Workshop on Intelligent Information Technology Application (IITA 2007)最新文献

筛选
英文 中文
A Business Process of Web Services Testing Method Based on UML2.0 Activity Diagram 基于UML2.0活动图的Web服务业务流程测试方法
Workshop on Intelligent Information Technology Application (IITA 2007) Pub Date : 2007-12-02 DOI: 10.1109/IITA.2007.83
Guangquan Zhang, Rong Mei, Jun Zhang
{"title":"A Business Process of Web Services Testing Method Based on UML2.0 Activity Diagram","authors":"Guangquan Zhang, Rong Mei, Jun Zhang","doi":"10.1109/IITA.2007.83","DOIUrl":"https://doi.org/10.1109/IITA.2007.83","url":null,"abstract":"In order to increase the reliability of Web services business process, a BPEL modeling and testing approach based on UML2.0 activity diagram is presented. The key idea of the approach is to transform the business process interaction via BPEL code to visual and dynamic testing model. The approach extends UML2.0 activity diagram to describe the syntax and behaviors of BPEL. The formal specification and the definition of test coverage criteria of UML2.0 activity diagram are proposed. It enhances the restriction of test cases generation method and promotes the efficiency and accuracy of testing by reducing the amount of test cases reasonably. To illustrate this more thoroughly, this paper discusses the feasibility of automated testing using Web services business process testing model with an example.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126571394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
An Intrusion Alarm System Based on Fuzzy Reasoning Machine 基于模糊推理机的入侵报警系统
Workshop on Intelligent Information Technology Application (IITA 2007) Pub Date : 2007-12-02 DOI: 10.1109/IITA.2007.30
An Jiyao, Wu Ronghui, L. Renfa, Xu Cheng
{"title":"An Intrusion Alarm System Based on Fuzzy Reasoning Machine","authors":"An Jiyao, Wu Ronghui, L. Renfa, Xu Cheng","doi":"10.1109/IITA.2007.30","DOIUrl":"https://doi.org/10.1109/IITA.2007.30","url":null,"abstract":"A new intrusion alarm system is presented in this paper which is skillfully combined with fuzzy reasoning and neural network technology. In order to overcome the difficulty of specifying the membership function of rules depending on experiences of experts in multi-dimensional space, fuzzy reasoning machine network model is introduced to carry through proper nonlinear division of input/output characteristics of complex system. The new system architecture adopts the network processor to collect and analyze the data in the low layer of network, and a test prototype system is established. For an example of network traffic character by network worm, we realize abnormal network behavior, which is caused by the change of network traffic, can be detected in time and accurately.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124108368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards Modeling Web Navigation Using FSM and Z 基于FSM和Z的Web导航建模
Workshop on Intelligent Information Technology Application (IITA 2007) Pub Date : 2007-12-02 DOI: 10.1109/IITA.2007.92
Zhong-sheng Qian, Huai-kou Miao, Shengbo Chen
{"title":"Towards Modeling Web Navigation Using FSM and Z","authors":"Zhong-sheng Qian, Huai-kou Miao, Shengbo Chen","doi":"10.1109/IITA.2007.92","DOIUrl":"https://doi.org/10.1109/IITA.2007.92","url":null,"abstract":"As Web applications are becoming more and more complex, there is an increasing concern about how to retrieve and navigate effectively to new information. This has driven many researchers to investigate into how people navigate within Web applications, and how the Web applications should be modeled and designed. In the work, a novel approach is proposed to modeling Web navigation for its formal representation using FSM (Finite State Machine) and Z language. It models user behavior in page navigation by FSM and specifies Web pages, hyperlinks, page-scoped variables and frames using Z. Such provides the users with two different views, one of which concerns behavioral navigability and another concerns page linkage, of a Web application. The proposed approach affords an underlying guideline for modeling Web navigation combining FSM with Z.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125802626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Simulation of Attacks on Network-based Error Detection 基于网络的错误检测攻击仿真
Workshop on Intelligent Information Technology Application (IITA 2007) Pub Date : 2007-12-02 DOI: 10.1109/IITA.2007.75
Ming Hu, Minghua Jiang
{"title":"Simulation of Attacks on Network-based Error Detection","authors":"Ming Hu, Minghua Jiang","doi":"10.1109/IITA.2007.75","DOIUrl":"https://doi.org/10.1109/IITA.2007.75","url":null,"abstract":"CRC and checksum are two error-detecting mechanisms widely used in the computer network. A novice evaluating simulation model based on attacking these two codes is proposed and the correspondent evaluating methods are discussed. In this model, the size and content of any data packet is produced by random number generator and the changes of the packet's content is implemented by simulating natural and manual attacks. The results show that these two error-detecting codes have the strong ability against natural attacks, but no ability against manual attacks which facilitate the destruction of data authentication and data-accessing availability.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130853768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Triple Space Computing Based Semantic Web Services Communication 基于三空间计算的语义Web服务通信
Workshop on Intelligent Information Technology Application (IITA 2007) Pub Date : 2007-12-02 DOI: 10.1109/IITA.2007.42
Y. Liang, Xue-li Yu, Rui Wang
{"title":"Triple Space Computing Based Semantic Web Services Communication","authors":"Y. Liang, Xue-li Yu, Rui Wang","doi":"10.1109/IITA.2007.42","DOIUrl":"https://doi.org/10.1109/IITA.2007.42","url":null,"abstract":"The synchronous communication technology used in Semantic Web services requires both the service owner and the invoker be available at the same time. Thus, their interaction reduces scalability. Triple Space Computing is envisioned as communication and coordination paradigm for Semantic Web Services, which is an extension of tuple space computing to support RDF. We use it for communication based on principle of persistent publication and read or write data. In this paper we describe an architecture based on Triple Space Computing for Semantic Web Services communication. The mechanism is based on asynchronous communication, which would greatly improve the performance and efficiency of communication.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130997581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Design of Pulse Wave Signal Collecting and Analysis System Based on USB 基于USB的脉冲波信号采集与分析系统设计
Workshop on Intelligent Information Technology Application (IITA 2007) Pub Date : 2007-12-02 DOI: 10.1109/IITA.2007.63
Tingyun Chen, Yimin Yang, Song Zhang, Z. Luo
{"title":"A Design of Pulse Wave Signal Collecting and Analysis System Based on USB","authors":"Tingyun Chen, Yimin Yang, Song Zhang, Z. Luo","doi":"10.1109/IITA.2007.63","DOIUrl":"https://doi.org/10.1109/IITA.2007.63","url":null,"abstract":"As the rapid increase of the incidence of cardiovascular disease, more and more people begin to realize the importance of detecting and monitoring the cardiovascular function. However, the traditional non-invasive cardiovascular function detecting methods trend to be more expensive, complicated and settled, which are not suitable for real-time and fast detecting. A novel pulse wave collecting and analysis system is designed in this paper to achieve the goal of real-time pulse wave collecting and cardiovascular function detecting, which is portable and easy to use. The MCU used in the proposed signal collector is C8051F320 designed by Silicon Laboratories. A USB-based pulse wave signal collector with appropriately designed I/O interface and peripherals is designed and implemented firstly. Then, an analysis software designed for Personal Computer (PC) is developed based on radial pulse contour characteristic value K method. Finally, the experimental results demonstrate the validity of the proposed system.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"86 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133857842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Virtual Human of Intelligent Agriculture Behavior and Realization 智能农业行为的虚拟人及其实现
Workshop on Intelligent Information Technology Application (IITA 2007) Pub Date : 2007-12-02 DOI: 10.1109/IITA.2007.15
Yisong Liu, Qingfeng Hu, Qingbo Yang
{"title":"Virtual Human of Intelligent Agriculture Behavior and Realization","authors":"Yisong Liu, Qingfeng Hu, Qingbo Yang","doi":"10.1109/IITA.2007.15","DOIUrl":"https://doi.org/10.1109/IITA.2007.15","url":null,"abstract":"As virtual human of agriculture intelligent about operating environment and target of complexity and uncertainty, Virtual human operator is not an effective access to navigation knowledge to conduct its decision making .To solve these problems, the put use Congolog to action planning of virtual human. Virtual human found a high level of uncertainty from some of the legal procedure of formation of the implementation of the mandate of action sequences, replaced the virtual human from the initial state to the target state for the action sequences. So as to take virtual human encountered by the complexity and uncertainty. Finally, JAVA and Congolog take for virtual human of intelligent agriculture to picking fruit.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134316521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design of Embedded Audio and Video Compression System 嵌入式音视频压缩系统的设计
Workshop on Intelligent Information Technology Application (IITA 2007) Pub Date : 2007-12-02 DOI: 10.1109/IITA.2007.93
Yongqiang Zhang, Bing Zhang
{"title":"Design of Embedded Audio and Video Compression System","authors":"Yongqiang Zhang, Bing Zhang","doi":"10.1109/IITA.2007.93","DOIUrl":"https://doi.org/10.1109/IITA.2007.93","url":null,"abstract":"In this paper, an ARM+GO7007SB structure is put forward as the solution of embedded audio and video compression system. This design proposal is characterized by high processing speed, low cost, good image quality and real-time implementation. Combining with the forthcoming 3G technology, the design could be applied to mobile video services, such as mobile remote video surveillance system, with bright market prospect.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133572363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on the NURBS unrolling&rolling of the columned entity design 圆柱实体设计的NURBS开滚技术研究
Workshop on Intelligent Information Technology Application (IITA 2007) Pub Date : 2007-12-02 DOI: 10.1109/IITA.2007.73
Yu Guizhen, Ding Nenggen, Zhang Wei
{"title":"Research on the NURBS unrolling&rolling of the columned entity design","authors":"Yu Guizhen, Ding Nenggen, Zhang Wei","doi":"10.1109/IITA.2007.73","DOIUrl":"https://doi.org/10.1109/IITA.2007.73","url":null,"abstract":"The complex columned entity design is very difficult. The paper mainly discussed 3D modeling technology, bought forward the NURBS (non-uniform rational B-splines) unrolling and rolling algorithms, explained the NURBS circle and cylinder NURBS surface unrolling & rolling and analyzed the unrolling and rolling error. The unrolling & rolling programs which run in the CAD software have been developed. By a sample, It shows that the unrolling & rolling program will make designing the complex columned entity more easily and efficient. The program of the unrolling & rolling algorithms is applied successfully in the camera part model.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117136217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Simple and Efficient Multiscale Edge Detection Method Based on Image Diffusion 一种简单高效的基于图像扩散的多尺度边缘检测方法
Workshop on Intelligent Information Technology Application (IITA 2007) Pub Date : 2007-12-02 DOI: 10.1109/IITA.2007.21
Yingjie Zhang, L. Ge
{"title":"A Simple and Efficient Multiscale Edge Detection Method Based on Image Diffusion","authors":"Yingjie Zhang, L. Ge","doi":"10.1109/IITA.2007.21","DOIUrl":"https://doi.org/10.1109/IITA.2007.21","url":null,"abstract":"In this paper, a fast multi-scale edge detection approach is proposed based on the theories of image diffusion and curve evolution. In comparison with the previous edge detection approaches, edge detection is performed in two steps: beginning by detecting the initial contours at a courser scale that is performed by using a linear diffusion coupling with the denoising effect and gray transformation, then the obtained contour curves are mapped and further refined up to finer scales using the fast Hermes algorithm. By this way, the experimental results show that the proposed edge detection approach are more promising than the existing methods for object detection on general images, especially on medical images.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121218983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信