{"title":"A Business Process of Web Services Testing Method Based on UML2.0 Activity Diagram","authors":"Guangquan Zhang, Rong Mei, Jun Zhang","doi":"10.1109/IITA.2007.83","DOIUrl":"https://doi.org/10.1109/IITA.2007.83","url":null,"abstract":"In order to increase the reliability of Web services business process, a BPEL modeling and testing approach based on UML2.0 activity diagram is presented. The key idea of the approach is to transform the business process interaction via BPEL code to visual and dynamic testing model. The approach extends UML2.0 activity diagram to describe the syntax and behaviors of BPEL. The formal specification and the definition of test coverage criteria of UML2.0 activity diagram are proposed. It enhances the restriction of test cases generation method and promotes the efficiency and accuracy of testing by reducing the amount of test cases reasonably. To illustrate this more thoroughly, this paper discusses the feasibility of automated testing using Web services business process testing model with an example.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126571394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Intrusion Alarm System Based on Fuzzy Reasoning Machine","authors":"An Jiyao, Wu Ronghui, L. Renfa, Xu Cheng","doi":"10.1109/IITA.2007.30","DOIUrl":"https://doi.org/10.1109/IITA.2007.30","url":null,"abstract":"A new intrusion alarm system is presented in this paper which is skillfully combined with fuzzy reasoning and neural network technology. In order to overcome the difficulty of specifying the membership function of rules depending on experiences of experts in multi-dimensional space, fuzzy reasoning machine network model is introduced to carry through proper nonlinear division of input/output characteristics of complex system. The new system architecture adopts the network processor to collect and analyze the data in the low layer of network, and a test prototype system is established. For an example of network traffic character by network worm, we realize abnormal network behavior, which is caused by the change of network traffic, can be detected in time and accurately.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124108368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Modeling Web Navigation Using FSM and Z","authors":"Zhong-sheng Qian, Huai-kou Miao, Shengbo Chen","doi":"10.1109/IITA.2007.92","DOIUrl":"https://doi.org/10.1109/IITA.2007.92","url":null,"abstract":"As Web applications are becoming more and more complex, there is an increasing concern about how to retrieve and navigate effectively to new information. This has driven many researchers to investigate into how people navigate within Web applications, and how the Web applications should be modeled and designed. In the work, a novel approach is proposed to modeling Web navigation for its formal representation using FSM (Finite State Machine) and Z language. It models user behavior in page navigation by FSM and specifies Web pages, hyperlinks, page-scoped variables and frames using Z. Such provides the users with two different views, one of which concerns behavioral navigability and another concerns page linkage, of a Web application. The proposed approach affords an underlying guideline for modeling Web navigation combining FSM with Z.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125802626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation of Attacks on Network-based Error Detection","authors":"Ming Hu, Minghua Jiang","doi":"10.1109/IITA.2007.75","DOIUrl":"https://doi.org/10.1109/IITA.2007.75","url":null,"abstract":"CRC and checksum are two error-detecting mechanisms widely used in the computer network. A novice evaluating simulation model based on attacking these two codes is proposed and the correspondent evaluating methods are discussed. In this model, the size and content of any data packet is produced by random number generator and the changes of the packet's content is implemented by simulating natural and manual attacks. The results show that these two error-detecting codes have the strong ability against natural attacks, but no ability against manual attacks which facilitate the destruction of data authentication and data-accessing availability.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130853768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Triple Space Computing Based Semantic Web Services Communication","authors":"Y. Liang, Xue-li Yu, Rui Wang","doi":"10.1109/IITA.2007.42","DOIUrl":"https://doi.org/10.1109/IITA.2007.42","url":null,"abstract":"The synchronous communication technology used in Semantic Web services requires both the service owner and the invoker be available at the same time. Thus, their interaction reduces scalability. Triple Space Computing is envisioned as communication and coordination paradigm for Semantic Web Services, which is an extension of tuple space computing to support RDF. We use it for communication based on principle of persistent publication and read or write data. In this paper we describe an architecture based on Triple Space Computing for Semantic Web Services communication. The mechanism is based on asynchronous communication, which would greatly improve the performance and efficiency of communication.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130997581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Design of Pulse Wave Signal Collecting and Analysis System Based on USB","authors":"Tingyun Chen, Yimin Yang, Song Zhang, Z. Luo","doi":"10.1109/IITA.2007.63","DOIUrl":"https://doi.org/10.1109/IITA.2007.63","url":null,"abstract":"As the rapid increase of the incidence of cardiovascular disease, more and more people begin to realize the importance of detecting and monitoring the cardiovascular function. However, the traditional non-invasive cardiovascular function detecting methods trend to be more expensive, complicated and settled, which are not suitable for real-time and fast detecting. A novel pulse wave collecting and analysis system is designed in this paper to achieve the goal of real-time pulse wave collecting and cardiovascular function detecting, which is portable and easy to use. The MCU used in the proposed signal collector is C8051F320 designed by Silicon Laboratories. A USB-based pulse wave signal collector with appropriately designed I/O interface and peripherals is designed and implemented firstly. Then, an analysis software designed for Personal Computer (PC) is developed based on radial pulse contour characteristic value K method. Finally, the experimental results demonstrate the validity of the proposed system.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"86 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133857842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtual Human of Intelligent Agriculture Behavior and Realization","authors":"Yisong Liu, Qingfeng Hu, Qingbo Yang","doi":"10.1109/IITA.2007.15","DOIUrl":"https://doi.org/10.1109/IITA.2007.15","url":null,"abstract":"As virtual human of agriculture intelligent about operating environment and target of complexity and uncertainty, Virtual human operator is not an effective access to navigation knowledge to conduct its decision making .To solve these problems, the put use Congolog to action planning of virtual human. Virtual human found a high level of uncertainty from some of the legal procedure of formation of the implementation of the mandate of action sequences, replaced the virtual human from the initial state to the target state for the action sequences. So as to take virtual human encountered by the complexity and uncertainty. Finally, JAVA and Congolog take for virtual human of intelligent agriculture to picking fruit.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134316521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Embedded Audio and Video Compression System","authors":"Yongqiang Zhang, Bing Zhang","doi":"10.1109/IITA.2007.93","DOIUrl":"https://doi.org/10.1109/IITA.2007.93","url":null,"abstract":"In this paper, an ARM+GO7007SB structure is put forward as the solution of embedded audio and video compression system. This design proposal is characterized by high processing speed, low cost, good image quality and real-time implementation. Combining with the forthcoming 3G technology, the design could be applied to mobile video services, such as mobile remote video surveillance system, with bright market prospect.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133572363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the NURBS unrolling&rolling of the columned entity design","authors":"Yu Guizhen, Ding Nenggen, Zhang Wei","doi":"10.1109/IITA.2007.73","DOIUrl":"https://doi.org/10.1109/IITA.2007.73","url":null,"abstract":"The complex columned entity design is very difficult. The paper mainly discussed 3D modeling technology, bought forward the NURBS (non-uniform rational B-splines) unrolling and rolling algorithms, explained the NURBS circle and cylinder NURBS surface unrolling & rolling and analyzed the unrolling and rolling error. The unrolling & rolling programs which run in the CAD software have been developed. By a sample, It shows that the unrolling & rolling program will make designing the complex columned entity more easily and efficient. The program of the unrolling & rolling algorithms is applied successfully in the camera part model.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117136217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Simple and Efficient Multiscale Edge Detection Method Based on Image Diffusion","authors":"Yingjie Zhang, L. Ge","doi":"10.1109/IITA.2007.21","DOIUrl":"https://doi.org/10.1109/IITA.2007.21","url":null,"abstract":"In this paper, a fast multi-scale edge detection approach is proposed based on the theories of image diffusion and curve evolution. In comparison with the previous edge detection approaches, edge detection is performed in two steps: beginning by detecting the initial contours at a courser scale that is performed by using a linear diffusion coupling with the denoising effect and gray transformation, then the obtained contour curves are mapped and further refined up to finer scales using the fast Hermes algorithm. By this way, the experimental results show that the proposed edge detection approach are more promising than the existing methods for object detection on general images, especially on medical images.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121218983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}