{"title":"Performance Analysis of Short Message Service","authors":"Liu Pu","doi":"10.1109/IUCE.2009.10","DOIUrl":"https://doi.org/10.1109/IUCE.2009.10","url":null,"abstract":"The Global System for Mobile communication was introduced in 1992 as a European standard, it has achieved much worldwide success and has had tremendous impacts on our daily lives. Mobile phones have become an integral part of the modern world, and SMS messaging is becoming a widely used communication mechanism for mobile phone users. While the 3G standards are being drafted, and equipment for third-generation cellular system is being designed, next-generation SMS applications will incorporate location based capabilities that are now being incorporated into mobile handsets. This paper describes SMS specification and analyses SMS concepts. In addition, the study gives architecture of SMS, and draws a conclusion in the end.","PeriodicalId":153560,"journal":{"name":"2009 International Symposium on Intelligent Ubiquitous Computing and Education","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126897731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Knowledge Management in Enterprise","authors":"Shenghui He, Chaoyang Xiang, Lei Chen","doi":"10.1109/IUCE.2009.77","DOIUrl":"https://doi.org/10.1109/IUCE.2009.77","url":null,"abstract":"In practice area, with the globalization as well as the knowledge economy era's coming, enterprises are realizing the importance of knowledge management. More and more enterprises started implementing knowledge management. Knowledge Management includes a flexible and effective integration of specific content management, cooperation mechanisms and data analysis functionalities. In the paper an overview of knowledge management is given and the definition and concept is introduced. Then the detailed research on the process of knowledge innovation and some measures of knowledge innovation management are presented.","PeriodicalId":153560,"journal":{"name":"2009 International Symposium on Intelligent Ubiquitous Computing and Education","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125116872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Approach of Real-time Monitoring Based on Background Subtraction","authors":"Weihua Wang","doi":"10.1109/IUCE.2009.22","DOIUrl":"https://doi.org/10.1109/IUCE.2009.22","url":null,"abstract":"Real-time monitoring is the important research content of safety domain and real-time control, and the study on its related key technology has great significance. In this paper, an algorithm of real-time monitoring is proposed, which is based on background subtraction. By using the frame image obtained from real-time monitor or video, the images are divided into moving object area and still area, which is used for updating the background. Then the moving area is compared with background to capture the moving object and its position, which is used to recognize the security of the monitored real-time system. Studying the problem the real-time system, and discussing the complete solution methods to the problem. Experiment results demonstrate that the algorithm can quickly and exactly detect the moving objects and give the alarm.","PeriodicalId":153560,"journal":{"name":"2009 International Symposium on Intelligent Ubiquitous Computing and Education","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125305470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ESB Infrastructure's Autonomous Mechanism of SOA","authors":"Rui Wen, Ya-ping Ma, Xiao-qing Chen","doi":"10.1109/IUCE.2009.100","DOIUrl":"https://doi.org/10.1109/IUCE.2009.100","url":null,"abstract":"Service-oriented architecture (SOA) is the architecture of software or information system, as well as a concept of coarse-grained components and loosely coupled framework. But SOA is generally believed as a simple Web service integration. This paper deeply discusses some concepts on SOA, insists that SOA is a developing methodology rather than a specific technology. Moreover, the paper expatiates on the topology of enterprise service bus (ESB) model. In this model, ubiquitous-autonomous mechanism to union ESB infrastructures is introduced. Mechanism is designed from the inspiration of routing protocols and grid resources finding calculation. By designing, many functions are supported, including service dynamics, the load-aware self-adaptation and fault tolerance. In the end, the performance of mechanism was evaluated through simulations and applications. Experimental results show that this pervasive mechanism has low bandwidth, fast convergence and the ability to recover from emergencies quickly.","PeriodicalId":153560,"journal":{"name":"2009 International Symposium on Intelligent Ubiquitous Computing and Education","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127024869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classification of Motor Imagery EEG Signals Based on Energy Entropy","authors":"D. Xiao, Z. Mu, Jianfeng Hu","doi":"10.1109/IUCE.2009.57","DOIUrl":"https://doi.org/10.1109/IUCE.2009.57","url":null,"abstract":"Feature extraction and classification of EEG signals is core issues on EEG-based brain computer interface (BCI). Typically, such classification has been performed using signals from a set of selected EEG sensors. Because EEG sensor signals are mixtures of effective signals and noise, which has low signal-to-noise ratio, motor imagery EEG signals can be difficult to classification. Energy entropy was used to preprocess motor imagery EEG data, and the Fisher class separability criterion was used to extract features. Finally, classification of four types motor imagery EEG was performed by a method based on the statistical theory. An average of 85% classification accuracy of the six type combination and the three subjects was achieved. The results showed that motor imagery EEG signals can be extracted using energy entropy and that these extracted features offered clear advantages for classification.","PeriodicalId":153560,"journal":{"name":"2009 International Symposium on Intelligent Ubiquitous Computing and Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130679378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"General-purpose Identity Hiding Schemes for Ad-hoc Networks","authors":"Shushan Zhao, A. Aggarwal","doi":"10.1109/IUCE.2009.103","DOIUrl":"https://doi.org/10.1109/IUCE.2009.103","url":null,"abstract":"Identity disclosure is a security and privacy concern in mobile ad-hoc networks. Previous proposals suggest using anonymous routing protocols. These solutions are limited on certain routing protocols, and cannot be applied to higher layers. In this paper, we propose the requirements of an general-purpose identity hiding scheme, and present schemes based on popular cryptosystems: AES, RSA, and ElGamal. These schemes can be applied in network and above layers. These schemes also overcome the following drawbacks of previous anonymous routing protocols: pair-wise keys, and large amount of pseudonyms. Hence, the proposed schemes are more efficient and applicable.","PeriodicalId":153560,"journal":{"name":"2009 International Symposium on Intelligent Ubiquitous Computing and Education","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134250314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cultural-Based Particle Swarm Optimization for Dynamical Environment","authors":"Yi Jiang, Wei Huang, Li Chen","doi":"10.1109/IUCE.2009.134","DOIUrl":"https://doi.org/10.1109/IUCE.2009.134","url":null,"abstract":"In this paper, we have presented a new method of the Cultural-based Particle Swarm Optimization for Dynamical Environment which uses belief space representation to accommodate more types of knowledge such as History Knowledge, and Topographical Knowledge. Also, additional influence functions have been developed to utilize these types of knowledge. This study focuses on the knowledge needed to track an optimal solution in an environment where the functional landscape is produced by the combination of n overlapped cones in a 2 dimensional grid. Then, the parabolic benchmark functions with various severities are used to test, compared with the PSO, and the results show the modified strategies are effective in tracking changes.","PeriodicalId":153560,"journal":{"name":"2009 International Symposium on Intelligent Ubiquitous Computing and Education","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134620470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software Engineering and Thought Originality","authors":"Yu Gao, Xiangzhong Feng","doi":"10.1109/IUCE.2009.72","DOIUrl":"https://doi.org/10.1109/IUCE.2009.72","url":null,"abstract":"During the process of appearance and development of software engineering, the thought originality plays a very important role. The paper analyzes several examples of the thought originality promoting development of software engineering, such as, understanding software and software development, the form of structuring software development method, the form of object-oriented software development method and the form of agile software development method. The paper is to point out except teaching the knowledge of software engineering; we must teach them the ideas of thought originality and strengthen the ideas of thought originality, during the process of software engineer’s teaching.","PeriodicalId":153560,"journal":{"name":"2009 International Symposium on Intelligent Ubiquitous Computing and Education","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132322974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Progress on Construction Technology of Uyghur Knowledge Base","authors":"Yusup Abaidulla, Iskender Osman, Mamateli Tursun","doi":"10.1109/IUCE.2009.125","DOIUrl":"https://doi.org/10.1109/IUCE.2009.125","url":null,"abstract":"This paper made a statement that the use of linguistic,computational linguistic,statistical theory of fusion,research ambiguous words formation rules technology,machine learning technology,rules to deal with and sttistical integration technoledge,solved a modern Uyghur resources construction and natural language processing problem.","PeriodicalId":153560,"journal":{"name":"2009 International Symposium on Intelligent Ubiquitous Computing and Education","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127982077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Algorithm of Unstructured P2P Network Topology Structure","authors":"Zong Hu","doi":"10.1109/IUCE.2009.83","DOIUrl":"https://doi.org/10.1109/IUCE.2009.83","url":null,"abstract":"The unstructured P2P network become more and more popular with the easily global deployment and supporting fuzzy key match, but the unstructured P2P network has poor scalability because of the flood broadcasting. This paper put forward a balanced binary tree as the unstructured P2P network topology structure based on the existing problems of the unstructured P2P network topology structure, design the corresponding algorithm of network peer join, leave, and resources search, and show the improved results by corresponding simulation.","PeriodicalId":153560,"journal":{"name":"2009 International Symposium on Intelligent Ubiquitous Computing and Education","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128669349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}