 1136
Acknowledgments 1136
References 1136
129 A Modified PID Tunning Fitness Function Based on Evolutionary Algorithm 1137
Abstract 1137
129.1…Introduction 1137
129.2…Fitness Function 1138
129.2.1 Integral Index Fitness Function on the Basis of Optimal Control 1138
129.2.2 Fitness Function Based on the Weighted Sum of Some Performance Indexes of System Time Domain Response 1139
129.2.3 A Universal Fitness Function Based on the System Step-response Index of the System 1139
129.3…Computer Simulation 1141
129.4…Conclusion 1145
References 1145
130 Analysis of Convergence for Free Search Algorithm in Solving Complex Function Optimization Problems 1147
Abstract 1147
130.1…Introduction 1147
130.2…Mathematical Model of FS 1148
130.2.1 Parameter Initialization and Generation of Initial Group 1148
130.2.2 Search Behavior 1149
130.2.3 Termination Condition 1149
130.3…Convergence Proof for FS 1149
130.3.1 FS Convergence in Continuous Space 1149
130.3.2 FS Convergence in Discrete Space 1150
130.4…Experiments 1151
130.5…Conclusion 1152
Acknowledgements 1153
References 1153
131 Design of FH Sequences with Given Minimum Gap Based on Logistic Map 1 1154
Abstract 1154
131.1…Introduction 1154
131.2…Design of Chaotic FH Sequences 1155
131.3…Performance Analysis and Simulation Experiment 1157
131.3.1 Frequency Hopping Gap 1158
131.3.2 Hamming Correlation Property 1159
131.3.3 Balance Property 1162
131.3.4 Bit Error Rate 1162
131.4…Conclusion 1163
References 1164
132 Practical Criteria for Generalized Strictly Diagonally Dominant Matrices 1165
Abstract 1165
132.1…Introduction 1165
132.2…Definition and Lemma 1166
132.3…Main Result 1167
References 1173
133 Research on New Rural Information Service Model of Agricultural Industrial Chain 1174
Abstract 1174
133.1…Introduction 1174
133.2…Related Articles 1175
133.3…Agricultural Industrial Chain for the New Service Model 1176
133.3.1 Come Up with Model 1176
133.3.2 Model Structure 1177
133.4…The Key Points of the New Information Service Mode 1177
133.4.1 The Interaction of Industry Chain 1177
133.4.2 The Featured Services Function of the Industrial Chain Service Center 1179
133.4.2.1 The Application Capabilities Features of Service Function 1179
133.4.2.2 The Integrated Effect of Service Function on the Industrial Chains 1180
133.5…Conclusion 1182
References 1182
134 Reliability Evaluation Algorithm for Distribution Power System 1184
Abstract 1184
134.1…Introduction 1185
134.2…New Network Model for Distribution System 1185
134.3…New Algorithm of Distribution System Reliability Evaluation 1187
134.4…Experiment 1188
134.5…Conclude 1190
References 1191
135 State-of-the-Art Line Drawing Techniques 1192
Abstract 1192
135.1…Introduction 1192
135.2…Technical Overview of Line Drawing Methods 1193
135.3…Image Based Line Drawings 1194
135.4…3D Model Based Line Drawings 1195
135.4.1 Image Space Methods 1195
135.4.2 Object Space Methods 1196
135.4.3 Hybrid Methods 1197
135.5…Future Work 1198
Acknowledgments 1198
References 1198
136 The Cooperation and Competition Mechanism of Supply Chain Based on Evolutionary Game Theory 1201
Abstract 1201
136.1…Introduction 1201
136.2…The evolutionary Game Model of Supply Chain 1202
136.2.1 Background and Assumptions 1202
136.2.2 Payoff Matrix and Replication Dynamics Equations 1203
136.2.3 System Balance Points 1203
136.3…Analysis of the model 1205
136.3.1 The Excess Profits Delta V by Co-Produced 1205
136.3.2 The Initial Cooperation Costs of Suppliers and Manufacturers 1205
136.3.3 The Discount Factor of Suppliers and Manufacturers 1206
136.4…Conclusions and Discussions 1206
References 1206
137 A Method of Function Modeling Based on Extenics 1208
Abstract 1208
137.1…Introduction 1208
137.2…A Method of Function Designing Based on Extenics 1209
137.2.1 Establish Functional Model 1209
137.2.1.1 Function Decomposing 1209
137.2.1.2 Function Solving 1209
137.2.1.3 Combining Solutions 1210
137.2.2 Theoretical Basis of Extension Engineering---Extension Theory 1210
137.2.2.1 Introduction of Extension Theory 1210
137.2.2.2 Contains Analysis Theory 1211
137.2.3 The Relations of the Contain System Method and Functional Modeling 1211
137.2.4 Optimization Evaluation Method 1212
137.3…Case Study 1212
137.3.1 Function Decomposing of the Spring Coiling Machine 1213
137.3.2 Solving Function 1213
137.3.2.1 Principle Introduction 1213
137.3.2.2 The Solutions of Sub-Functions (see Table 137.1) 1215
137.3.3 Establish a Model Based on Function and Extension 1215
137.3.4 Excellent Degree Evaluation 1215
137.4…Summery 1219
Acknowledgments 1220
References 1220
138 Application of MCR-ALS Computational Method for the Analysis of Interactions Between Copper Ion and Bovine Serum Albumin 1221
Abstract 1221
138.1…Introduction 1222
138.2…Materials and Methods 1222
138.2.1 Apparatus 1222
138.2.2 Materials 1223
138.2.3 Procedures 1223
138.2.4 Chemometrics Methods (MCR-ALS) 1223
138.3…Results and Discussion 1225
Acknowledgements 1227
References 1227
139 Self-Learning Algorithm for Visual Recognition and Object Categorization for Autonomous Mobile Robots 1228
Abstract 1228
139.1…Introduction 1228
139.2…Principles of Learning and Self-Learning 1230
139.3…Generation of New Neural Networks 1232
139.4…Control of the Overall Performance 1233
139.5…The Overall Mechanism of Functioning of the Algorithm 1234
139.6…Summary 1234
References 1234
140 Time-Complexity of the Algorithm for Physical Ability Test 1235
Abstract 1235
140.1…Introduction 1235
140.2…Analyzing and Modeling 1236
140.3…Design of Algorithm 1238
140.4…Computed Result 1239
140.5…Time Complexity of Some Approximation Algorithms 1240
140.6…Summary 1240
References 1241
Part XIIIData Management and Database System 1242
141 A Distributed Keyword Search Algorithm in XML Databases Using MapReduce 1243
Abstract 1243
141.1…Introduction 1243
141.2…Related Works 1244
141.3…Problem Model 1245
141.4…System Structures and Algorithm Models 1247
141.4.1 Distributed Data Storage Model 1247
141.4.2 MapReduce-based Search Model 1247
141.4.3 Indexing Strategies 1249
141.5…Experiments and Evaluations 1250
141.6…Conclusions 1251
References 1251
142 A Combined Data Mining Method and Its Application in Water Quality Trends Analysis 1253
Abstract 1253
142.1…Introduction 1253
142.2…Related Work 1254
142.3…The Combined Method 1254
142.3.1 Moving Average Smoothing Method 1254
142.3.2 Reverse Test Method 1255
142.3.3 Linear Regression Model 1256
142.3.4 The Combination of Three Methods 1256
142.3.4.1 Long-Term Water Quality Trends Analysis 1256
142.3.4.2 Uniform Seasonal Water Quality Trends Analysis 1256
142.4…Experiments and Data Analysis 1257
142.4.1 Experimental Data 1257
142.4.2 Long-Term Water Quality Trends Analysis of Water Diversion 1257
142.4.3 Seasonal Water Quality Trends Analysis of Water Diversion 1258
142.5…Conclusions 1260
Acknowldgments 1261
References 1261
143 Model of Enterprise Innovation Based on Data Warehousing 1262
Abstract 1262
143.1…Introduction 1262
143.2…Data Warehouse 1263
143.3…Measurement of Innovation 1264
143.4…Data Acquisition 1264
143.5…Multidimensional Cube Modeling 1265
143.5.1 Hierarchies Modeling 1266
143.5.2 Multidimensional Database Modeling 1266
143.6…OLAP Operations in the Innovation Multidimensional Data Model 1268
143.7…Conclusion 1269
Acknowledgments 1269
References 1269
144 Classifying Imbalanced Dataset Using Local Classifier Fusion 1271
Abstract 1271
144.1…Introduction 1271
144.2…Classification on Imbalanced Distribution 1272
144.2.1 Algorithm 1272
144.2.2 Evaluation Measures 1273
144.3…Local Classifier Fusions for Imbalanced Data 1274
144.3.1 Inspiration from Feature Space 1274
144.3.2 Local Model Fusion 1275
144.4…Experimental Results 1277
144.5…Conclusion 1278
Acknowledgments 1279
References 1279
145 Access Frequency Based Energy Efficiency Optimization in Data Centers 1280
Abstract 1280
145.1…Introduction 1281
145.2…Related Work 1282
145.3…Access Frequency Based Energy Efficiency Optimization 1283
145.3.1 Weight Setting Scheme 1284
145.3.2 Our Redundancy Policies 1285
145.3.3 Avoiding Hot Spots 1287
145.4…Conclusion 1287
Acknowledgments 1288
References 1288
146 Application of Data Mining Technology in Jewelry Design 1289
Abstract 1289
146.1…Introduction 1289
146.2…Microsoft Time Series Algorithm 1290
146.2.1 Using Multiple Time Series 1290
146.2.2 Auto Regression Tree 1291
146.2.3 Seasonality 1291
146.2.4 Making Historical Predictions 1292
146.3…Application of Data Mining Technology for Jewelry Design 1292
146.3.1 Data Ready 1293
146.3.2 The Realization of Model 1294
146.4…Conclusion 1296
References 1296
147 Logic Algebra Method for Solving Theoretic Problems of Relational Database 1298
Abstract 1298
147.1…Introduction 1298
147.2…Preliminary Notions 1299
147.2.1 Logic Algebra 1299
147.2.2 Functional Dependency 1300
147.2.3 Equivalent Theorem 1301
147.3…Application of Logic Algebra Method 1301
147.3.1 Determine Minimal Cover 1302
147.3.2 Determining All Candidate Keys 1302
147.3.3 Determine Closure of a Set of Attributes 1303
147.4…Conclusion 1304
References 1304
148 Design History Knowledge Management System Based on Product Development Process Management and Its Implementation 1305
Abstract 1305
148.1…Introduction 1306
148.2…Review 1306
148.3…Process Based Integrated Framework DHK Management Sytem 1307
148.4…Acquisition and Management of Design History Knowledge 1308
148.5…Implementation 1310
148.6…Summary 1313
Acknowledgments 1313
References 1313
149 The Application of Series Importance Points (SIP) Based Partition Method on Hydrological Data Processing 1314
Abstract 1314
149.1…Introduction 1314
149.1.1 Hydrological Time Series 1315
149.1.2 Time Series Processing Technology 1316
149.2…Distance of Time Series Data 1317
149.3…Segmentation Algorithm Based on the Series Important Point 1319
149.4…The Experiment on Chenglingji’s Water Level of Yangtze River 1321
149.5…Conclusion 1322
References 1323
150 A Novel PSO k-Modes Algorithm for Clustering Categorical Data 1324
Abstract 1324
150.1…Introduction 1324
150.2…K-Modes Algorithm 1326
150.3…The K--P-Modes Algorithm 1327
150.3.1 The Data Pre-Processing 1327
150.3.2 The Encoding and Fitting Function 1328
150.3.3 K-p-Modes Algorithm 1328
150.4…Experiments 1330
150.5…Summary 1330
References 1331
Part XIVE-Commerce and E-Government 1332
151 An Analysis of Influential Factors of Human Resource Allocation in Local Taxation System and the Modeling Approaches 1333
Abstract 1333
151.1…Introduction 1334
151.2…Research Process and Research Methods 1335
151.2.1 Make a List of Influential Factors 1335
151.2.2 Scale the Influential Degree of Each Factor 1335
151.2.3 Decide the Weight of Influential Factors 1336
151.3…Types and Index Composition of Influential Factors 1337
151.3.1 Working Intensity Factors 1337
151.3.2 Working Difficulty Factors 1338
151.3.3 Staff Quality Factors 1338
151.4…The Modeling Approaches of Constructing Human Resource Allocation in Local Taxation System 1339
151.4.1 Collect Data and Work Out the Influential Factors’ Sub-Coefficient of Local Taxation Bureaus 1339
151.4.2 Work Out the Working Difficulty Coefficient of Each Local Taxation Sub-Bureau 1340
151.4.3 Work Out the Working Intensity Coefficient of Each Local Taxation Sub-Bureau 1340
151.4.4 Work Out the Human Resource Demand Coefficient of Each Sub-Bureau 1341
151.4.5 Work Out the Human Resource Allocation Coefficient of Each Sub-Bureau 1341
151.4.6 Decide the Human Resource Allocation Quantity of Each Sub-Bureau 1342
151.5…Suggestions on a Scientific Human Resource Allocation in Local Taxation System 1342
References 1343
152 Classification Learning System Based on Multi-Objective GA and Frigid Weather Forecast 1344
Abstract 1344
152.1…Introduction 1344
152.2…Symbol and Algorithm 1345
152.2.1 Encoding and Decoding 1346
152.2.2 Definition 1347
152.2.3 Fitness Vector Function 1348
152.2.4 Complete Implementation Steps of Algorithm 1348
152.3…Example Analysis 1349
152.3.1 Examples Data 1349
152.3.2 Forecast Chromosomes Output 1350
152.3.3 Forecast Result Output 1351
152.4…Conclusion 1352
References 1352
153 Empirical Analysis on Choice of Payment Terms in Foreign Capital Acquiring State-Owned Enterprise 1353
Abstract 1353
153.1…The Development of Foreign Capital Acquiring State-Owned Enterprise 1354
153.1.1 The First Period 1354
153.1.2 Developing Period 1354
153.2…Legal Surrounding in Foreign Capital Acquiring State-Owned Enterprises 1354
153.2.1 Legislation of the First Period 1354
153.2.2 Legislation in the Development Period 1355
153.3…Payment Terms of Foreign Capital Acquiring State-Owned Enterprises 1356
153.3.1 Cash Payment 1356
153.3.1.1 Cash Purchasing Assets 1357
153.3.1.2 Cash Purchasing Shares Right 1357
153.3.1.3 Cash Purchasing Stocks 1357
153.3.1.4 Cash Purchasing Financial Claim 1357
153.3.1.5 Cash Purchasing Debt 1358
153.3.2 Comprehensive Payment Terms 1358
153.4…Suggestions 1358
Acknowledgments 1359
References 1359
154 An Integrated Application of Tourism Planning Based on Virtual Reality Technology and Indicator Assessment 1360
Abstract 1360
154.1…Introduction 1361
154.2…Study Area 1361
154.3…Method 1362
154.3.1 Indicators Description 1362
154.3.2 VR Environment Assessment 1362
154.3.3 Experience Information of Virtual Reality Platform 1363
154.4…Conclusion 1364
154.4.1 VR Assessment 1364
154.4.2 Matrix Comparison 1364
154.5…Promoted STR Planning 1365
References 1367
155 A Context Information Management Model for Tour Mobile E-Commerce 1368
Abstract 1368
155.1…Introduction 1368
155.2…Theory Review 1369
155.2.1 Context-Aware and Ontology 1369
155.2.2 Fuzzy Rough Sets 1370
155.3…Building the Context Information Management Model Based on Ontology 1370
155.3.1 Classification and Description of Context Information 1370
155.3.2 Quality Constraint of Context Information 1372
155.3.3 Building the Multilevel Ontology of Model 1373
155.4…Applied Example and Analysis 1374
References 1377
156 Quantitative Quality Evaluation and Improvement in Incremental Financial Software Development 1378
Abstract 1378
156.1…Introduction 1379
156.2…Quantitative Software Quality Evaluation 1380
156.2.1 Quantitative Quality Management Framework 1380
156.2.2 Indicate the Possible Quality Issues after Increment 1380
156.2.3 Determine the Quality Status within Increment 1381
156.3…Quantitative Software Defect Analysis and Quality Improvement 1381
156.3.1 Quantitative Software Defect Analysis Based on the Summarized Report of Root Cause Analysis 1381
156.3.2 Quantitative Quality Improvement 1382
156.4…Case Study in Global IT Corporation 1383
156.5…Conclusion and Discussion 1385
Acknowledgments 1385
References 1386
157 Study on Internet Drug Market Access Management 1387
Abstract 1387
157.1…Introduction 1387
157.2…Status Analysis of Internet Drug Market Body Access 1388
157.3…Solution Designing of Internet Drug Market Body 1389
157.4…Continuous Dynamic Monitoring 1392
157.5…Conclusions 1393
Acknowledgment 1393
References 1393
158 Study on the Real-Name System Technology for the Ontology of Internet Medicine Market 1394
Abstract 1394
158.1…Introduction 1394
158.2…Situation and the Main Goal of Internet Real-Name System for the Pharmaceutical Market 1395
158.3…Related Technology for Real-Name System 1396
158.4…Market Ontology Real-name System Certification System 1397
158.5…Conclusion 1400
Acknowledgment 1400
References 1400
159 The Combined Stock Price Prediction Model based on BP Neural Network and Grey Theory 1401
Abstract 1401
159.1…Introduction 1401
159.2…The Combined Prediction Model based on BP--GM (1, N) 1402
159.2.1 Combined prediction 1402
159.2.2 The Combined Stock Price Prediction Model 1404
159.3…Example Analyses 1405
159.4…Conclusions 1407
Acknowledgment 1407
References 1407
Part XVSocial and Economical Systems 1409
160 Multivariate Curve Resolution with Elastic Net Regularization 1410
Abstract 1410
160.1…Introduction 1411
160.2…Multivariate Curve Resolution 1411
160.2.1 MCR Introduction 1411
160.2.2 Curve Resolution Techniques: MCR Techniques 1412
160.3…Elastic Net Regulization 1413
160.4…MCR--LARS Algorithm 1413
160.4.1 Algorithms Judgement Criterion 1413
160.4.2 Algorithms Block Diagram 1415
160.4.3 Algorithms Implementation Details 1415
160.5…Results and Discussion 1416
Acknowledgements 1419
References 1419
161 Research about Exoskeleton’s Reference Trajectory Generation Based on RBF Neural Network 1421
Abstract 1421
161.1…Introduction 1421
161.2…Impedance Control of Exoskeleton System 1422
161.3…RBF Neural Network 1424
161.4…Model Simulation 1425
161.4.1 Simulation with Control 1425
161.4.2 Simulation with Control Based on RBF 1427
161.5…Conclusion 1430
References 1430
162 The Application of Digital Archives Classification with Progressive M-SVM to Wisdom School Building 1432
Abstract 1432
162.1…Introduction 1432
162.2…Several Conventional Text Categorization Methods 1433
162.3…The Application of Digital Archives Classification with Progressive M-SVM 1434
162.4…Specific Steps for Text Classification 1436
162.5…Experiment Design and Result 1437
162.6…Summary 1438
References 1438
163 Economic Growth Differential Model and Short-Term Economic Growth Momentum 1439
Abstract 1439
163.1…Introduction 1439
163.2…Economic Growth Differential Model 1440
163.3…The Reliability Empirical Test of Economic Growth Difference Model 1442
163.4…The Theoretical Significance of Economic Growth Difference Model 1443
163.5…Dynamic Analysis of Our Economic Recovery Strategy 1445
References 1447
164 A Study of Leading Industries Selection in Comprehensive Cities Based on Factor Analysis 1448
Abstract 1448
164.1…Introduction 1448
164.2…Establishing the Index System 1449
164.3…Empirical Study 1449
164.3.1 Factor Analysis Calculation 1449
164.3.2 Discussion 1452
164.4…Conclusions 1453
Acknowledgements 1454
References 1454
165 A Programme-Oriented Algorithm to Compute Ord(f(x)) 1455
Abstract 1455
165.1…Introduction 1455
165.2…Preliminary 1456
165.3…The General Algorithm for OIP 1458
165.4…A Programme-Oriented Algorithm for OIP 1460
165.5…Comparison 1461
165.6…Conclusion 1463
Acknowledgements 1463
References 1463
166 Finding the Academic Collaboration Chance in Open Research Community 1464
Abstract 1464
166.1…Introduction 1464
166.2…Definition of Research Environment 1466
166.2.1 Research Environment Modeling 1466
166.2.2 Related Definitions 1466
166.3…Core Algorithms for Collaboration Chance Finding 1467
166.3.1 Procedure of Text Similarity Calculation 1468
166.3.2 Algorithm for Article Similarity Calculation 1468
166.4…Experiment and Prototype 1470
166.5…Conclusion and Status of Research 1471
Acknowledgment 1472
References 1472
167 Analysis of Competition and Cooperation of Ningbo-Zhoushan Port and Shanghai Port 1473
Abstract 1473
167.1…Introduction 1473
167.2…Comparison of Competitiveness of Ningbo-Zhoushan Port and Shanghai Port 1474
167.2.1 Geographical Location Condition 1474
167.2.2 Supply Condition of the Hinterland 1475
167.2.3 Hardware Condition 1476
167.2.4 Overall Development Level 1477
167.3…Analysis of the Two Port’s Competition and Cooperation Modes by Studying the Cooperation Mode of Foreign Ports 1478
167.3.1 Comparison Mode of Cooperation of Foreign Ports 1478
167.3.2 Port Competition 1478
167.3.3 Port Cooperation 1479
167.3.3.1 Dislocation Development 1480
167.3.3.2 Policy Support 1480
167.4…Summary 1480
References 1481
168 The Study About Long Memory and Volatility Persistence in China Stock Market Based on Fractal Theory and GARCH Model 1482
Abstract 1482
168.1…Introduction 1482
168.2…The Study About Long Memory of the Chinese Stock Market 1483
168.3…Empirical Study about Volatility persistence in China’s Stock Market 1485
Acknowledgment 1487
References 1487
169 Research on Home-Textile Enterprise-Oriented Comprehensive Management Integration Platform and Its Application 1488
Abstract 1488
169.1…Introduction 1489
169.2…System Architecture Design for Comprehensive Integration Platform 1490
169.3…The Development and Application of Integrated Platform 1493
169.4…Summary 1495
Acknowledgments 1495
References 1495
170 Location-Aware Elderly Personal Safety Checking in Smart Home 1496
Abstract 1496
170.1…Introduction 1497
170.2…Location Detection of the Elderly 1498
170.3…Algorithms for the Elderly Personal Safety Checking 1499
170.4…Case Study 1500
170.5…Conclusion and Discussion 1501
Acknowledgments 1502
References 1502
171 Research on Maximum Benefit of Tourist Enterprises Based on the Influence of Scenic Spot Ticket Discount Amount 1504
Abstract 1504
171.1…Proposing the Problems 1505
171.2…Game-Theory Analysis of the Alliance Based on the Influence of Scenic Spot Tickets Discount Amount 1506
171.2.1 Profit Function of the Benefit Participants 1506
171.2.2 Model of Non-cooperation 1507
171.2.3 Model of Cooperation 1508
171.3…Benefit Distribution Based on Shapely Value 1508
171.4…Conclusion 1509
References 1509
Part XVIWeb Service and Data Mining 1510
172 A Fuzzy Multi-Criteria Group Decision Making Approach for Hotel Location Evaluation and Selection 1511
Abstract 1511
172.1…Introduction 1511
172.2…Some Preliminary Concepts 1512
172.3…A Fuzzy Multi-Criteria Approach 1513
172.4…An Example 1516
172.5…Conclusion 1519
References 1520
173 Using Online Self-Adaptive Clustering to Group Web Documents 1521
Abstract 1521
173.1…Introduction 1522
173.2…Paper Preparation 1522
173.3…Experimental Study 1525
173.4…Results Analysis and Conclusions 1527
References 1528
174 An Order-Based Taxonomy for Text Similarity 1529
Abstract 1529
174.1…Introduction 1530
174.2…An Order-based Taxonomy for Text Similarity 1530
174.3…Category 1: Order-Sensitive Similarity 1531
174.4…Category 2: Order-Insensitive Similarity 1532
174.5…Category 3: Order-Semi-Sensitive Similarity 1533
174.6…Conclusion 1534
Acknowledgments 1535
References 1535
175 Distributed Intrusion Detection System Using Autonomous Agents Based on DCOM 1536
Abstract 1536
175.1…Introduction 1536
175.2…System Architecture 1537
175.3…Agent Design with Alert Correlation 1538
175.4…Implementation 1539
175.5…Results 1540
175.6…Conclusion 1541
References 1542
176 A Method for Uncertain Linguistic Multiple Attribute Decision Making and Its Application 1543
Abstract 1543
176.1…Introduction 1543
176.2…Preliminaries 1544
176.3…A Method for Uncertain Linguistic Multiple Attribute Decision Making and its Application to Supplier Selection 1545
176.4…Conclusion 1547
References 1547
177 Web2.0 Environment of Personal Knowledge Management Applications 1548
Abstract 1548
177.1…The Concept of Personal Knowledge Management 1548
177.2…Personal Knowledge Management in Web2.0 Times 1549
177.3…Personal Knowledge Management Skills 1549
177.3.1 Knowledge Acquisition 1549
177.3.2 Knowledge Storage 1550
177.3.3 Knowledge Sharing 1550
177.3.4 Knowledge Utilization 1550
177.4…Personal Knowledge Management Tools. 1551
177.4.1 Social Book Mark 1551
177.4.2 RSS 1552
177.4.3 TAG 1552
177.4.4 Personal Portal (Personal Information Portal) 1552
177.4.4.1 Network Summary and Article Collection Network 1552
177.4.5 BLOG 1553
177.4.5.1 Blogs in the Application of Individual Knowledge Management 1553
177.5…Conclusion 1554
References 1554
178 Semantic Web and Its Applications 1556
Abstract 1556
178.1…Introduction 1556
178.2…Key Technologies 1557
178.2.1 XML and XMLS 1558
178.2.2 RDF and RDFS 1559
178.2.3 Ontologies 1559
178.2.4 OWL 1560
178.2.5 Logic and Inference: Rules 1560
178.3…Applications 1561
178.3.1 Business-to-Business Electronic Commerce 1561
178.3.2 E-Learning 1561
178.3.3 Semantic Web Search 1562
178.3.4 Data Integration 1562
178.4…Future 1563
References 1563
179 A Semantics-Based Web Service Matching Framework and Approach 1564
Abstract 1564
179.1…Introduction 1564
179.2…Web Service Matching Framework 1565
179.3…Semantics-Based Web Service Matching Approach 1566
179.3.1 Category Match of Semantic Web Service 1566
179.3.2 Semantic Web Service Function Information Match 1566
179.4…Improved Calculation of Semantic Similarity 1568
179.4.1 Calculation of Distance-Based Semantic Similarity 1568
179.4.2 Calculation of Property-Based Semantic Similarity 1570
179.4.3 Calculation of Integrated Semantic Similarity 1570
179.5…Experiments 1570
179.6…Conclusion 1571
References 1572
180 Using Integrated Technology to Achieve Three-Dimensional WebGIS System in Park Planning 1573
Abstract 1573
180.1…Questions 1573
180.2…Problem-Solving 1574
180.2.1 The Three-Dimensional WebGIS System and CAD System Data Sharing 1574
180.2.2 Build and Publish Web Three-Dimensional Model 1575
180.3…The Specific Process to Achieve Three-Dimensional WebGIS Function 1576
180.3.1 The Realization of Web-Driven Three-Dimensional Scene and Three-Dimensional Model Visualization 1576
180.3.2 The Realizations on Multiple Three-Dimensional Scene Sightseeing Modes 1576
180.3.3 Three-Dimensional Spatial Query and Measurement 1577
180.3.4 Other Three-dimensional Spatial Analysis Function 1578
180.4…Conclusion 1579
References 1580
181 Hierarchical Base-k Chord Based on Semantic Networks 1581
Abstract 1581
181.1…Introduction 1582
181.2…Related Work 1583
181.2.1 Base-k Chord 1583
181.3…Hierarchical Base-k Chord 1585
181.3.1 Structure of Hierarchical Base-k Chord 1585
181.3.2 Finger Table 1586
181.4…Routing 1587
181.5…Simulations 1588
181.6…Conclusions 1590
Acknowledgments 1590
References 1590
182 Enterprises Application Integration Framework Based on Web Services and Its Interfaces 1592
Abstract 1592
182.1…Introduction 1592
182.2…Analysis of the Traditional EAI 1593
182.2.1 Classification and Characteristics of EAI 1593
182.2.2 Traditional Methods of EAI 1594
182.3…Design a Framework and its Interfaces of EAI Based on WEB Service 1594
182.3.1 Architecture of WEB Service 1595
182.3.2 Design of a EAI Framework Based on WEB Service 1595
182.3.3 Interface Design Principle of WEB Service in the EAI Framework 1597
182.3.4 Implementation of Interfaces in the EAI Framework Based on WEB Service 1598
182.4…Compared with Traditional EAI Method 1598
182.5…Conclusion 1599
Acknowledgments 1599
References 1600
183 The Automatic Classification 3D Point Clouds Based Associative Markov Network Using Context Information 1601
Abstract 1601
183.1…Introduction 1602
183.2…Previous Work 1602
183.3…Associative Markov Random Fields 1603
183.3.1 Definitions 1604
183.3.2 Learning 1604
183.3.3 Inference 1605
183.4…Experiments 1606
183.5…Conclusion 1607
Acknowledgments 1607
References 1608
Author Index 1609

Erscheint lt. Verlag 1.12.2011
Reihe/Serie Lecture Notes in Electrical Engineering
Zusatzinfo XXX, 1706 p. 563 illus.
Verlagsort Dordrecht
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Netzwerke
Mathematik / Informatik Informatik Software Entwicklung
Mathematik / Informatik Informatik Theorie / Studium
Mathematik / Informatik Informatik Web / Internet
Technik Elektrotechnik / Energietechnik
Technik Maschinenbau
Technik Nachrichtentechnik
Schlagworte Communication Networks • Computers • control systems • Cybernetics • Informatics
ISBN-10 94-007-1839-X / 940071839X
ISBN-13 978-94-007-1839-5 / 9789400718395
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 35,5 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das umfassende Handbuch

von Martin Linten; Axel Schemberg; Kai Surendorf

eBook Download (2023)
Rheinwerk Computing (Verlag)
29,90
Das umfassende Handbuch

von Michael Kofler; Charly Kühnast; Christoph Scherbeck

eBook Download (2024)
Rheinwerk Computing (Verlag)
44,90
Grundlagen der IPv4- und IPv6-Kommunikation

von Anatol Badach; Erwin Hoffmann

eBook Download (2022)
Carl Hanser Verlag GmbH & Co. KG
69,99