{"title":"A Feasible Process For Mining Corpus From Web","authors":"Chao Wang, Dequan Zheng, T. Zhao, Ji Guo","doi":"10.1109/EMEIT.2011.6080758","DOIUrl":"https://doi.org/10.1109/EMEIT.2011.6080758","url":null,"abstract":"Mining bilingual parallel sentence pair from Web data is the most effective way to get large-scale of bilingual corpus. In this paper, we put forward both the set of method and the series of process for extracting parallel sentence pair from nonspecific web date source. considering 1.1 billion page as the web data input, with a sequence of steps we get several sentences pair which has 81% recall and 85% precision, on this basis we bring up a parameter for measure quality of sentence pair. After filter sentence pair by this parameter, we get 850 thousand unique sentence pairs. On filtering by this parameter, the precision increase to 95%, meanwhile the recall only decrease by 1%.","PeriodicalId":216097,"journal":{"name":"Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114347050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A conceptual model for preventing web bypass vulnerabilities","authors":"Zhiqiang Wei, Kaiyuan Shi, Dongning Jia","doi":"10.1109/EMEIT.2011.6023568","DOIUrl":"https://doi.org/10.1109/EMEIT.2011.6023568","url":null,"abstract":"This paper provides a conceptual model for reducing bypass vulnerabilities in web applications. The typical and primary two kinds of bypass vulnerabilities are authentication and access control vulnerabilities. Authentication attacks occur when a web application authenticates users incorrectly and grants access for users without appropriate credentials. Access control attacks happen when access control check is incorrect or missing, allowing unauthorized access to privileged resources. Such attacks are getting increasingly common and have occurred in many famous web applications such as IIS and WordPress, and 14% of surveyed web sites [5]. However, currently no available tools or methods can prevent these attacks efficiently. By using Dynamic Information Flow Tracking (DIFT) techniques to track the flow of user credentials through the application's language runtime, the model presented in this paper can automatically detect when an application safely and correctly authenticates users. Then the model combines authentication information with programmer-supplied access control rules to automatically ensure that only properly authenticated users are granted access to privileged resources or data.","PeriodicalId":216097,"journal":{"name":"Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114968479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modal analysis of compound grinder for grinding end face and inner hole","authors":"M. Duan, Boyin Li","doi":"10.1109/EMEIT.2011.6023252","DOIUrl":"https://doi.org/10.1109/EMEIT.2011.6023252","url":null,"abstract":"According to the structure of compound grinder for grinding end face and inner hole of tappet body, this paper established the finite element (FE) model and presented the modal analysis of the compound grinder and its components by means of three-dimensional software and FE method. The first four natural frequencies and modal shapes of the compound grinder were given. As a result, the weaknesses of the compound grinder were determined and it offered the basis for improving dynamic property of the compound grinder.","PeriodicalId":216097,"journal":{"name":"Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115147391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on RFID-based monitoring platform for wireless sensor networks","authors":"Y. Hu, Xiaowang Guo, Jianyong Zhu","doi":"10.1109/EMEIT.2011.6023003","DOIUrl":"https://doi.org/10.1109/EMEIT.2011.6023003","url":null,"abstract":"A RFID tag based wireless sensor test platform is proposed in this paper, the system build a real-time monitoring of sensor network platform by using RFID tag and WSN technology. By the combination of the wireless sensor nodes, and RFID technology, and other basic technology of things, the building of an intelligent wireless sensor monitoring platform is proposed, which can not only expand the wireless sensor network are aware of the depth and breadth of information, but also the real-time monitoring and positioning quality of the items can be achieved. In this paper, the overall design of the system is proposed and the system routing and positioning protocol is analyzed, the core technologies in design are discussed, and the system is a overall solution for comprehensive RFID-based wireless sensor network to monitor.","PeriodicalId":216097,"journal":{"name":"Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115505713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and development of rolling bearing vibration signal analysis system","authors":"Wensheng Su, Fengtao Wang","doi":"10.1109/EMEIT.2011.6023648","DOIUrl":"https://doi.org/10.1109/EMEIT.2011.6023648","url":null,"abstract":"Taking the respective advantages of LabView and Matlab, an on-line vibration signal analysis system of rolling bearing was designed and developed. First, system scheme design was introduced. Then each module of the system was discussed. Finally, system application examples were given, which verified the convenience and effectiveness of this system.","PeriodicalId":216097,"journal":{"name":"Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123112897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Similarity theory which used in knuckle-joint press design","authors":"Danhong Li","doi":"10.1109/EMEIT.2011.6022921","DOIUrl":"https://doi.org/10.1109/EMEIT.2011.6022921","url":null,"abstract":"We have designed the knuckle-joint press which can fit parametric variation. According to the theory about combining press devices' size design with similarity theory, we have designed knuckle-joint press's mechanical design by means of engineering limitation. We also have verified these designs for many times by comparing design model with formulations, which makes the whole design meet practical using. The methods which have been introduced here have great important roles on mechanical design.","PeriodicalId":216097,"journal":{"name":"Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123118920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The algorithm research of penetration distance based on normalization processing","authors":"Jun-wei Sun, Ya Zhang","doi":"10.1109/EMEIT.2011.6024000","DOIUrl":"https://doi.org/10.1109/EMEIT.2011.6024000","url":null,"abstract":"In order to get the real-time penetrating distance of the projectile and make it detonate in the predetermined depth, this article puts forward the algorithm of penetration distance based on normalization processing, using ANSYS/LS-DYNA software to simulate the process of projectile penetrating vertically into concrete targets through which the projectile penetration acceleration signal can be reached, reading the signal by utilizing the penetration distance detonation control module, and verifying the algorithm. The result indicates that the relative error of this algorithm is small, and it can also reduce the processing time of the microprocessor, which states that this algorithm is well-designed.","PeriodicalId":216097,"journal":{"name":"Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123120251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measuring the performance of knowledge sharing in regional innovation","authors":"Y. Xi, Kang Ping","doi":"10.1109/EMEIT.2011.6023970","DOIUrl":"https://doi.org/10.1109/EMEIT.2011.6023970","url":null,"abstract":"Based on panel data collected for seven years (2003–2009) of 30 provinces, the efficiency of knowledge sharing in regional innovation in China was evaluated by DEA Malmquist indexes model. The result indicated that knowledge sharing efficiency of six regions was improved respectively. As the same time, technical efficiency of knowledge sharing process in West China grew fast because of the advantage of backwardness so that it can acquire and absorb knowledge more quickly. As being lack of satisfactory performance in the technical efficiency, cross-organization excitation mechanism that support cross-sector collaboration and knowledge transfer between institutions and locally industries were more or less unsatisfactory.","PeriodicalId":216097,"journal":{"name":"Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115764794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Coal mine reconfigurable monitoring model based on Wireless Sensor Network","authors":"D. Zhang, Rui Wang, Jian Cai","doi":"10.1109/EMEIT.2011.6023145","DOIUrl":"https://doi.org/10.1109/EMEIT.2011.6023145","url":null,"abstract":"In this paper, we present the model of reconfigurable monitoring based on Wireless Sensor Network (WSN), which merges the technology of reconfigurable virtual instrument and WSN. A set of multi-function monitoring instrument platform with WSN characteristic was developed by using Visual Studio software. This instrument can not only visually display the present topological graph of monitor area, but also enhance module reuse. Finally, a monitoring instrument, facing the equipment of hoist room in coal mine, was designed and constructed. The result shows the platform realizes reconfigurable function of the instrument module online and dynamically.","PeriodicalId":216097,"journal":{"name":"Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116795544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation research on direct sequence spread spectrum communication system over Rayleigh Fading Channels","authors":"Yun-hang Zhu, Ping-hua Zhang, Ming-yuan Deng","doi":"10.1109/EMEIT.2011.6023115","DOIUrl":"https://doi.org/10.1109/EMEIT.2011.6023115","url":null,"abstract":"Under the software environment of MATLAB/Simulink, the communication system of direct sequence spread spectrum (DSSS) is dynamically modeled and simulated over a new practical Rayleigh channel, and the relationship curves of the bit error rate (BER) with the signal-to-noise ratio (SNR) of DSSS communication systems are presented. It is analyzed that DSSS system can effectively overcome multipath fading in multipath Rayleigh Fading Channel (RFC). In addition, the anti-multipath fading performance improved by the way of increasing pseudo noise (PN) code length is better than that by the way of increasing the spread spectrum gain in the condition of strong multipath fading.","PeriodicalId":216097,"journal":{"name":"Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117202350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}