{"title":"Design Criteria for Distributed Multi-Layer Full-Rate Space Time Coding in Wireless Relay Networks","authors":"Jinli Yang, Zhijin Zhao, Haiquan Wang","doi":"10.1109/ITAPP.2010.5566439","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566439","url":null,"abstract":"It has been proved that when the transmit power is sufficiently large distributed space time codes can achieve the maximal diversity order in a wireless relay network. In the previous works, space time codes used in a wireless relay network are limited on unitary space time codes or orthogonal (or quasi- orthogonal) space time codes. In this paper, we apply general multi-layer full-rate space time codes generated by algebraic extension into the wireless relay network. Moreover, the optimal power allocation and the Chernoff upper bound of the pair-wise error probability (PEP) based on the maximum-likelihood (ML) decoding are calculated. Based on this bound, two design criteria of the multi-layer full-rate space time codes are provided.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114502450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Improvement of DTW Algorithm in Speech Recognition","authors":"Dexiang Zhou, Ji-xiang Zhang","doi":"10.1109/ITAPP.2010.5566232","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566232","url":null,"abstract":"This paper discusses an improving algorithm of DTW. Based on primary DTW arithmetic, it uses new algorithm to reduce unnecessary calculated point and only saves the necessary frame matching distance matrix and accumulation distance matrix.The improved algorithm uses MATLAB to carry out simulation and make the best test through analyzing the comparative results. This algorithm will save storage space and enhance computational efficiency .","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117079510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Based on Industrial Ethernet Networking of CNC Machine Tool Monitoring System Design","authors":"Zhonggui Zhang","doi":"10.1109/ITAPP.2010.5566390","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566390","url":null,"abstract":"CNC machine tools of networking and information-oriented are the requests which the modern society develops. Networking Method of CNC machine tools has many kinds. This article describes several networking mode and Analysis of the Ethernet networking of CNC machine tool control system design advantages of. And Introduced the Ethernet-based networking remote monitoring system for CNC machine tools and design principles. Detailed design of Ethernet-based internal communications system and system software design. CNC machine tools to ensure real-time monitoring and reliability, but also economical and practical.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129418448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Method of Unexpected Exception Handling in Workflow Systems","authors":"D. Xiao, Quanfeng Wang","doi":"10.1109/ITAPP.2010.5566479","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566479","url":null,"abstract":"How to handle unexpected exceptions to improve the reliability of workflow system is facing a major problem. The traditional exception handling in workflow system stays in expected exceptions handling, it is lack of the handling of unexpected exceptions, and the main handling of unexpected exceptions relies on the intervention of human, which reduces the efficiency of the system and takes a lot of time. This paper put forward to a method to handle the unexpected exceptions automatically and in real time, when unexpected exceptions are happened, the method can choose a new process definition to replace the current process model automatically, through this method the normal execution of the process can be guaranteed.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128499485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Genetic Algorithm for Static Virtual Topology Reconfiguration in IP/WDM Optical Networks","authors":"Zhanqi Xu, Xing Jin, Zhemin Ding","doi":"10.1109/ITAPP.2010.5566564","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566564","url":null,"abstract":"The transport traffic in WDM optical networks are provided to the networks customers in the form of lightpath via virtual topology reconfiguration(VTR), thus the algorithm to perform such an VTR has crucial impact on the resource usage efficiency. This paper proposes the routing algorithm of the Virtual Topology Reconfiguration based on the Genetic Algorithm (VTR-GA) for static traffic in the IP/WDM optical networks and develops an integer linear programming (ILP) model to solve the VTR problem. The proposed algorithm procedure and key issues, including the coding, initial population, fitness, crossover and variation within such an algorithm, are addressed. Its effectiveness in the resource utility has been verified by comparing the results from the proposed algorithm with those of both running CPLEX under the small-size network and the heuristic algorithms used formerly on the NSFnet.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128491708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Role-Based Access Control in Network Management System","authors":"Chuntao Wang, Su Ma","doi":"10.1109/ITAPP.2010.5566617","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566617","url":null,"abstract":"In order to solve the access control problems of network management system in development, This paper presents a role-based multi-granularity access control program, this program implements logical separation between user and access rights, you can customize roles for different user according to their needs, making network management system more flexible and secure in the user management; the program has put fine-grained control of the roles into practice and solve the problem of regional resources access control.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128547398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Theoretical Models Research of E-Government under the Paradigm of Complex System","authors":"Zhe Liu","doi":"10.1109/ITAPP.2010.5566186","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566186","url":null,"abstract":"With the rapid development of China's economy and continuous improvement of informatization levels, E-Government should achieve the cooperative development with economy and society. E-Government involves many domains, such as national governance, political affairs, economy, information technology, management theory and laws and regulations, which is the cross-cutting field striding over social sciences and natural sciences. E-Government development is a dynamic process in the trend of society development. This article analyzes the existing questions of domestic and foreign E-Government researches, utilizes the complex system paradigm, and proposes that E-Government's implementation is a complex giant system. It's necessary to take the complex system methodology as the basis and constructs the theoretical models according to this.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129065514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and Realization of PADS Optimum Reception Pattern","authors":"Zhongnian Li, Bao-qing Wang, Qi Liu","doi":"10.1109/ITAPP.2010.5566418","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566418","url":null,"abstract":"In the article we use unconnected binary system frequency-shift keying 2FSK signal, energy equality, the prior probability equality, and the limited Gaussian white noise model communications system as the background, research and develop one kind of PADS (Phase Associated Digital Signal) optimum reception pattern successfully, and realizes the plan. The experiment proved that the effect is very satisfying.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129423997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Key Management Scheme for Heterogeneous Wireless Sensor Networks Based on Group-Oriented Cryptography","authors":"Juwei Zhang, Liwen Zhang","doi":"10.1109/ITAPP.2010.5566343","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566343","url":null,"abstract":"Key establishment in wireless sensor networks is a challenging problem for the constrained energy, memory, and computational capabilities of the sensor nodes. In this paper, focusing on the management of encryption keys in Heterogeneous Wireless Sensor Networks(HWSN), We propose a novel distributed key management scheme based on Shamir secret sharing scheme and deployment knowledge (HSNKMS). In HSNKMS, the sensor nodes are divided into some group, inner group pairwise keys are setup by random key distribution scheme, and intergorup pairwise keys are established by Shamir secret sharing scheme. We describe the details of our algorithm and compare it with other proposed schemes. Comparison and theory analysis show that the proposed scheme outperforms lots of the existing key establishment schemes in terms of wireless sensor networks security and key connectivity.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130530434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hongming Zhang, Jianjian Li, Chunfa Li, Jingfeng Li
{"title":"Research on the Formation of Eco-Industrial Symbiosis Network Based on Stakeholders","authors":"Hongming Zhang, Jianjian Li, Chunfa Li, Jingfeng Li","doi":"10.1109/ITAPP.2010.5566463","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566463","url":null,"abstract":"Eco-Industrial Symbiosis Network is a complex systems consisting of various types of stake-holders through the close co-operation of economic, social and environmental aspects, with the interests of co-operation between the various stakeholders as its basic starting point, and its fundamental purpose is to improve economic, social and ecological benefits of the whole network. In this paper, from the perspective of stakeholders, based on different benefit drive, the formation of Eco-Industrial Symbiosis Network is explored, at the same time; the power/interest matrix is employed to propose the model that all stakeholders should take part in Eco-Industrial Symbiosis Network governance.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127019657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}