2010 International Conference on Internet Technology and Applications最新文献

筛选
英文 中文
Design Criteria for Distributed Multi-Layer Full-Rate Space Time Coding in Wireless Relay Networks 无线中继网络中分布式多层全速率空时编码设计准则
2010 International Conference on Internet Technology and Applications Pub Date : 2010-09-09 DOI: 10.1109/ITAPP.2010.5566439
Jinli Yang, Zhijin Zhao, Haiquan Wang
{"title":"Design Criteria for Distributed Multi-Layer Full-Rate Space Time Coding in Wireless Relay Networks","authors":"Jinli Yang, Zhijin Zhao, Haiquan Wang","doi":"10.1109/ITAPP.2010.5566439","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566439","url":null,"abstract":"It has been proved that when the transmit power is sufficiently large distributed space time codes can achieve the maximal diversity order in a wireless relay network. In the previous works, space time codes used in a wireless relay network are limited on unitary space time codes or orthogonal (or quasi- orthogonal) space time codes. In this paper, we apply general multi-layer full-rate space time codes generated by algebraic extension into the wireless relay network. Moreover, the optimal power allocation and the Chernoff upper bound of the pair-wise error probability (PEP) based on the maximum-likelihood (ML) decoding are calculated. Based on this bound, two design criteria of the multi-layer full-rate space time codes are provided.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114502450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Improvement of DTW Algorithm in Speech Recognition 语音识别中DTW算法的改进
2010 International Conference on Internet Technology and Applications Pub Date : 2010-09-09 DOI: 10.1109/ITAPP.2010.5566232
Dexiang Zhou, Ji-xiang Zhang
{"title":"The Improvement of DTW Algorithm in Speech Recognition","authors":"Dexiang Zhou, Ji-xiang Zhang","doi":"10.1109/ITAPP.2010.5566232","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566232","url":null,"abstract":"This paper discusses an improving algorithm of DTW. Based on primary DTW arithmetic, it uses new algorithm to reduce unnecessary calculated point and only saves the necessary frame matching distance matrix and accumulation distance matrix.The improved algorithm uses MATLAB to carry out simulation and make the best test through analyzing the comparative results. This algorithm will save storage space and enhance computational efficiency .","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117079510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Based on Industrial Ethernet Networking of CNC Machine Tool Monitoring System Design 基于工业以太网网络的数控机床监控系统设计
2010 International Conference on Internet Technology and Applications Pub Date : 2010-09-09 DOI: 10.1109/ITAPP.2010.5566390
Zhonggui Zhang
{"title":"Based on Industrial Ethernet Networking of CNC Machine Tool Monitoring System Design","authors":"Zhonggui Zhang","doi":"10.1109/ITAPP.2010.5566390","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566390","url":null,"abstract":"CNC machine tools of networking and information-oriented are the requests which the modern society develops. Networking Method of CNC machine tools has many kinds. This article describes several networking mode and Analysis of the Ethernet networking of CNC machine tool control system design advantages of. And Introduced the Ethernet-based networking remote monitoring system for CNC machine tools and design principles. Detailed design of Ethernet-based internal communications system and system software design. CNC machine tools to ensure real-time monitoring and reliability, but also economical and practical.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129418448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Method of Unexpected Exception Handling in Workflow Systems 工作流系统中一种意外异常处理方法
2010 International Conference on Internet Technology and Applications Pub Date : 2010-09-09 DOI: 10.1109/ITAPP.2010.5566479
D. Xiao, Quanfeng Wang
{"title":"A Method of Unexpected Exception Handling in Workflow Systems","authors":"D. Xiao, Quanfeng Wang","doi":"10.1109/ITAPP.2010.5566479","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566479","url":null,"abstract":"How to handle unexpected exceptions to improve the reliability of workflow system is facing a major problem. The traditional exception handling in workflow system stays in expected exceptions handling, it is lack of the handling of unexpected exceptions, and the main handling of unexpected exceptions relies on the intervention of human, which reduces the efficiency of the system and takes a lot of time. This paper put forward to a method to handle the unexpected exceptions automatically and in real time, when unexpected exceptions are happened, the method can choose a new process definition to replace the current process model automatically, through this method the normal execution of the process can be guaranteed.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128499485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Genetic Algorithm for Static Virtual Topology Reconfiguration in IP/WDM Optical Networks 一种新的IP/WDM光网络静态虚拟拓扑重构遗传算法
2010 International Conference on Internet Technology and Applications Pub Date : 2010-09-09 DOI: 10.1109/ITAPP.2010.5566564
Zhanqi Xu, Xing Jin, Zhemin Ding
{"title":"A Novel Genetic Algorithm for Static Virtual Topology Reconfiguration in IP/WDM Optical Networks","authors":"Zhanqi Xu, Xing Jin, Zhemin Ding","doi":"10.1109/ITAPP.2010.5566564","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566564","url":null,"abstract":"The transport traffic in WDM optical networks are provided to the networks customers in the form of lightpath via virtual topology reconfiguration(VTR), thus the algorithm to perform such an VTR has crucial impact on the resource usage efficiency. This paper proposes the routing algorithm of the Virtual Topology Reconfiguration based on the Genetic Algorithm (VTR-GA) for static traffic in the IP/WDM optical networks and develops an integer linear programming (ILP) model to solve the VTR problem. The proposed algorithm procedure and key issues, including the coding, initial population, fitness, crossover and variation within such an algorithm, are addressed. Its effectiveness in the resource utility has been verified by comparing the results from the proposed algorithm with those of both running CPLEX under the small-size network and the heuristic algorithms used formerly on the NSFnet.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128491708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Role-Based Access Control in Network Management System 基于角色的访问控制在网管系统中的应用
2010 International Conference on Internet Technology and Applications Pub Date : 2010-09-09 DOI: 10.1109/ITAPP.2010.5566617
Chuntao Wang, Su Ma
{"title":"Application of Role-Based Access Control in Network Management System","authors":"Chuntao Wang, Su Ma","doi":"10.1109/ITAPP.2010.5566617","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566617","url":null,"abstract":"In order to solve the access control problems of network management system in development, This paper presents a role-based multi-granularity access control program, this program implements logical separation between user and access rights, you can customize roles for different user according to their needs, making network management system more flexible and secure in the user management; the program has put fine-grained control of the roles into practice and solve the problem of regional resources access control.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128547398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Theoretical Models Research of E-Government under the Paradigm of Complex System 复杂系统范式下的电子政务理论模型研究
2010 International Conference on Internet Technology and Applications Pub Date : 2010-09-09 DOI: 10.1109/ITAPP.2010.5566186
Zhe Liu
{"title":"The Theoretical Models Research of E-Government under the Paradigm of Complex System","authors":"Zhe Liu","doi":"10.1109/ITAPP.2010.5566186","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566186","url":null,"abstract":"With the rapid development of China's economy and continuous improvement of informatization levels, E-Government should achieve the cooperative development with economy and society. E-Government involves many domains, such as national governance, political affairs, economy, information technology, management theory and laws and regulations, which is the cross-cutting field striding over social sciences and natural sciences. E-Government development is a dynamic process in the trend of society development. This article analyzes the existing questions of domestic and foreign E-Government researches, utilizes the complex system paradigm, and proposes that E-Government's implementation is a complex giant system. It's necessary to take the complex system methodology as the basis and constructs the theoretical models according to this.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129065514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research and Realization of PADS Optimum Reception Pattern PADS最佳接收模式的研究与实现
2010 International Conference on Internet Technology and Applications Pub Date : 2010-09-09 DOI: 10.1109/ITAPP.2010.5566418
Zhongnian Li, Bao-qing Wang, Qi Liu
{"title":"Research and Realization of PADS Optimum Reception Pattern","authors":"Zhongnian Li, Bao-qing Wang, Qi Liu","doi":"10.1109/ITAPP.2010.5566418","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566418","url":null,"abstract":"In the article we use unconnected binary system frequency-shift keying 2FSK signal, energy equality, the prior probability equality, and the limited Gaussian white noise model communications system as the background, research and develop one kind of PADS (Phase Associated Digital Signal) optimum reception pattern successfully, and realizes the plan. The experiment proved that the effect is very satisfying.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129423997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Key Management Scheme for Heterogeneous Wireless Sensor Networks Based on Group-Oriented Cryptography 一种基于群加密的异构无线传感器网络密钥管理方案
2010 International Conference on Internet Technology and Applications Pub Date : 2010-09-09 DOI: 10.1109/ITAPP.2010.5566343
Juwei Zhang, Liwen Zhang
{"title":"A Key Management Scheme for Heterogeneous Wireless Sensor Networks Based on Group-Oriented Cryptography","authors":"Juwei Zhang, Liwen Zhang","doi":"10.1109/ITAPP.2010.5566343","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566343","url":null,"abstract":"Key establishment in wireless sensor networks is a challenging problem for the constrained energy, memory, and computational capabilities of the sensor nodes. In this paper, focusing on the management of encryption keys in Heterogeneous Wireless Sensor Networks(HWSN), We propose a novel distributed key management scheme based on Shamir secret sharing scheme and deployment knowledge (HSNKMS). In HSNKMS, the sensor nodes are divided into some group, inner group pairwise keys are setup by random key distribution scheme, and intergorup pairwise keys are established by Shamir secret sharing scheme. We describe the details of our algorithm and compare it with other proposed schemes. Comparison and theory analysis show that the proposed scheme outperforms lots of the existing key establishment schemes in terms of wireless sensor networks security and key connectivity.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130530434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Research on the Formation of Eco-Industrial Symbiosis Network Based on Stakeholders 基于利益相关者的生态产业共生网络形成研究
2010 International Conference on Internet Technology and Applications Pub Date : 2010-09-09 DOI: 10.1109/ITAPP.2010.5566463
Hongming Zhang, Jianjian Li, Chunfa Li, Jingfeng Li
{"title":"Research on the Formation of Eco-Industrial Symbiosis Network Based on Stakeholders","authors":"Hongming Zhang, Jianjian Li, Chunfa Li, Jingfeng Li","doi":"10.1109/ITAPP.2010.5566463","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566463","url":null,"abstract":"Eco-Industrial Symbiosis Network is a complex systems consisting of various types of stake-holders through the close co-operation of economic, social and environmental aspects, with the interests of co-operation between the various stakeholders as its basic starting point, and its fundamental purpose is to improve economic, social and ecological benefits of the whole network. In this paper, from the perspective of stakeholders, based on different benefit drive, the formation of Eco-Industrial Symbiosis Network is explored, at the same time; the power/interest matrix is employed to propose the model that all stakeholders should take part in Eco-Industrial Symbiosis Network governance.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127019657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信