{"title":"The study on network topology discovery algorithm based on SNMP protocol and ICMP protocol","authors":"Han Yan","doi":"10.1109/ICSESS.2012.6269554","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269554","url":null,"abstract":"The network topology visualization technology can be researched from the following several aspects: (1) Study adaptability of network topology discovery. It needs a kind of algorithm which can quickly detect the network topology of a completely unknown structural network. (2) Multiple effect integration of Visualization technology. The current network topology management system usually only use a single visual tools to visualization data. As Web technology development and graphics processing technology development, AIR technology and the 3D technology is more and more widely used. If they can be used into the network topology visualization design and implementation, Visualization effect will reach a new high level. (3) The integration of network topology visualization technology and network management. Although the point of network topology visualization is visualization, it should include more modern network management functions, in order to truly realize the value of the technology research.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124103622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"jQuery-based Ajax general interactive architecture","authors":"Jingjing Li, Chunlin Peng","doi":"10.1109/ICSESS.2012.6269466","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269466","url":null,"abstract":"This paper proposes a jQuery-based Ajax general interactive architecture under the research and summary of lots of Ajax application examples. This architecture designs and implements a general Ajax standard interactive model which comparing to traditional process, can effectively conceal the complex Ajax handling mechanism, swiftly realize the Ajax process and reduce the work of exploration.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129245035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation on the talent's ecological environmental competitiveness of shandong peninsula blue economic zone","authors":"Hengbo Du, Yanfeng Xu","doi":"10.1109/ICSESS.2012.6269530","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269530","url":null,"abstract":"21st century is the century of the ocean, therefore, competing in the ocean and developing the ocean resources in depth is an irresistible trend. Shandong peninsula blue economic zone needs the evaluation method which can reflect the talent's ecological environment competitiveness, so as to provide the basis for the government's scientific decision. Based on the literature review and depth interview, the paper established evaluation index system of talent's ecological environmental competitiveness in Shandong peninsula blue economic zone. The weight of each index is assigned by the method of analytic hierarchy process. In the end, fuzzy comprehensive evaluation model on the talent's ecological environmental competitiveness of Shandong peninsula blue economic zone is established.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116008325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A fuzzy mobile recommender system: JQMobile vs FlashBuilder implementations","authors":"A. Costanzo, A. Faro","doi":"10.1109/ICSESS.2012.6269517","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269517","url":null,"abstract":"Mobility and logistics activities could be supported effectively if the mobile users may know the best path to destination and the loading and unloading paths by means of navigators based on the current traffic and weather conditions. Also, personal data as well user preferences should be considered by the navigators to generate effective recommendations. However, not all the relevant data may be known in a precise way since they often derive from statistical information, as well as knowing all the real time information is not always feasible due to the high cost of the sensing systems. Moreover, we don't have simple mathematical models able to generate fast right recommendations, as required in the rapidly evolving scenarios featuring the activities of walking and driving people. For this reason, the paper aims at illustrating how fuzzy logic may be used for computing measurements and perceptions by qualitative rules and to generate timely recommendations helpful to mobile users. These recommendations will consider the environmental conditions in real time, the current personal constraints and the preferences expressed in the past by the users. The paper not only proposes the methodology, but also illustrates how a Ruby on Rails server provided with a proper JQMobile interface may offer such location intelligence services taking also advantage from the information coming from social networks. A Flash Builder version to save the RoR server time and to improve privacy is also illustrated.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116953241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new remory management mechanism based on embedded system","authors":"Xiaohui Cheng, Anming Xu","doi":"10.1109/ICSESS.2012.6269425","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269425","url":null,"abstract":"This paper expounds a predictable and adaptive management of the embedded system dynamic memory. The solution puts the survivable design in a memory static area and partitions in dynamic area again. It puts those similar objects in the object pool subarea, and the other applicants are distributed in normal subarea. Both subareas adjust the size by transmitting parameters. In normal subarea, the paper puts forward predictable mechanism for the first time. Besides, by introducing a new data structure and combining classic buddy algorithm, it improves the adaptive algorithm of delay recovery with statistical data and applicant time interval. Finally the solution is confirmed more safely and efficiently by simulation experiments.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"285 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127398945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on the evaluation of inland river shipping enterprises' safety management level based on triangular fuzzy number","authors":"X. Zeng, Qing Liu","doi":"10.1109/ICSESS.2012.6269437","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269437","url":null,"abstract":"Enterprises safety management with the characteristics of long-term, complexity and indirect benefits determines inland river shipping enterprises to make inadequate investments. It is significant that evaluate the inland river shipping enterprises' level of safety management for enterprises to find out hidden danger, to prevent the occurrence of major accident, and to improve safety assurance ability. This article starts by demonstrating the necessity of evaluating the safety management on behalf of inland river shipping enterprises. Then it builds an evaluation model of inland river shipping enterprises' safety management based on triangular fuzzy number. And it ends with an empirical study in the hope of offering references for China Inland River shipping enterprises.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124301982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fragment pattern for data warehouse","authors":"E. Valentikova, A. Lieskovsky, M. Zábovský","doi":"10.1109/ICSESS.2012.6269461","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269461","url":null,"abstract":"Data warehouse fragmentation is one of the main problems in distributed data warehouse (DDW) design. The first step in DDW design, which in fact affects overall solution, is the definition of fragments. In this work we present our approach to improve fragment allocation by their ordering before allocation process.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122772473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application research of correlation detection technology in optical densitometer","authors":"Yanjun Lu, Junying Wang","doi":"10.1109/ICSESS.2012.6269427","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269427","url":null,"abstract":"A brief introduction of the principle of correlation detection is present in this paper. As portable field-test equipment, an optical densitometer is designed with correlation detection technology to increase detection precision. In the process of designing, cross-correlation is applied to extract weak signal from strong noise. Simulation result with MATLAB shows that the correlation detection processed good performance in this application.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122097093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fault localization via behavioral models","authors":"Xiaomin Wan, Xiaoguang Mao, Ziying Dai","doi":"10.1109/ICSESS.2012.6269507","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269507","url":null,"abstract":"Software errors significantly impact software quality, and improvement of fault localization can reduce the expense of debugging. SBFL is promising approach and have received a lot of attention due to its simplicity and effectiveness. However, there are still some limits in this approach. In this paper we address these limits and present a technique to build a novel behavioral model, and propose a corresponding fault localization technique. Furthermore, we performed a study to empirically validate the effectiveness of our approach. And experimental results indicated that our method outperformed other representative SBFL techniques in locating faults in the benchmark. We show that the effectiveness of the technique comes from the guidance of hierarchical behavioral model.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123252317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sole error locating array and approximate error locating array","authors":"Wujie Zhou, Deping Zhang","doi":"10.1109/ICSESS.2012.6269509","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269509","url":null,"abstract":"Combinatorial interaction testing (CIT) is a method to detect the fault interactions among the parameters or components in a system. However the most works in the field of combinatorial interaction testing focus on detecting interaction faults rather than locating them. (d, t)-locating arrays and (d, t)-detecting arrays were proposed by C. J. Colbourn and D. W. McClary to locate and detect the interaction fault. In the paper, we study the structure of the special fault locating array that is able to locate sole interaction fault among the parameters or components, namely (1, t)-detecting arrays, and then propose the concept and construction method of approximate error locating array based on the special error locating array. The AETG-like algorithms to generate these special arrays are provided.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128382528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}