{"title":"Study and Application of Key Technologies of LAN Remote Control","authors":"Ai-Min Wang, Yu-Xing Yang, Xiao Li","doi":"10.1109/IITA.Workshops.2008.252","DOIUrl":"https://doi.org/10.1109/IITA.Workshops.2008.252","url":null,"abstract":"How to management local area network (LAN) scientifically and effectively is an important question in remote control area. Remote Control to the computers in LAN could relieve the network administrators of some of trivial works and improve the efficiency. An intelligent, real-time controlling management system was designed and implemented. The key control functions of network communication, remote screenshots, mouse and keyboard locking, screen-darkening, opening and shutting down computers were all realized in this remote-control system based on socket network communication and API programming, Trojan horse technology is involved, too. The system is developed by Delphi 6.0 and has already been applied in many areas and produced high effect in practice.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132998480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Anomaly Intrusion Detection Algorithm Based on Minimal Diversity Semi-supervised Clustering","authors":"Juan Wang, Ke Zhang, Da-sen Ren","doi":"10.1109/ISCSCT.2008.171","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.171","url":null,"abstract":"An anomaly intrusion detection algorithm based on minimal diversity is proposed. It can deal with mixed attributes, so overcomes the deficiencies of most unsupervised learning methods. Based on the minimal diversity measurement, we use a small amount of marked data to guide clustering. When detecting new records, we calculate its diversity from the existing clusters to determine its category. This algorithm can detect known and unknown types of attacks, and update detection model automatically. The simulative experiment indicates that the new algorithm improves the performance of detecting attacks, and it is more effective than K-means intrusion detection method.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"246 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115003783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deviation Problem and its Solving","authors":"Xin Wang, Hui-tong Jia, Yu Ma, Yu-dong Wang","doi":"10.1109/ISCSCT.2008.371","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.371","url":null,"abstract":"In order to introduce the study on automatic composition of knowledge-based semantic web services, this paper abstracts the main concept of deviation problem (expended knowledge-based analysis system task), analyzes the relation between them, proposes the modeling of deviation problem, and construes the ontology-based problem-solving methods.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115287661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"3D Surface Texture Synthesis Based on Wavelet Transform","authors":"Muwei Jian, Shuan Liu, Junyu Dong","doi":"10.1109/ISCSCT.2008.319","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.319","url":null,"abstract":"Research into texture synthesis is normally concerned with generation of 2D images of texture. However, real-world surface textures comprise rough surface geometry and various reflectance properties. These surface textures are different from 2D still texture as their images can therefore vary dramatically with illumination directions. This paper presents a simple framework for 3D surface texture synthesis. Firstly, we propose a novel 2D texture synthesis algorithm based on wavelet transform that can be efficiently extended to synthesise surface representations in multi-dimensional space. Then, photometric stereo (PS) is used to generate surface gradient and albedo maps from three synthesized surface texture images. The surface gradient maps can be further integrated to produce a surface height map (surface profile). With the albedo and height or gradient maps, new images of a Lambertian surface under arbitrary illuminant directions can be generated. Experiments show that the proposed approach can not only produce 3D surface textures under arbitrary illumination directions, but also has the ability to retain the surface geometry structure.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115728825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Winner Trace Marking in Self-Organizing Neural Network for Classification","authors":"Yonghui Wang, Yunhui Yan, Yanping Wu","doi":"10.1109/ISCSCT.2008.133","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.133","url":null,"abstract":"The classification for similar features classes is quite difficult task in many existing pattern-recognition systems. When the amount of samples is insufficient, neural networking training is hard. The dimension reduction, classification, clustering etc serial steps in recognition process takes such much time that the practical recognizing application is ease to meet the real time requirement. The new method is looking forward to. This paper presents a fast, simple and robust classifier, in which the winner has been traced and marked during entire training. We named it as Winner Trace Marking (WTM). The basic structure is based on self organizing feather map (SOFM), but the training and recognizing rules are changed and optimized. By WTM, a significant improvement is reached about above problems. The accuracy is highly increased with less time consumption. The experiment classifying strip surface defects by WTM are presented. The results are satisfactory.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116773511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bo Li, Zhi-yuan Zeng, Jian-zhong Zhou, Hua-li Dong
{"title":"An Algorithm for License Plate Recognition Using Radial Basis Function Neural Network","authors":"Bo Li, Zhi-yuan Zeng, Jian-zhong Zhou, Hua-li Dong","doi":"10.1109/ISCSCT.2008.272","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.272","url":null,"abstract":"Based on the sharing features of a variety of license plates (LP), the vertical edge was first detected by Sobel edge detector. Then, some approaches were adopted to remove the invalid edge regarding the characteristics of edge grayscale jump and edge density, so that the regions having features of LP were preserved. Next, by horizontal and vertical projections and mathematical morphology (MM) operation, the LP region was searched. Then, color-reversing judgement was conducted by color analysis, and binarization was done based on core region in LP. Afterward, characters were segmented by means of prior knowledge and connected components analysis, and character recognition was conducted based on radial basis function (RBF) neural network. With abundant samples verified in dark hours and daytime under real conditions, the experiment indicates that it is feasible to adopt this algorithm in license plate recognition system (LPRS) to achieve accuracy.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116950859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis and Representation on Workshop-Oriented Domain Ontology","authors":"Chunjing Shi, Yongxian Liu, Y. Hao","doi":"10.1109/ISCSCT.2008.295","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.295","url":null,"abstract":"Effectively choosing the WorkShop Management Systems (WSMS) to manage the plan execution and product manufacturing of workshop has become the problems which the decision-makers of enterprise have to face. But when integrating with other system, most of WSMS are indicative of the phenomenon of their instability, discontinuity and the difficulty of information exchange. By means of the characteristics of accuracy and inexistence ambiguity which ontology expresses information and data, after analyzing the business model of the workshop, the paper puts forward the meta model of workshop ontology, constructing the ontology architecture of workshop, and applying ontology model to WKMS. Finally, combining an instance, the paper describes the process in detail which expresses workshop ontology by means of OWL language.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116965816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Policy–Based Collaboration Models in Autonomic Computing","authors":"Qi Shen, Maoguang Wang","doi":"10.1109/ISCSCT.2008.233","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.233","url":null,"abstract":"Autonomic computing is expected to solve system management complexity and cost problems in IT environment by enabling systems to be self-managing. The autonomic computing collaborative work based on policy-driven is studied, including competition and collaboration. The autonomic elements should work collaboratively to implement the complex self-management tasks of autonomic computing system. The competition model is proposed based on the probability policy, and the equilibrium solutions are studied and resolved. It can improve the success rate and utility for practical applications effectively.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121040355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Optimized Chord Algorithm for Accelerating the Query of Hot Resources","authors":"Jiajing Li, Xudong Yang","doi":"10.1109/ISCSCT.2008.351","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.351","url":null,"abstract":"Chord is the most essential and efficient peer-to-peer routing algorithm that, however, cannot reflect the hot resources problem in practical networks. To solve the problem, an optimized Chord algorithm has been put forward in this paper to accelerate locating the hot resources. The optimized Chord algorithm records the access time of resources and categories the resources into three classes. As for the class of hot resources, the optimized Chord would broadcast its location information and shorten its query hops. As a result, the average query hops would be shorter than the original Chord algorithm.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125018236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhaoxiang Yi, Xiaodong Mu, Li Zhang, Peng Zhao, Zongrun Yin
{"title":"A Framework for Analyzing Correlative Software and Hardware Faults","authors":"Zhaoxiang Yi, Xiaodong Mu, Li Zhang, Peng Zhao, Zongrun Yin","doi":"10.1109/ISCSCT.2008.44","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.44","url":null,"abstract":"Both software and hardware of computer systems are subject to faults, however, traditional approaches, ignoring the relationship between software faults and hardware faults, are unavailable for analyzing complex software and hardware faults. This paper proposes a systematic framework to analyze correlative software and hardware fault. It includes two associated processes, module level analysis and code level location, and can be used to achieve fault modules and locate fault reasons. The framework has been integrated into the maintenance system for software-intensive system, and provides an effective and feasible method to deal with complex faults between software and hardware.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123469499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}