{"title":"A Self-Learning Based Antenna System for Indoor Wireless Network","authors":"Wei Ni","doi":"10.4018/IJAPUC.2017100104","DOIUrl":"https://doi.org/10.4018/IJAPUC.2017100104","url":null,"abstract":"","PeriodicalId":145240,"journal":{"name":"Int. J. Adv. Pervasive Ubiquitous Comput.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132998846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Integrated Parameter Measurement and Control System of Low Voltage Distribution Network","authors":"Weifang Zhai, Yongli Liu, Yiran Jiang","doi":"10.4018/IJAPUC.2017070103","DOIUrl":"https://doi.org/10.4018/IJAPUC.2017070103","url":null,"abstract":"","PeriodicalId":145240,"journal":{"name":"Int. J. Adv. Pervasive Ubiquitous Comput.","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117341408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Campus Network Security Problem and Protection Strategy","authors":"Yongli Liu, Weifang Zhai, Song Ji","doi":"10.4018/IJAPUC.2017070102","DOIUrl":"https://doi.org/10.4018/IJAPUC.2017070102","url":null,"abstract":"With the “Internet +” era of arrival, the major colleges and universities are in the construction of the wisdom of the campus, students and teachers living with the campus network is more and more closely related, Campus network security has become the protection of the wisdom of the campus construction. Campus network security issues become increasingly serious; a single security protection has been unable to meet the current security needs. This paper analyzes the major security threats facing the campus network, and presents the campus network security protection measures from the physical layer, network layer, system layer, application layer and management of five aspects, thus constructing the campus network's overall security defense system. The system has multiple security protection for Campus Network, thus improving the security of the campus network.","PeriodicalId":145240,"journal":{"name":"Int. J. Adv. Pervasive Ubiquitous Comput.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125062624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiangdong Wang, Yang Yang, Hong Liu, Yueliang Qian, Duan Jia
{"title":"Feedback-Driven Refinement of Mandarin Speech Recognition Result based on Lattice Modification and Rescoring","authors":"Xiangdong Wang, Yang Yang, Hong Liu, Yueliang Qian, Duan Jia","doi":"10.4018/IJAPUC.2017040104","DOIUrl":"https://doi.org/10.4018/IJAPUC.2017040104","url":null,"abstract":"In real world applications of speech recognition, recognition errors are inevitable, and manual correction is necessary. This paper presents an approach for the refinement of Mandarin speech recognition result by exploiting user feedback. An interface incorporating character-based candidate lists and feedback-driven updating of the candidate lists is introduced. For dynamic updating of candidate lists, a novel method based on lattice modification and rescoring is proposed. By adding words with similar pronunciations to the candidates next to the corrected character into the lattice and then performing rescoring on the modified lattice, the proposed method can improve the accuracy of the candidate lists even if the correct characters are not in the original lattice, with much lower computational cost than that of the speech re-recognition methods. Experimental results show that the proposed method can reduce 24.03% of user inputs and improve average candidate rank by 25.31%.","PeriodicalId":145240,"journal":{"name":"Int. J. Adv. Pervasive Ubiquitous Comput.","volume":"47 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114108817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Optimal Checkpoint Interval for the Long-Running Application","authors":"Yongning Zhai, Weiwei Li","doi":"10.4018/IJAPUC.2017040103","DOIUrl":"https://doi.org/10.4018/IJAPUC.2017040103","url":null,"abstract":"For the distributed computing system, excessive or deficient checkpointing operations would result in severe performance degradation. To minimize the expected computation execution of the long-running application with a general failure distribution, the optimal equidistant checkpoint interval for fault tolerant performance optimization is analyzed and derived in this paper. More precisely, the optimal checkpointing period to determine the proper checkpoint sequence is proposed, and the derivation of the expected effective rate of the defined computation cycle is introduced. Corresponding to the maximal expected effective rate, the constraint of the optimal checkpoint sequence can be obtained. From the constraint of optimality, the optimal equidistant checkpoint interval can be obtained according to the minimal fault tolerant overhead ratio. By the numerical results, the proposal is practical to determine a proper equidistant checkpoint interval for fault tolerant performance optimization.","PeriodicalId":145240,"journal":{"name":"Int. J. Adv. Pervasive Ubiquitous Comput.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134490693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Home Communication System","authors":"Tianze Li","doi":"10.4018/IJAPUC.2017040101","DOIUrl":"https://doi.org/10.4018/IJAPUC.2017040101","url":null,"abstract":"The invention discloses a smart home communication system. The smart home communication system comprises a control terminal; the control terminal comprises a control unit and a Zigbee wireless communication module, a home circuit module comprises at least one power-on circuit and at least one power outlet which are connected in series; the power outlet is electrically connected with a second powermodem; the control unit is electrically connected with the Zigbee wireless communication module, the power-on circuit and the first power modem; the Zigbee wireless communication module is in wire communication with a modem; the first power modem and the modem are respectively in wireless communication with a mobile control terminal through the Ethernet. The defect that the network produced by taking the Zigbee and like wireless communication modules as the smart home internal network is unstable and weak in penetrability and has coverage blind can be well solved by using the wired power-on circuit, the power modem and the power line communication technology, the rewiring is unnecessary, and the cost is save.","PeriodicalId":145240,"journal":{"name":"Int. J. Adv. Pervasive Ubiquitous Comput.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123614332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of Employment Management System Based on B / S","authors":"Pengcheng Xia, Tianze Li, Tao Gao, Yuhan Wang","doi":"10.4018/IJAPUC.2016100103","DOIUrl":"https://doi.org/10.4018/IJAPUC.2016100103","url":null,"abstract":"As society progresses with computer technology, the rapid development of network technology, data, and information technology has become the development trend in today's society. How to improve college employment rate and improve their own competitiveness is a problem faced by many universities. At present, most graduates are accustomed to finding suitable employers through the Internet platform, a way to communicate with students in a timely and effective manner. This system provides a platform for the college to communicate with students, publish employment information of employers, and maintain employment information platform for students. Through student self-maintenance methods to save students and schools, employment units direct communication costs. The system uses Java, WEB and Ajax technology to school statistics, recruitment of employers, students work together to build B / S structure of the site. This website statistics college employment rate, the use of units, schools and students need information.","PeriodicalId":145240,"journal":{"name":"Int. J. Adv. Pervasive Ubiquitous Comput.","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134061449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}