{"title":"Study on Optimization of Anti-dumping Duty Rate Based on Linear Programming Model of Input-output Method","authors":"Yang Yue, Gao Jiao, He Haiyan","doi":"10.1109/IITA.2007.12","DOIUrl":"https://doi.org/10.1109/IITA.2007.12","url":null,"abstract":"According to the tariff theory, taking and imposing trade protective measures to a kind of imported intermediate goods, such as the antidumping duty etc., will not only affect the price of products subject to anti-dumping, but also influence the price of its upstream and downstream products. That is ripple effect caused by trade protective measures. Introduces the effect of anti-dumping duty in the international trade protection, summarizes the determination method of anti-dumping tax rate in domestic and international theory and practice, and analyzes the deficiencies of these methods. Establishes the valuable input-output table of antidumping products, and put forward a linear programming optimized model of gross domestic product and gross tariff income, which reflects the ripple effect of anti-dumping duty. This model provides the applicable approaches for inferring anti-dumping duty rate.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133868877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligence Behavior in SE","authors":"Li-jun Liu, Haiming Li","doi":"10.1109/IITA.2007.81","DOIUrl":"https://doi.org/10.1109/IITA.2007.81","url":null,"abstract":"Intelligence of humankind mostly includes five parts: the ability of observe, the ability of memory, the ability of practice, the ability of thought, the ability of imagine ...etc, that are the total of the mentality. At this paper, the intelligence behavior processing the data book index is discussed. The process searching data and information in Internet is similar as data book index. And so there are five intelligence behaviors in search engine: fell behavior, memory behavior study behavior, thought behavior, comprehend behavior. The work process of search engine will divide into four stages: classifying web page, confirming a scope of information searching, crawling web pages in internet, and filtrating the result web pages.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132342276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent Building Coordinate Control System based on MAS","authors":"Mingfang Du","doi":"10.1109/IITA.2007.34","DOIUrl":"https://doi.org/10.1109/IITA.2007.34","url":null,"abstract":"The intelligent integrated automation system is a highly nonlinear complex control system. The MAS theory is introduced into the IB (intelligent building) field. The model of the intelligent integrated automation system is established by using the thought of multi-agent. The distributed parallel master control algorithm is given after synthesizing actual systems. The realization mechanism of the coordinate control system which lies in the communications of threads and processes is analyzed according to the linkages between subsystems. The method of using KQML language describe the coordinate control process is explained by the case of the bugging signal.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123631330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling and Analyzing Switching Cost of Service","authors":"Qiaoge Liu, Jie Zhou, Jianyu Li, Xiaolong Ma","doi":"10.1109/IITA.2007.47","DOIUrl":"https://doi.org/10.1109/IITA.2007.47","url":null,"abstract":"Switching cost is a key factor of service, not only for traditional service, but also for modern service. It always plays an important role when customers want to change from one service provider to another. So more and more service providers try to utilizing switching cost. The paper focuses on how to estimate switching cost. Considering many influencing factors, we propose one mathematical model to calculate switching cost by using some available parameters. Especially, we study its dynamic process by using a memory function. Simulation results are given in the end and some discussion and analysis is shown.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125545625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SecureCast: A Secure Media Streaming Scheme over Peer-to-Peer Networks","authors":"Rongtao Liao, Sheng-sheng Yu, Jing Yu","doi":"10.1109/IITA.2007.9","DOIUrl":"https://doi.org/10.1109/IITA.2007.9","url":null,"abstract":"It has become a hot topic that how to construct an efficient and secure media streaming overlay over a highly diverse and dynamic peer-to-peer networks recently. SecureCast proposed in this paper is a secure peer-to-peer media streaming system, which adopts an overlay optimization scheme. The streaming model is based on an efficient peer selection algorithm and a set of dynamic maintenance protocol. It leverages the performance information and synchronization estimation between peers to select the best subset of peers as senders. SecureCast also presents a scalable streaming protection scheme based on credentials and filters. With the dynamic peer management protocol, SecureCast is resilient to network dynamic. The valuation of the prototype system shows good performance and security.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129067443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Time Delay Stability of Force Reflection Telepresence System in Elastic Environment","authors":"Wensong Hu, Min Zhu, Xiaoyong Lu","doi":"10.1109/IITA.2007.71","DOIUrl":"https://doi.org/10.1109/IITA.2007.71","url":null,"abstract":"In force reflection telepresence system there exits communication delay and instable feedback. To improve the accuracy of system, it is essential to set up a force reflection telepresence time delay dynamic model in elastic environment. This paper begins with the differential difference equation and analyses a relative simple case in one dimension force reflection telepresence system--suppose that the remote mechanical hand deals with only one elastic object in environment without displacement and that there is only elastic distortion. Furthermore, this paper also analyses the effect caused by model parameters and ascertains the time delay limit which make it possible to maintain the system operation.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117049370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Location Transparent Communications in Mobile Agent Systems","authors":"Shengbo Chen, Huai-kou Miao, Zhong-sheng Qian","doi":"10.1109/IITA.2007.58","DOIUrl":"https://doi.org/10.1109/IITA.2007.58","url":null,"abstract":"The improved mailbox-based mobile agent communication scheme is combined with a multi-path message forwarding network to implement location transparency and ensure the message deliver reliability, even if there exists broken nodes in communication links in the condition that the number of the broken nodes is not more than the given degree n. It also provides an effective solution to overloading problem of the mobile agent and ensures that urgent message gets priority processing. Furthermore, it provides a better way to deploy agent applications in the Internet and LAN. A better way is adopted to reduce the costs of the mobile agents' communications. Additionally, it also overcomes the communication disable and message chasing.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121432976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Model Of Volunteer Resource For Global Computing System","authors":"Wang Yu, Wang Zhijiang","doi":"10.1109/IITA.2007.10","DOIUrl":"https://doi.org/10.1109/IITA.2007.10","url":null,"abstract":"This paper discusses the challenges in computer systems research posed by the emerging field in global computing environment. It first research of this new field to its predecessors: Grid system and mobile computing. It is helpful to find out why and how can we use the spare volunteer-resource. This paper proposes a novel approach based on \"virtual resource\" come from bionics to share and provide running-time adaptation mechanism. The approach has been implemented and validated within voluntary platform Xtremweb. Finally, we gave a prototype to shows the theory and model mechanism is practical and efficient.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127247044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image Retrieval Model Based on Immune Algorithm","authors":"Fu Duan, Xiaoqin Li, Jinfeng Liu, Keming Xie","doi":"10.1109/IITA.2007.40","DOIUrl":"https://doi.org/10.1109/IITA.2007.40","url":null,"abstract":"CBIR (content-based image retrieval) has become the main technique of image lib system. Its core is image similarity retrieval. The main obstacle of CBIR is that the retrieval effectiveness is unsatisfied. Since immune algorithm has ability of learning, memorizing and self-adapting in long term and in keeping with learning user's feedback information, it can improve the system recognition for users' semantic targets. Using excellence of immune algorithm, this paper proposes a new relevant feedback model based on immune algorithm and carries on the simulation tests for the above image retrieval model. The simulation indicated that the result of the beginning retrieving operation can meet the users' requirements very well and with more relevant feedback information the accuracy of the retrieving results are better.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121637140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yihua Ding, Jianhui Zhao, Zhixu Li, A. Yao, L. Rao, Chengjiang Long
{"title":"Improvements on Electric Field Based Curve Reconstruction from Unorganized Points","authors":"Yihua Ding, Jianhui Zhao, Zhixu Li, A. Yao, L. Rao, Chengjiang Long","doi":"10.1109/IITA.2007.43","DOIUrl":"https://doi.org/10.1109/IITA.2007.43","url":null,"abstract":"Electric field based curve reconstruction algorithm assumed that every point is charged, and the intensity of the electric field reflects distribution and shape of the unorganized points, thus projection of the main ridge of the field surface on 2D plane can be taken as the reconstructed curve. Performance of the method is affected with the appropriate selection of initial points and the speed of their iterative approximations to the limit positions. Our paper makes improvements in two aspects: restrictions are defined for the moving paths of the initial points so that their order is kept and zigzags are avoided; reconstructed 2D curve from the projection of 3D points on one plane are translated as the initial shape to recover the 3D curve. The improved algorithm is applied to generate random number of samples from slices of unorganized 3D point cloud, which can then be easily represented by triangulated or spline surface. Improvements of the algorithm are tested with some 2D and 3D unorganized points, and the results are encouraging.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116757908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}