2010 IEEE International Conference on Progress in Informatics and Computing最新文献

筛选
英文 中文
Speech recognition method based on weighed autoregressive HMM 基于加权自回归HMM的语音识别方法
2010 IEEE International Conference on Progress in Informatics and Computing Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5687878
Yamin Yang, Chaoli Wang, Y. Sun
{"title":"Speech recognition method based on weighed autoregressive HMM","authors":"Yamin Yang, Chaoli Wang, Y. Sun","doi":"10.1109/PIC.2010.5687878","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687878","url":null,"abstract":"For non-independent speech recognition, in order to solve the problem of the assumption that the observation vectors are independent and the amount of data is small in Hidden Markov Model, a weighted autoregressive Hidden Markov Model was presented based on the Continuous Hidden Markov Model in this paper. The weighted autoregressive process was exploited to extract the observation vector, which is more suitable for recognition of the actual voice signals with strong random characteristic.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123507213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Password guessing attack on a key exchange protocol based on ECDLP 基于ECDLP的密钥交换协议的猜密码攻击
2010 IEEE International Conference on Progress in Informatics and Computing Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5687584
Chungen Xu, Yanjiong Yang
{"title":"Password guessing attack on a key exchange protocol based on ECDLP","authors":"Chungen Xu, Yanjiong Yang","doi":"10.1109/PIC.2010.5687584","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687584","url":null,"abstract":"Authentication and key exchange are fundamental for establishing secure communication channels over public insecure networks. Three-party key exchange protocol is an important technique for two clients to agree a session key with the help of a trusted server who shares a human password with each client. Many protocols have been proposed for the requirements of security and efficiency over the years. For security consideration, we are concerned with the off-line password-guessing attack. We make the attack to a three-party key exchange protocol based on Elliptic Curve Discrete Logarithm Problem(ECDLP) and show that it is vulnerable against the off-line password-guessing attack. In fact, the off-line password-guessing attack is available for malicious participants and is effective to similar protocols. To avoid this problem, we give a suggestion to eliminate it and enforce the security.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123639634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design of voltage doubling rectifier circuit in Wireless Sensor Networks 无线传感器网络中倍压整流电路的设计
2010 IEEE International Conference on Progress in Informatics and Computing Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5687582
Jianbin Zhang, Zhongning Jia
{"title":"Design of voltage doubling rectifier circuit in Wireless Sensor Networks","authors":"Jianbin Zhang, Zhongning Jia","doi":"10.1109/PIC.2010.5687582","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687582","url":null,"abstract":"Wireless Sensor Networks (WSN) is a key technology of Internet of Things (IOT). WSN node is commonly powered by battery. However, battery capacity is limited, which affects the overall performance of WSN. The technology of environmental energy harvesting is presented for power supply of WSN node in this paper. Specifically, the basic voltage doubling rectifier circuit is analyzed, then the microwave voltage doubling rectifier circuit is derived in UHF band, and its main components and parameters are analyzed in detail. Lastly, the four-stages voltage doubling rectifier circuit of 900NHz is designed and simulated using ADS software. The simulation results indicated that the design scheme of voltage doubling rectifier circuit is correct and feasible.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128361157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Dynamic priority back-up algorithm based on IEEE802.11 DCF 基于IEEE802.11 DCF的动态优先级备份算法
2010 IEEE International Conference on Progress in Informatics and Computing Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5687987
Chao Liu, Zhengming Li, Wenjuan Li
{"title":"Dynamic priority back-up algorithm based on IEEE802.11 DCF","authors":"Chao Liu, Zhengming Li, Wenjuan Li","doi":"10.1109/PIC.2010.5687987","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687987","url":null,"abstract":"The Distributed Coordination Function (DCF) in the IEEE 802.11 protocol is a random access scheme based on the carrier sense multiple access with collision avoidance (CSMA/CA). In recent years, there have been numerous research on the performance analysis and model of DCF under the assumption that the transmission queue is always nonempty (i.e. saturation state). In this paper, we propose a dynamic priority back-up algorithm (DPBA) for IEEE802.11 DCF, the basic idea of DPBA is each node should collect statistical data of other node's transmission while sensing the channel, and maintaining a sending data table for all node in network. When the node has data to transmit, it will calculate the dynamic priority and connection window according to the number of successful sending, the number of successful sending and the statistical data in sending table. Simulation results show that DPBA can properly assign channel among nodes in proportion to their dynamic priority as well as enhance the network saturation throughput.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128690624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using 3G network components to enable NFC mobile transactions and authentication 使用3G网络组件实现NFC移动交易和身份验证
2010 IEEE International Conference on Progress in Informatics and Computing Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5687587
W. Chen, Gerhard P. Hancke, K. Mayes, Y. Lien, J. Chiu
{"title":"Using 3G network components to enable NFC mobile transactions and authentication","authors":"W. Chen, Gerhard P. Hancke, K. Mayes, Y. Lien, J. Chiu","doi":"10.1109/PIC.2010.5687587","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687587","url":null,"abstract":"The increasing technical capabilities of mobile phones have resulted in several m-payment methods being proposed. M-payment applications are being developed for both online and in-store purchases. Near Field Communication (NFC) technology has the potential to greatly impact the way mobile devices are used. NFC is a short range wireless communication interface that allows for the integration of a mobile device in existing contactless application infrastructure, such as using a mobile phone to pay at Point-of-Sale (POS). It is important to provide a simple method for implementing m-payment systems that offer both reasonable security protection as well as ease of use for the user. We propose a system that combines the existing 3G cryptographic primitives and algorithms, in addition to the identification and authentication capabilities of the USIM, with NFC technology to implement a m-payment system. Such a system could easily be integrated into current 3G infrastructure and provide improved scalability and ubiquity for m-payment services. Our proposed scheme focuses on a conventional in-store payment environment, with mutual authentication between entities and a subsequent trustworthy transaction being achieved through 3G and USIM security services.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129377433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Evaluating e-government websites in Jordan: Accessibility, usability, transparency and responsiveness 评估约旦的电子政务网站:可访问性、可用性、透明度和响应性
2010 IEEE International Conference on Progress in Informatics and Computing Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5688017
A. Al-Soud, K. Nakata
{"title":"Evaluating e-government websites in Jordan: Accessibility, usability, transparency and responsiveness","authors":"A. Al-Soud, K. Nakata","doi":"10.1109/PIC.2010.5688017","DOIUrl":"https://doi.org/10.1109/PIC.2010.5688017","url":null,"abstract":"Investigating e-government Web-based services and evaluating its development has become one of the evolving research areas in the information systems field. After a decade of launching the e-government program in Jordan, we examined thirty governmental Websites in terms of their accessibility, usability, transparency, and responsiveness to citizens' request. This study found that the majority of the Websites are still in the early stages of development, and there is a noticeable lack in Websites readiness for moving-up to the advanced level fundamental for providing transactional services. Based on the evaluation results and through a manual testing, it was found the majority of the Websites do not employ the same design, where there should be consistent and should be using the same standards and features.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130979769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Probabilistic XML data exchange: An algorithm for materializing probabilistic solutions 概率性XML数据交换:实现概率性解决方案的算法
2010 IEEE International Conference on Progress in Informatics and Computing Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5687857
Haitao Ma, Changyong Yu, Miao Fang
{"title":"Probabilistic XML data exchange: An algorithm for materializing probabilistic solutions","authors":"Haitao Ma, Changyong Yu, Miao Fang","doi":"10.1109/PIC.2010.5687857","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687857","url":null,"abstract":"Data exchange is the problem of finding an instance of a target schema, given an instance of a source schema and a specification of the relationship between the source and the target. In this paper, we look into the basic properties of XML data exchange in the presence of probabilistic data. This requires rethinking the very basic concepts of traditional XML data exchange, such as solution, universal solution, and certain answers of target queries. We develop a framework for XML data exchange over probabilistic XML documents, and give a polynomial-time materializing algorithm that computes target probabilistic documents.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127875571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The evolution of computerized language teaching and learning: A terminological analysis 计算机语言教学的演变:一个术语分析
2010 IEEE International Conference on Progress in Informatics and Computing Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5687916
Shuli Zhao
{"title":"The evolution of computerized language teaching and learning: A terminological analysis","authors":"Shuli Zhao","doi":"10.1109/PIC.2010.5687916","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687916","url":null,"abstract":"Ever since its invention, the computer, by virtue of its multimedia capacity and its subsequent network technology, has been widely employed in language teaching and learning. During the process, computer technology has gradually changed its “subsidiary” position to play increasingly significant roles in language education. In the meantime, people are beginning to look at the relationship between language teaching and language learning with fresh new eyes. All these have enriched the theories of modern educational psychology, and given great impetus to the development of theories and applications of language teaching and learning.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131330702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on a kind of improved network transport model and its application in logistics industry 一种改进的网络运输模型及其在物流业中的应用研究
2010 IEEE International Conference on Progress in Informatics and Computing Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5687867
Renwang Li, Xinli Wu, Donglong Li, Hao Luo, Sirong Zhang
{"title":"Research on a kind of improved network transport model and its application in logistics industry","authors":"Renwang Li, Xinli Wu, Donglong Li, Hao Luo, Sirong Zhang","doi":"10.1109/PIC.2010.5687867","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687867","url":null,"abstract":"Logistics industry is becoming a more and more important field needed to be concentrated for all kinds of enterprises to reduce their own operation cost, and shorten their delivery time and so on. How to change the complicated logistics problem into abstract network model is elucidated here. Firstly, a directed graph G = (V, E) is used to describe the general logistics problem with some common restrictions such as cost and time etc. Secondly, considering the growth of logistics node, an improved network transport model was set forth. Thirdly, the combination of ant colony arithmetic with logistics network transport model is expounded, based on the similarity between logistics network transport model and Travelling Salesman Problem. Finally, the solution and analysis for the improved model is illustrated according to the ant colony arithmetic, and some related conclusions are detailed.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131702580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on intelligent control for ore grinding and grading process 磨矿分级过程智能控制研究
2010 IEEE International Conference on Progress in Informatics and Computing Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5687954
Xinjian Zhou, N. Zuo, Huicai Su
{"title":"Study on intelligent control for ore grinding and grading process","authors":"Xinjian Zhou, N. Zuo, Huicai Su","doi":"10.1109/PIC.2010.5687954","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687954","url":null,"abstract":"This paper analyzes the technical process of the grinding machine system in detail, based on the ore grinding and grading process of Sizhou Concentrator of Dexing Copper Mine in Jiangxi Copper Corporation, and defines the control contents and requirements of the system. Because the grinding process is a complex system with big sluggishness, long time lag, serious non-linearity and time-varying, so only applying PID control can not make the ore grinding and grading process in the best state of control. There fore Intelligent PID control is applied to simple loop, and series intelligent PID control and fuzzy control strategy applied to complicated loop. The ore-feeding flow control loop, ore-feeding water control loop, ore-discharge water control loop, water level of pump pond control loop, pump pond concentration series control loop and inlet pressure of the water cyclone control loop are designed. By all these control strategies and control loops, intelligent control of the grinding machine is realized.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128854017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信