{"title":"Notice of RetractionStatistical analysis for waveguide CO2 laser broadening effect","authors":"Shufang Li, Jinhuang Guan, Zuoyuan Shen, Zhiying Wu","doi":"10.1109/ICSESS.2011.5982469","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982469","url":null,"abstract":"We propose a new method to transform the parameters into appropriate ratio of work gas, gas pressure and pumping speed for waveguide CO2 laser using independent component analysis (ICA). The waveguide CO2 Laser expresses inhomogeneous broadening by parallel ICA algorithm calculate optimal partial gas composition ratio, gas pressure and pumping speed. It has a potential application in the simultaneous detection of multi-gas based photo acoustic spectroscopy or other infrared spectra when a servomechanism based laser signature is introduced.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129912463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The research and design of honeypot system applied in the LAN security","authors":"Li Li, Hua Sun, Zhenyu Zhang","doi":"10.1109/ICSESS.2011.5982237","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982237","url":null,"abstract":"For the hackers' attacks on the network is constantly updated, the traditional defense dealing with unknown invasion become powerless and can not effectively protect the network. This paper proposes the application of honeypots in the LAN system, where the virtual and physical honeypots are placed in a specific location. Honeypots can initiatively lure hackers to attack the internet, take the record of the ways and means of their invasion, and then analyze and study them. If necessary, the invasion records can be extracted to be evidence. In this way, you can learn about the latest attack methods and tools, updating Firewall and intrusion detection knowledge base and to some extent detering the intruder. This thesis focuses on the combination of a variety of defense technology to explore completely the advantages of Firewall, intrusion detection and honeypot technology to enhance the local area network security.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126895162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Agile adoption experience: A case study in the U.A.E","authors":"H. Hajjdiab, A. Taleb","doi":"10.1109/ICSESS.2011.5982247","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982247","url":null,"abstract":"Agile software development methods and techniques have gained attention in the recent few years. The main motive behind adopting agile software development approach is to improve end-product quality, enhance developer's moral and achieve stakeholder satisfaction. However, Agile adoption always comes with special challenges and thus fundamental organizational changes are necessary for successful outcomes. In this paper we present an in-depth case study for adopting agile methods to a government entity in the United Arab Emirates (U.A.E). The government entity software development teams have used the traditional waterfall approach for many years and decided to move to agile software development approach. This study highlights the challenges faced during the adoption of the Scrum method. Without proper preparation, the challenges will be significant enough to put the agile adoption on hold and make the software development teams go back to the traditional waterfall method.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129103915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An energy-aware backbone construction algorithm in wireless sensor networks","authors":"Tzong-Jye Liu, Hung-Wei Shen, Chia-Lin Lee","doi":"10.1109/ICSESS.2011.5982250","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982250","url":null,"abstract":"In this paper, we propose anenergy-aware algorithm to construct a routing backbonein wireless sensor networks. The proposed algorithm selects the backbone members based on the remaining energy of nodes. The node with higher remaining energy will be selected and become the backbone member to relay the message to the sink. The proposed algorithm uses the countdown mechanism;each node checks if it is a backbone member or not only basing on the local information of the node. Therefore, the proposed algorithm does not have the discovery phase. At the end, the simulation result also shows that the proposed algorithm can efficiently reduce the power consumption for constructing the backbone.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123368386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software design for automatic changing feeds control system and video surveillance","authors":"Yongjiang Li, A. Yusup, Zengwu Sun, Shaoguang Guo","doi":"10.1109/ICSESS.2011.5982331","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982331","url":null,"abstract":"This paper describes a 25m large-scale radio telescope's automatic control system of changing feeds. The software enables a good man-machine interface for automatic changing feeds instead of artificial changing feeds, which saves us a lot of time for changing feed and improves work efficiency. This system has achieved remote control of equipment house, accurate location quickly, real-time collecting data. Through the cameras installed in equipment house and we can view the lifting and dropping state of the feed and achieve the automatic real-time monitoring for changing feeds.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123522221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling and verification of interactive behavior for cyber-physical systems","authors":"Yangli Jia, Zhenling Zhang, Shengxian Xie","doi":"10.1109/ICSESS.2011.5982376","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982376","url":null,"abstract":"Energy Consumption Interaction Automata (ECIA) is presented to model cyber-physical systems' interaction behavior and energy consumption constraint information. The component-interaction automata is an excellent model for specifying architecture and behavior information, but fails to depict energy consumption constraint information in cyber-physical systems. ECIA extends the description ability of component interaction automata by binding each action with an energy consumption interval. ECIA models of cyber-physical systems can be composed together based on the ECIA composition definition we presented in this paper. Applications of ECIA, such as specifying and verifying components' interaction properties in the design stage of developing component-based cyber-physical systems, are discussed. An example is given to demonstrate how ECIA can be used to analyze the energy-related properties of components' behavior in cyber-physical systems.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121594580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of intelligent control based on neural networks in power system","authors":"Sheng-Chun Yang, Lixin Yin","doi":"10.1109/ICSESS.2011.5982234","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982234","url":null,"abstract":"Increasingly nonlinear dynamic loads have been connected into power systems; such as variable speed drives, robotic factories and power electronics loads. This adds to the complexity of load modeling. The increasing complexity of the modern power grid highlights the need for advanced modeling and control techniques for effective control of excitation and turbine systems. The crucial factors affecting the modern power systems today is voltage control and system stabilization during small and large disturbances. Simulation studies and real-time laboratory experimental studies carried out are described and the results show the successful control of the power system excitation and turbine systems with adaptive and optimal neurocontrol approaches.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115815955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Notice of RetractionDevelopment of an innovative method for researching the structural and related parameters effect on the dynamic behavior of hydrobushings","authors":"Ma Tianfei, Qiao Xuebing, Hu Jiehong","doi":"10.1109/ICSESS.2011.5982461","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982461","url":null,"abstract":"Due to their own inherent physical limitations conventional elastomeric bushings cannot simultaneously satisfy the conflicting requirements of low frequency shake control versus high frequency structure-borne noise isolation. These contradicting requirements have brought about the development of hydrobushings. The operational principle of hydrobushings was introduced simply. Meanwhile, two most important dynamic characteristic parameters were illustrated. The novel and innovative model of hydrobushing was built in multi-disciplinary simulation software AMESim (Advanced Modeling and Simulation Environment for systems Engineering). The mathematical software MATLAB (Matrix Laboratory) was used to process the simulation results of model in software AMESim. The dynamic characteristic tests were performed with MTS 831 servo-controlled hydraulic test rig. And experimental data are conformable to the simulation results. Therefore, it proves that virtual prototype model is correct and believable. Finally, this innovative model was used to research how the structural and related parameters have an effect on the dynamic behavior of hydrobushings.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131947297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Polygon topology generation algorithm research based on 3d modeling","authors":"Sa LiangKun, Zhang DeTong","doi":"10.1109/ICSESS.2011.5982333","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982333","url":null,"abstract":"Arrange topological sequence of building surface feature vertex is a significant research field in 3d modeling field. We can get the wire frame model of building by arrange the topological sequence and do some related operation. But there is also lack of an algorithm that quick and suitable for established all of the polygon topological sequence. So this paper review the outstanding progress in generating topological structure on 3d modeling in recent years Some typical algorithms are given its basic ideas and analysis specific algorithm. The advantages and disadvantages of each algorithm are analysis. Provide the guidelines for follow-up study. Its assist the researchers improve the existing algorithm and proposed better new algorithm.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131950252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-time gesture recognition using 3D depth camera","authors":"Guan-Feng He, Sun-Kyung Kang, Won-Chang Song, Sung-Tae Jung","doi":"10.1109/ICSESS.2011.5982286","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982286","url":null,"abstract":"This paper proposes a vision-based human-computer interface system that can interpret a user's gestures in real time to manipulate windows and games. The system uses a 3D depth camera to capture depth data up to 30 frames per second. It extracts hand and fingertips from the acquired depth image. It recognizes the movement and click gesture by analyzing the location and shape change of fingertips. The proposed system is applied to play game “Angry Birds” instead of mouse and keyboard. Experimental results show that the proposed system is more robust than the method using a general camera.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131980440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}