2009 International Symposium on Intelligent Ubiquitous Computing and Education最新文献

筛选
英文 中文
Performance Analysis of Short Message Service 短消息业务性能分析
Liu Pu
{"title":"Performance Analysis of Short Message Service","authors":"Liu Pu","doi":"10.1109/IUCE.2009.10","DOIUrl":"https://doi.org/10.1109/IUCE.2009.10","url":null,"abstract":"The Global System for Mobile communication was introduced in 1992 as a European standard, it has achieved much worldwide success and has had tremendous impacts on our daily lives. Mobile phones have become an integral part of the modern world, and SMS messaging is becoming a widely used communication mechanism for mobile phone users. While the 3G standards are being drafted, and equipment for third-generation cellular system is being designed, next-generation SMS applications will incorporate location based capabilities that are now being incorporated into mobile handsets. This paper describes SMS specification and analyses SMS concepts. In addition, the study gives architecture of SMS, and draws a conclusion in the end.","PeriodicalId":153560,"journal":{"name":"2009 International Symposium on Intelligent Ubiquitous Computing and Education","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126897731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Research on Knowledge Management in Enterprise 企业知识管理研究
Shenghui He, Chaoyang Xiang, Lei Chen
{"title":"Research on Knowledge Management in Enterprise","authors":"Shenghui He, Chaoyang Xiang, Lei Chen","doi":"10.1109/IUCE.2009.77","DOIUrl":"https://doi.org/10.1109/IUCE.2009.77","url":null,"abstract":"In practice area, with the globalization as well as the knowledge economy era's coming, enterprises are realizing the importance of knowledge management. More and more enterprises started implementing knowledge management. Knowledge Management includes a flexible and effective integration of specific content management, cooperation mechanisms and data analysis functionalities. In the paper an overview of knowledge management is given and the definition and concept is introduced. Then the detailed research on the process of knowledge innovation and some measures of knowledge innovation management are presented.","PeriodicalId":153560,"journal":{"name":"2009 International Symposium on Intelligent Ubiquitous Computing and Education","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125116872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Approach of Real-time Monitoring Based on Background Subtraction 基于背景减法的实时监控方法
Weihua Wang
{"title":"The Approach of Real-time Monitoring Based on Background Subtraction","authors":"Weihua Wang","doi":"10.1109/IUCE.2009.22","DOIUrl":"https://doi.org/10.1109/IUCE.2009.22","url":null,"abstract":"Real-time monitoring is the important research content of safety domain and real-time control, and the study on its related key technology has great significance. In this paper, an algorithm of real-time monitoring is proposed, which is based on background subtraction. By using the frame image obtained from real-time monitor or video, the images are divided into moving object area and still area, which is used for updating the background. Then the moving area is compared with background to capture the moving object and its position, which is used to recognize the security of the monitored real-time system. Studying the problem the real-time system, and discussing the complete solution methods to the problem. Experiment results demonstrate that the algorithm can quickly and exactly detect the moving objects and give the alarm.","PeriodicalId":153560,"journal":{"name":"2009 International Symposium on Intelligent Ubiquitous Computing and Education","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125305470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ESB Infrastructure's Autonomous Mechanism of SOA ESB基础设施的SOA自治机制
Rui Wen, Ya-ping Ma, Xiao-qing Chen
{"title":"ESB Infrastructure's Autonomous Mechanism of SOA","authors":"Rui Wen, Ya-ping Ma, Xiao-qing Chen","doi":"10.1109/IUCE.2009.100","DOIUrl":"https://doi.org/10.1109/IUCE.2009.100","url":null,"abstract":"Service-oriented architecture (SOA) is the architecture of software or information system, as well as a concept of coarse-grained components and loosely coupled framework. But SOA is generally believed as a simple Web service integration. This paper deeply discusses some concepts on SOA, insists that SOA is a developing methodology rather than a specific technology. Moreover, the paper expatiates on the topology of enterprise service bus (ESB) model. In this model, ubiquitous-autonomous mechanism to union ESB infrastructures is introduced. Mechanism is designed from the inspiration of routing protocols and grid resources finding calculation. By designing, many functions are supported, including service dynamics, the load-aware self-adaptation and fault tolerance. In the end, the performance of mechanism was evaluated through simulations and applications. Experimental results show that this pervasive mechanism has low bandwidth, fast convergence and the ability to recover from emergencies quickly.","PeriodicalId":153560,"journal":{"name":"2009 International Symposium on Intelligent Ubiquitous Computing and Education","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127024869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Classification of Motor Imagery EEG Signals Based on Energy Entropy 基于能量熵的运动意象脑电信号分类
D. Xiao, Z. Mu, Jianfeng Hu
{"title":"Classification of Motor Imagery EEG Signals Based on Energy Entropy","authors":"D. Xiao, Z. Mu, Jianfeng Hu","doi":"10.1109/IUCE.2009.57","DOIUrl":"https://doi.org/10.1109/IUCE.2009.57","url":null,"abstract":"Feature extraction and classification of EEG signals is core issues on EEG-based brain computer interface (BCI). Typically, such classification has been performed using signals from a set of selected EEG sensors. Because EEG sensor signals are mixtures of effective signals and noise, which has low signal-to-noise ratio, motor imagery EEG signals can be difficult to classification. Energy entropy was used to preprocess motor imagery EEG data, and the Fisher class separability criterion was used to extract features. Finally, classification of four types motor imagery EEG was performed by a method based on the statistical theory. An average of 85% classification accuracy of the six type combination and the three subjects was achieved. The results showed that motor imagery EEG signals can be extracted using energy entropy and that these extracted features offered clear advantages for classification.","PeriodicalId":153560,"journal":{"name":"2009 International Symposium on Intelligent Ubiquitous Computing and Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130679378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
General-purpose Identity Hiding Schemes for Ad-hoc Networks Ad-hoc网络通用身份隐藏方案
Shushan Zhao, A. Aggarwal
{"title":"General-purpose Identity Hiding Schemes for Ad-hoc Networks","authors":"Shushan Zhao, A. Aggarwal","doi":"10.1109/IUCE.2009.103","DOIUrl":"https://doi.org/10.1109/IUCE.2009.103","url":null,"abstract":"Identity disclosure is a security and privacy concern in mobile ad-hoc networks. Previous proposals suggest using anonymous routing protocols. These solutions are limited on certain routing protocols, and cannot be applied to higher layers. In this paper, we propose the requirements of an general-purpose identity hiding scheme, and present schemes based on popular cryptosystems: AES, RSA, and ElGamal. These schemes can be applied in network and above layers. These schemes also overcome the following drawbacks of previous anonymous routing protocols: pair-wise keys, and large amount of pseudonyms. Hence, the proposed schemes are more efficient and applicable.","PeriodicalId":153560,"journal":{"name":"2009 International Symposium on Intelligent Ubiquitous Computing and Education","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134250314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cultural-Based Particle Swarm Optimization for Dynamical Environment 动态环境下基于培养的粒子群优化
Yi Jiang, Wei Huang, Li Chen
{"title":"Cultural-Based Particle Swarm Optimization for Dynamical Environment","authors":"Yi Jiang, Wei Huang, Li Chen","doi":"10.1109/IUCE.2009.134","DOIUrl":"https://doi.org/10.1109/IUCE.2009.134","url":null,"abstract":"In this paper, we have presented a new method of the Cultural-based Particle Swarm Optimization for Dynamical Environment which uses belief space representation to accommodate more types of knowledge such as History Knowledge, and Topographical Knowledge. Also, additional influence functions have been developed to utilize these types of knowledge. This study focuses on the knowledge needed to track an optimal solution in an environment where the functional landscape is produced by the combination of n overlapped cones in a 2 dimensional grid. Then, the parabolic benchmark functions with various severities are used to test, compared with the PSO, and the results show the modified strategies are effective in tracking changes.","PeriodicalId":153560,"journal":{"name":"2009 International Symposium on Intelligent Ubiquitous Computing and Education","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134620470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software Engineering and Thought Originality 软件工程与思想独创性
Yu Gao, Xiangzhong Feng
{"title":"Software Engineering and Thought Originality","authors":"Yu Gao, Xiangzhong Feng","doi":"10.1109/IUCE.2009.72","DOIUrl":"https://doi.org/10.1109/IUCE.2009.72","url":null,"abstract":"During the process of appearance and development of software engineering, the thought originality plays a very important role. The paper analyzes several examples of the thought originality promoting development of software engineering, such as, understanding software and software development, the form of structuring software development method, the form of object-oriented software development method and the form of agile software development method. The paper is to point out except teaching the knowledge of software engineering; we must teach them the ideas of thought originality and strengthen the ideas of thought originality, during the process of software engineer’s teaching.","PeriodicalId":153560,"journal":{"name":"2009 International Symposium on Intelligent Ubiquitous Computing and Education","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132322974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Progress on Construction Technology of Uyghur Knowledge Base 维吾尔语知识库建设技术研究进展
Yusup Abaidulla, Iskender Osman, Mamateli Tursun
{"title":"Progress on Construction Technology of Uyghur Knowledge Base","authors":"Yusup Abaidulla, Iskender Osman, Mamateli Tursun","doi":"10.1109/IUCE.2009.125","DOIUrl":"https://doi.org/10.1109/IUCE.2009.125","url":null,"abstract":"This paper made a statement that the use of linguistic,computational linguistic,statistical theory of fusion,research ambiguous words formation rules technology,machine learning technology,rules to deal with and sttistical integration technoledge,solved a modern Uyghur resources construction and natural language processing problem.","PeriodicalId":153560,"journal":{"name":"2009 International Symposium on Intelligent Ubiquitous Computing and Education","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127982077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improved Algorithm of Unstructured P2P Network Topology Structure 非结构化P2P网络拓扑结构的改进算法
Zong Hu
{"title":"Improved Algorithm of Unstructured P2P Network Topology Structure","authors":"Zong Hu","doi":"10.1109/IUCE.2009.83","DOIUrl":"https://doi.org/10.1109/IUCE.2009.83","url":null,"abstract":"The unstructured P2P network become more and more popular with the easily global deployment and supporting fuzzy key match, but the unstructured P2P network has poor scalability because of the flood broadcasting. This paper put forward a balanced binary tree as the unstructured P2P network topology structure based on the existing problems of the unstructured P2P network topology structure, design the corresponding algorithm of network peer join, leave, and resources search, and show the improved results by corresponding simulation.","PeriodicalId":153560,"journal":{"name":"2009 International Symposium on Intelligent Ubiquitous Computing and Education","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128669349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信