{"title":"Seamless LBS Based on the Integration of WSN and GPS","authors":"D. Zou, Z. Deng, Lianming Xu, Weizheng Ren","doi":"10.1109/ISCSCT.2008.147","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.147","url":null,"abstract":"For the goal of seamless indoor and outdoor location based services(LBS), a integrated navigation algorithm with both satellite location and WSN is put forward in this paper. This paper also design semi- physical simulation platform based on software receiver structure, which integrate GPS receiver and WSN nodes. Pseudorange observation data of global positioning system (GPS) and distance observation data of WSN are utilized to carry out positioning. Simulation results show that comparing with traditional GPS location algorithm, adaptation range is increased and positioning with less than four satellites is realized using the algorithm; and comparing with WSN location algorithm, the algorithm has a higher precision.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"246 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122133345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Data Recovery Models for Multi-shift Scheduling in Wireless Sensor Networks","authors":"Xu Xu, Y. Hu, W. Liu, Jingping Bi","doi":"10.1109/ISCSCT.2008.173","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.173","url":null,"abstract":"Energy efficiency is a key problem in wireless sensor networks. Keeping only a portion of nodes active and putting the others into sleep mode can conserve energy. In order to maintain satisfactory data quality, we recover the would-be sensed data for sleeping nodes. In this paper, we exploit spatial correlation among densely deployed nodes and use such correlation for data recovery. Loss in data quality caused by data recovery is the criterion for our proposed polynomial-time active nodes selection algorithm. Considering the possible energy consumption unbalance, we further develop a multi-shift scheduling scheme. The multi-shift scheduling is formulated as a constrained mini-max optimization problem. We validate these algorithms using a real-world data set and observe very satisfactory results.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129770270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accelerating Fractal Image Encoding Based on Gray Value Moment Features of Normalized Block","authors":"Gao-ping Li","doi":"10.1109/ISCSCT.2008.344","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.344","url":null,"abstract":"Fractal image encoding with full search typically requires a very long runtime, which is essentially spent on searching for the best-matched block to an input range block in a large domain pool. This paper thus proposed an effective method to improve the drawback, which is mainly based on gray value moment features of normalized block and related inequality is presented by the authors. During the search process, the gray value moment features is first utilized to confine efficiently the search space to the vicinity of the initial-matched block (i.e., the domain block having the closest gray value moment features to the input range block being encoded), aiming at reducing the searching scope of similarity matching to accelerate the encoding process. Simulation results show that the proposed scheme not only reduce the searching scope of best-matched to accelerate the encoding process, but also can obtain good quality of the reconstructed images as compared to the baseline algorithm with full search.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130617209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Paradox Stems from the Security Model or the Security Proof?","authors":"Q. Pu, Jianmin Ding","doi":"10.1109/ISCSCT.2008.54","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.54","url":null,"abstract":"Recently, Abdalla and Pointcheval proposed an efficient three-party password-authenticated key exchange protocoland provided a proof of security in the Bellare, Pointcheval, and Rogaway (BPR2000) model. Despite the claim of provable security, the protocol was subsequently shown insecure in them presence of an active adversary by Kim-Kwang et al. But they declaimed the flaws stemmed from the weakness of the security model. We defuse it by demonstrating that the attack can be captured in the BPR2000 model. Furthermore, we argue that the paradox is due to the flaws in the proof of security.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130793254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A LDAP Directory Server Model of Workflow Management Systems","authors":"Zhiyi Wang, Zeng Wang, Yifan Yang","doi":"10.1109/ISCSCT.2008.286","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.286","url":null,"abstract":"The paper proposes an organization model hosted in the LDAP directory server. And it expands the scope of model utilization, gives the technical method which is capable of dealing with the heterogeneity, distribution of the organization model, and the transparency of the model to its users. Then the role-based access control (RBAC) technology has been used in the model to implement the control of resource access in the workflow management system according to the rules in the organization model. At last, this paper proposes an idea of designing an organization model information platform in workflow management systems and a prototype system. With simulation results and analysis show that the organization model has good compatibility, extendibility and high operating efficiency. Thanks to the role-based strategy, the model facilitated the management authority and suits the independence in the workflow management system for the use of organization model.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132372250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy Conceptual Information Modeling in UML Data Model","authors":"Zongmin Ma","doi":"10.1109/ISCSCT.2008.353","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.353","url":null,"abstract":"Conceptual data models, being the tool of design databases, have been proposed. Information in real world application is often vague or ambiguous. Currently, less research has been done in modeling imprecision and uncertainty in conceptual data model. The UML (Unified Modeling Language), being a set of OO modeling notations and a standard of the Object Management Group (OMG), can be applied for many areas of software engineering, knowledge engineering, and data modeling. In this paper, different levels of fuzziness are introduced into the class of the UML.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127981007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Algorithm of Human Skin Detection in Video Image Based on Linear Combination of 2-order Markov and Wiener Predictor","authors":"Liu Yun, Wang Chuan-xu","doi":"10.1109/ISCSCT.2008.208","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.208","url":null,"abstract":"Human skin color distribution is relatively compact in a color space. That skin pixels in each frame are closed together as a ¿dot cloud¿ is hypothesized, the shape evolution of ¿dot cloud¿ in the color space from frame to frame is parameterized as translation, scaling and rotation. The linear combination of forecasts, which is consisted of 2-order Markov predictor and Wiener one step predictor, is proposed instead of single predictor to predict these parameters for the next frame which is to be segmented, and human skin biological feature is then adopted to remove camouflage noise. Extensive tests prove that this algorithm is quite sensitive to human color, and more accurate for human skin segmentation with Bayes classifier.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123384239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on Neural Network of Circuit Failure Diagnosis System","authors":"Chenghui Yang, Jianjun Meng, Wenzhe Qi","doi":"10.1109/ISCSCT.2008.150","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.150","url":null,"abstract":"Combining the failure practical example, neural network analysis is used for diagnosis. Using the neural network in MATLAB to simulate the circuit fault system, this is using two different kinds of training functions. For the better analysis of failure diagnosis problems, firstly, using MATLAB software to simulate failure problems such as the emergence of regular power, short circuit and broken circuit. Through the training functions traingdm training function and trainglm training function, then, we get the conclusion that which function is better for the diagnoses of circuit failure, and the importance of the simulation of the circuit failure system.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126474007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Face Recognition Based on Local Feature Analysis","authors":"Zhiming Qian, Peng Su, Dan Xu","doi":"10.1109/ISCSCT.2008.65","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.65","url":null,"abstract":"This paper presents a new face recognition method based on the analysis of local features. Firstly, we can get the images of magnitude by means of analyzing face images with the Gabor wavelets. Secondly, the magnitude images are divided into blocks, then principle components analysis (PCA) could be directly used to all the blocks to construct the feature space. Finally, all the blocks of images are projected to the feature space and get the face feature vectors. By counting and analyzing the feature vector, we get the recognition results. The experimental results show that this method uses the advantages of Gabor wavelets and local feature analysis (LFA), has a good recognition capability.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126588608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Guan Yong, Tan Zhong-fu, Wang Mian-bin, L. Xiao-jun
{"title":"Sale Decision-Making Model of United Operation between Hydropower and Thermal Power Considering Uncertain Factors","authors":"Guan Yong, Tan Zhong-fu, Wang Mian-bin, L. Xiao-jun","doi":"10.1109/ISCSCT.2008.377","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.377","url":null,"abstract":"This electronic document is a \"live\" template. The paper studies the balance between benefits and risks, when such a generator sales electricity in many trade markets. Firstly, the uncertain risk faced by this generator selling electricity in spot market, contract market and option market will be measured with conditional value at risk (CVaR) theory. Secondly, the mean-CVaR sale portfolio optimal model is constructed with considering the risk and expectation benefits of this generator based on investment portfolio theory. At last, calculation results show that the proposed model can truly reflect the essential characters of the market risk faced by this generator and guarantee it to obtain expected profits at the minimum CVaR risk lever, and the option market can effectively reduce sale risk.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115215104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}