{"title":"Research and Design on ERP System's Supply Chain Management","authors":"Shi-sheng Zhu, Xiao-zhu Xie, Hong Diao","doi":"10.1109/ISCSCT.2008.119","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.119","url":null,"abstract":"This article introduces a design project to implement supply chain management in an ERP (enterprise resource planning) system which is using customer relationship resource management subsystem and supply and demand resource management subsystem. This project is applied to medium and small-sized enterprises. Using network technology based on Web,the integrated management of ERP¿s SCM is realized,the costs of information management is reduced and the efficiency of ERP¿s integrated management is improved. This article also elaborates some of the key technologies during the design process.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123580668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Fast Enumeration Algorithm for Attribute Reduction Based on Grouping","authors":"Xiao Wei, N. Xu","doi":"10.1109/ISCSCT.2008.105","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.105","url":null,"abstract":"When studying attribute reduction, we need to enumerate all the minimal reductions to prove the correctness of the attribute reduction algorithm. The explosion of attributes combination makes time complexity of the enumeration algorithm pretty high. An algorithm derived from grouping the rows of decision table is put forward to validate if an attribute set is reduction. Based on this algorithm, a fast algorithm for seeking core attribute is put forward too. And by optimizing the process of enumeration, the quantity of enumeration is reduced and the time of enumeration is reduced to acceptable scope.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123693908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Transmission Scheme for Encrypted Speech over GSM Network","authors":"Yucun Yang, Suili Feng, Wu Ye, Xinsheng Ji","doi":"10.1109/ISCSCT.2008.290","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.290","url":null,"abstract":"With the widely applications of mobile communication networks, end-to-end secure voice has become a very important research issue and has attracted many people¿s interests. A simple and effective method for end-to-end secure communication is to encrypt speech signal at user ends. But the use of encryption techniques leads to a hard problem that encrypted speech data can not be directly transmitted on mobile voice channel. In this paper, we propose a scheme for encrypted speech transmitting on GSM voice channel. Not only does this scheme offer a good method for encrypted speech accessing mobile voice channel by using a proposed special modem called smodem based on linear predictive coding (LPC) technique, but also it can ensure the encrypted data transmitting through GSM networks with sufficient accuracy so that the received data can be decrypted correctly at the receiver. Moreover, the proposed scheme has advantages of no change to the existing clear voice communication procedure, short time of call establishment and propagation delay, good interoperability over heterogeneous networks, and favorableness to encryption information hidden. The results of experiment show that the proposed scheme is feasible.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125517698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Algorithm for Solving Inverse Eigenproblem of Generalized Periodic Jacobi Matrices","authors":"Sun Xiao-ying, Li Zhi-bin, Zhao Xin-xin","doi":"10.1109/ISCSCT.2008.223","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.223","url":null,"abstract":"This paper deals the reconstruction of generalized periodic Jacobi matrices from eigen-pairs of the matrix and its largest leading principal matrix. The expression and an algorithm of the solution of the problem is given, and a numerical example is provided.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115021832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Uniform Negotiation and Delivery Framework for TCP-Based Data Collaboration Applications","authors":"W. Zhang, W. Lei, Xiuwu Zhang","doi":"10.1109/ISCSCT.2008.170","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.170","url":null,"abstract":"In this paper we present a uniform negotiation and delivery framework for TCP-based data collaboration applications over IP network. With this framework rich innovative collaboration services can be developed conveniently and provide users with novel communication experience. The framework adopts the offer/answer model with extended Session Description Protocol as session description and negotiation mechanism and adopts MSRP as the media transport control protocol. In this paper, the requirement of the framework was revealed from a high-level design perspective and analyzed in detail by highlighting several prominent design choices such as uniform media description and negotiation, MSRP relay selection and TCP connection setup.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122459648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of a Computerized Method to Inspect Empty Glass Bottle","authors":"Huan-jun Liu, Yao-nan Wang","doi":"10.1109/ISCSCT.2008.340","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.340","url":null,"abstract":"The objective of this study was to develop a computerized empty glass bottle inspection method in an attempt to replace manual inspection. The inspection system structure based on machine vision was illustrated in the article. Morphologic methods and wavelet transform were used to extract features of the bottle body and the finish from images. The fuzzy support vector machine neural network was adopted as the classifier when the features were extracted. The results of our experiment indicated that it can reach up to 97% of accuracy by using the method developed in this study to inspect empty glass bottles.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122472236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhiquan Feng, Yanwei Zheng, Ling Zhang, Bo Yang, Jingxiang Zhang
{"title":"The Robust Likelihood Model of State Measurement and Its Applications in Articulated Object Tracking","authors":"Zhiquan Feng, Yanwei Zheng, Ling Zhang, Bo Yang, Jingxiang Zhang","doi":"10.1109/ISCSCT.2008.300","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.300","url":null,"abstract":"The establishment of the likelihood model of state observation with a strong robustness is one of the core issues in the study of moving hand tracking. This paper is dedicated to building a robust likelihood model of state observation, and do some study by using the method of gaining feature points from frame images of human hand. Firstly, based on physiological models and camera projection principle, we propose a basic idea that use gesture polygon to describe the image contour of hand gesture. Secondly, Lindeberg method is improved by designing the two types of response function to get the different types of feature points on multiscale space basen on the local area of vertex in the polygon, and a novel structural response mode is presented. Then we fuse the features in different scales by using Hausdorff distance and Hausdorff matrix, and present the likelihood model of state observation. Finally, the model is used for 3D motion tracking of human hand. Our theoretical analysis and experimental results show that the approach put forward in this paper has the advantages of a low time complexity and strong robustness, compared with the Lindeberg method.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114408967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Image Retrieval Method Based on Spatial Features of Colors","authors":"Haishan Chen, Xu Han, Bochao Hu","doi":"10.1109/ISCSCT.2008.97","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.97","url":null,"abstract":"This paper presents a method for expressing color features of images through color hue histograms, according to the distribution characteristics of image color space. In this method, the spatial features of colors are described in terms of three independent components of the HSV color space, with rotation, scaling and translation invariant features. Tests have proved that favorable retrieval effects were achieved with this method in similarity retrieval of color images, and the defect that color histograms and color moment methods are not accurate enough to express the spatial positions of image colors was well overcome.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128545553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Secure Web Services Model Based on the Combination of SOAP Registration Info and Token Proxy","authors":"Youxiang Duan, Yongtang Bao, Lijiang Pan, Beibei Yan, Jiuyun Xun, Nianyun Shi","doi":"10.1109/ISCSCT.2008.99","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.99","url":null,"abstract":"Along with the thorough development and application for Web services, the security of it has taken people¿s attention more and more. While Web services security (WSS) can exchange safe SOAP message and enhance the security of Web services, it will also have certain influence to the performance of Web services. In order to satisfy the security of it , to reduce the performance influence of Web services and to solve both the requester and provider side cannot recognize the security token, in this paper, we aim at proposing a SOAP information registration and security token proxy model for Web services (SIRSTPM). We has carried on the formalizing and verifying of this model. The result of theoretical verification shows this model is secure and effective. This model is helpful for solving the problem between security and performance contradiction as well as the token cannot be recognized by both the requester and the provider.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124594561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Single-View's 3D Explanation Based on Prior Knowledge and Constraint Satisfaction","authors":"Wei Zhang, Hui-Ran Wei","doi":"10.1109/ISCSCT.2008.299","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.299","url":null,"abstract":"In this paper, we estimate the geometric characteristics, such as the relation of edges and the angle characteristics between edges, from single view. And we also use the prior knowledge about objects, such as the feature of edges and the geometry construction of objects, to construct the variable constraint based on the projection rules. In this paper, we transfer the problem of interpretation of 3D objects from single view into a non-linear optimization problem. After local constraints merge into overall constraint, the posture of object can be estimated quickly. Then we can calculate geometry characteristics of the objects for invariant recognition.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124247317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}