Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology最新文献

筛选
英文 中文
A Feasible Process For Mining Corpus From Web 一种可行的Web语料库挖掘方法
Chao Wang, Dequan Zheng, T. Zhao, Ji Guo
{"title":"A Feasible Process For Mining Corpus From Web","authors":"Chao Wang, Dequan Zheng, T. Zhao, Ji Guo","doi":"10.1109/EMEIT.2011.6080758","DOIUrl":"https://doi.org/10.1109/EMEIT.2011.6080758","url":null,"abstract":"Mining bilingual parallel sentence pair from Web data is the most effective way to get large-scale of bilingual corpus. In this paper, we put forward both the set of method and the series of process for extracting parallel sentence pair from nonspecific web date source. considering 1.1 billion page as the web data input, with a sequence of steps we get several sentences pair which has 81% recall and 85% precision, on this basis we bring up a parameter for measure quality of sentence pair. After filter sentence pair by this parameter, we get 850 thousand unique sentence pairs. On filtering by this parameter, the precision increase to 95%, meanwhile the recall only decrease by 1%.","PeriodicalId":216097,"journal":{"name":"Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114347050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A conceptual model for preventing web bypass vulnerabilities 防止web绕过漏洞的概念模型
Zhiqiang Wei, Kaiyuan Shi, Dongning Jia
{"title":"A conceptual model for preventing web bypass vulnerabilities","authors":"Zhiqiang Wei, Kaiyuan Shi, Dongning Jia","doi":"10.1109/EMEIT.2011.6023568","DOIUrl":"https://doi.org/10.1109/EMEIT.2011.6023568","url":null,"abstract":"This paper provides a conceptual model for reducing bypass vulnerabilities in web applications. The typical and primary two kinds of bypass vulnerabilities are authentication and access control vulnerabilities. Authentication attacks occur when a web application authenticates users incorrectly and grants access for users without appropriate credentials. Access control attacks happen when access control check is incorrect or missing, allowing unauthorized access to privileged resources. Such attacks are getting increasingly common and have occurred in many famous web applications such as IIS and WordPress, and 14% of surveyed web sites [5]. However, currently no available tools or methods can prevent these attacks efficiently. By using Dynamic Information Flow Tracking (DIFT) techniques to track the flow of user credentials through the application's language runtime, the model presented in this paper can automatically detect when an application safely and correctly authenticates users. Then the model combines authentication information with programmer-supplied access control rules to automatically ensure that only properly authenticated users are granted access to privileged resources or data.","PeriodicalId":216097,"journal":{"name":"Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114968479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modal analysis of compound grinder for grinding end face and inner hole 端面和内孔复合磨床模态分析
M. Duan, Boyin Li
{"title":"Modal analysis of compound grinder for grinding end face and inner hole","authors":"M. Duan, Boyin Li","doi":"10.1109/EMEIT.2011.6023252","DOIUrl":"https://doi.org/10.1109/EMEIT.2011.6023252","url":null,"abstract":"According to the structure of compound grinder for grinding end face and inner hole of tappet body, this paper established the finite element (FE) model and presented the modal analysis of the compound grinder and its components by means of three-dimensional software and FE method. The first four natural frequencies and modal shapes of the compound grinder were given. As a result, the weaknesses of the compound grinder were determined and it offered the basis for improving dynamic property of the compound grinder.","PeriodicalId":216097,"journal":{"name":"Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115147391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on RFID-based monitoring platform for wireless sensor networks 基于rfid的无线传感器网络监控平台研究
Y. Hu, Xiaowang Guo, Jianyong Zhu
{"title":"Research on RFID-based monitoring platform for wireless sensor networks","authors":"Y. Hu, Xiaowang Guo, Jianyong Zhu","doi":"10.1109/EMEIT.2011.6023003","DOIUrl":"https://doi.org/10.1109/EMEIT.2011.6023003","url":null,"abstract":"A RFID tag based wireless sensor test platform is proposed in this paper, the system build a real-time monitoring of sensor network platform by using RFID tag and WSN technology. By the combination of the wireless sensor nodes, and RFID technology, and other basic technology of things, the building of an intelligent wireless sensor monitoring platform is proposed, which can not only expand the wireless sensor network are aware of the depth and breadth of information, but also the real-time monitoring and positioning quality of the items can be achieved. In this paper, the overall design of the system is proposed and the system routing and positioning protocol is analyzed, the core technologies in design are discussed, and the system is a overall solution for comprehensive RFID-based wireless sensor network to monitor.","PeriodicalId":216097,"journal":{"name":"Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115505713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and development of rolling bearing vibration signal analysis system 滚动轴承振动信号分析系统的设计与开发
Wensheng Su, Fengtao Wang
{"title":"Design and development of rolling bearing vibration signal analysis system","authors":"Wensheng Su, Fengtao Wang","doi":"10.1109/EMEIT.2011.6023648","DOIUrl":"https://doi.org/10.1109/EMEIT.2011.6023648","url":null,"abstract":"Taking the respective advantages of LabView and Matlab, an on-line vibration signal analysis system of rolling bearing was designed and developed. First, system scheme design was introduced. Then each module of the system was discussed. Finally, system application examples were given, which verified the convenience and effectiveness of this system.","PeriodicalId":216097,"journal":{"name":"Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123112897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Similarity theory which used in knuckle-joint press design 相似理论在关节压力机设计中的应用
Danhong Li
{"title":"Similarity theory which used in knuckle-joint press design","authors":"Danhong Li","doi":"10.1109/EMEIT.2011.6022921","DOIUrl":"https://doi.org/10.1109/EMEIT.2011.6022921","url":null,"abstract":"We have designed the knuckle-joint press which can fit parametric variation. According to the theory about combining press devices' size design with similarity theory, we have designed knuckle-joint press's mechanical design by means of engineering limitation. We also have verified these designs for many times by comparing design model with formulations, which makes the whole design meet practical using. The methods which have been introduced here have great important roles on mechanical design.","PeriodicalId":216097,"journal":{"name":"Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123118920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The algorithm research of penetration distance based on normalization processing 基于归一化处理的侵彻距离算法研究
Jun-wei Sun, Ya Zhang
{"title":"The algorithm research of penetration distance based on normalization processing","authors":"Jun-wei Sun, Ya Zhang","doi":"10.1109/EMEIT.2011.6024000","DOIUrl":"https://doi.org/10.1109/EMEIT.2011.6024000","url":null,"abstract":"In order to get the real-time penetrating distance of the projectile and make it detonate in the predetermined depth, this article puts forward the algorithm of penetration distance based on normalization processing, using ANSYS/LS-DYNA software to simulate the process of projectile penetrating vertically into concrete targets through which the projectile penetration acceleration signal can be reached, reading the signal by utilizing the penetration distance detonation control module, and verifying the algorithm. The result indicates that the relative error of this algorithm is small, and it can also reduce the processing time of the microprocessor, which states that this algorithm is well-designed.","PeriodicalId":216097,"journal":{"name":"Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123120251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Measuring the performance of knowledge sharing in regional innovation 区域创新中知识共享绩效的测度
Y. Xi, Kang Ping
{"title":"Measuring the performance of knowledge sharing in regional innovation","authors":"Y. Xi, Kang Ping","doi":"10.1109/EMEIT.2011.6023970","DOIUrl":"https://doi.org/10.1109/EMEIT.2011.6023970","url":null,"abstract":"Based on panel data collected for seven years (2003–2009) of 30 provinces, the efficiency of knowledge sharing in regional innovation in China was evaluated by DEA Malmquist indexes model. The result indicated that knowledge sharing efficiency of six regions was improved respectively. As the same time, technical efficiency of knowledge sharing process in West China grew fast because of the advantage of backwardness so that it can acquire and absorb knowledge more quickly. As being lack of satisfactory performance in the technical efficiency, cross-organization excitation mechanism that support cross-sector collaboration and knowledge transfer between institutions and locally industries were more or less unsatisfactory.","PeriodicalId":216097,"journal":{"name":"Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115764794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Coal mine reconfigurable monitoring model based on Wireless Sensor Network 基于无线传感器网络的煤矿可重构监控模型
D. Zhang, Rui Wang, Jian Cai
{"title":"Coal mine reconfigurable monitoring model based on Wireless Sensor Network","authors":"D. Zhang, Rui Wang, Jian Cai","doi":"10.1109/EMEIT.2011.6023145","DOIUrl":"https://doi.org/10.1109/EMEIT.2011.6023145","url":null,"abstract":"In this paper, we present the model of reconfigurable monitoring based on Wireless Sensor Network (WSN), which merges the technology of reconfigurable virtual instrument and WSN. A set of multi-function monitoring instrument platform with WSN characteristic was developed by using Visual Studio software. This instrument can not only visually display the present topological graph of monitor area, but also enhance module reuse. Finally, a monitoring instrument, facing the equipment of hoist room in coal mine, was designed and constructed. The result shows the platform realizes reconfigurable function of the instrument module online and dynamically.","PeriodicalId":216097,"journal":{"name":"Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116795544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation research on direct sequence spread spectrum communication system over Rayleigh Fading Channels 瑞利衰落信道下直接序列扩频通信系统的仿真研究
Yun-hang Zhu, Ping-hua Zhang, Ming-yuan Deng
{"title":"Simulation research on direct sequence spread spectrum communication system over Rayleigh Fading Channels","authors":"Yun-hang Zhu, Ping-hua Zhang, Ming-yuan Deng","doi":"10.1109/EMEIT.2011.6023115","DOIUrl":"https://doi.org/10.1109/EMEIT.2011.6023115","url":null,"abstract":"Under the software environment of MATLAB/Simulink, the communication system of direct sequence spread spectrum (DSSS) is dynamically modeled and simulated over a new practical Rayleigh channel, and the relationship curves of the bit error rate (BER) with the signal-to-noise ratio (SNR) of DSSS communication systems are presented. It is analyzed that DSSS system can effectively overcome multipath fading in multipath Rayleigh Fading Channel (RFC). In addition, the anti-multipath fading performance improved by the way of increasing pseudo noise (PN) code length is better than that by the way of increasing the spread spectrum gain in the condition of strong multipath fading.","PeriodicalId":216097,"journal":{"name":"Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117202350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信