{"title":"An Axiomatic Characterization of Fuzzy Formal Contexts Based on T-implication Operators","authors":"Xiaoxue Song, Wenxiu Zhang","doi":"10.1109/ISCSCT.2008.218","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.218","url":null,"abstract":"In this paper, the fuzzy concept based on T-implication operators is studied by the axiomatic approach. An operators-oriented characterization of the fuzzy concept is proposed, that is, the fuzzy intent-extent operator and the fuzzy extent-intent operator based on T-implication operators are defined by axioms. The axiom sets of the fuzzy concept operators guarantee the existence of fuzzy relations which produce the same operators.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116576006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Adaptive Watermark Scheme Based on Contourlet Transform","authors":"Feng Wei, Tong Ming, Ji Hong-bing","doi":"10.1109/ISCSCT.2008.174","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.174","url":null,"abstract":"Based on the convergence and stability of the new mean shift fast algorithm, an adaptive watermark algorithm in contourlet domain based on mean shift texture features clustering is proposed in this paper. Through the texture recognition method based on gray co-occurrence matrix, watermark is embedded into the coefficients in contourlet domain, which makes the capability of the watermark more covert, anti-noise attack and robust. During the clustering, three texture features including energy, entropy and contrast were selected for mean shift fast clustering algorithm. Strong regional textures of host images are extracted directly, accurately and efficiently, and the embedding intensity can be gain automatically then. The experiment shows that this algorithm has the strong robustness to Gauss low pass filter, Wiener filter, median filtering, Salt and pepper noise, Gaussian noise, JPEG compression, shear attack etc. It is a blind detection, and adapt to various of images.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113940994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Fuzzy Evaluation Method of E-business Website Based on Rough Set","authors":"Jun Ma, Huiling Shi, Fengyi Zou","doi":"10.1109/ISCSCT.2008.185","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.185","url":null,"abstract":"In order to overcome the subjective limitation in existing evaluation methods, based on determination of the evaluation indicator weight by using rough set theory, a new fuzzy synthesized evaluation method of e-business website is proposed. It reduces subjective influence and increases the objectivity of evaluation result. An example shows the effectiveness and practicality of this evaluation method.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124977059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tiedong Wang, Fengjing Shao, Rencheng Sun, He Huang
{"title":"A Hardware Implement of Bus Bridge Based on Single CPU and Dual Bus Architecture","authors":"Tiedong Wang, Fengjing Shao, Rencheng Sun, He Huang","doi":"10.1109/ISCSCT.2008.106","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.106","url":null,"abstract":"Single CPU dual bus architecture is a new kind of architecture aimed at reducing the security vulnerability of Von Neumann architecture, and it has been proved theoretically reasonable. In this paper, a bus bridge is implemented to bridge CPU and dual bus. The experiment is done and the result has proved that the architecture based on single CPU and dual bus is reasonable and effective.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116765863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"R-Binder: Application of Using Service Binder in R-OSGi","authors":"Zhiyu Feng, Linpeng Huang","doi":"10.1109/ISCSCT.2008.242","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.242","url":null,"abstract":"OSGi is a famous technique based on the concept Service-Oriented Component Model. As far as the application of OSGi is concerned, Service Dependency management and Distribution are two issues that have to be taken into consideration. The Service Binder is a mechanism that adds automatic service dependency management into OSGi, and R-OSGi is a distributed middleware layer on the top of OSGi that allows multiple peers with local OSGi frameworks to be federated in a way they behave like one large OSGi framework. This paper introduces the application of R-Binder, which combines the Service Binder and R-OSGi together and takes the advantage of both the Service Binder and R-OSGi. Using Service Binder in the R-OSGi, R-Binder extends the Service Dependency management of the Service Binder to distributed environment, and also take the advantage of R-OSGi (such as transparency, Non-Invasiveness, Consistent Behavior and so on) in distribution. The paper also discusses the advantage of applying Service Binder in R-OSGi Deployment Tool (RDT).","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131188046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation and Analysis of MFlood Protocol in Wireless Network","authors":"Runcai Huang, Y. Zhuang, Qiying Cao","doi":"10.1109/ISCSCT.2008.87","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.87","url":null,"abstract":"NS2 is an object-oriented simulation tool to simulate and analyze network elements; it is also a powerful tool to develop new protocol and scheme. In the paper, we analyze the features and models of wireless network in details; discuss the simulation process and implementation of wireless network on the basis of NS2. Also, AODV protocol and self-defined MFlood protocol in wireless network are simulated respectively and the simulation details of each protocol are introduced. NAM is used to display the process of simulation. Tools such as Gnuplot and Gawk are used to produce plot data files and icons to clarify the communication process. Finally, the comparative studies are presented according to the simulation results.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131232432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Class Loader Firmware on Java SoC","authors":"Hua-Ning Wang, Wei-Wei Dai, H. Tan, Zhi-Rui Chen","doi":"10.1109/ISCSCT.2008.199","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.199","url":null,"abstract":"Java is one of the most popular programming architectures because of its platform-independence. A Java processor called “JOP” accelerates the speed of Java applications by executing Java bytecode instructions directly instead of by software emulation. However, instructions in Java executable file need to be resolved before executed. JOP finishes this resolving procedure in the Java application compiling stage and generates a memory image of Java run-time environment from Java class files. As the result of that, one of Java’s outstanding features — platform-independence is lost. This paper gives a design of Java class loader firmware which is integrated with Java processor into a System-on-Chip (SoC) and builds up a whole embedded Java platform which runs as a traditional Java Virtual Machine (JVM). The class loader firmware is essentially a resolved Java program which can be executed directly by Java processor. It offers service of loading and resolving other Java executable files for Java applications at run-time and makes these files really executable for a Java processor.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115155091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Chinese Partial Parsing with Modal Finite-State Approach","authors":"Yiqiang Zhao, Junfang Zeng, Yiping Yang","doi":"10.1109/ISCSCT.2008.10","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.10","url":null,"abstract":"A novel finite-state approach with the practical use of modal operators for Chinese partial parsing is presented in this paper. The traditional rule-based partial parsing approaches make use of regular grammar to approximate the context free or simplified context sensitive grammar with some loss of descriptive ability. Until now, how to solve the non-categorical problem within rule-based paradigm has not been reported, except for adding probability to grammars. In the approach presented in this paper, basic modal operators, necessity and possibility, are introduced into classic regular grammar. The technique of using such grammar to partially parse the free Chinese text is also discussed in detail. The experimental results suggest that the proposed approach can achieve Chinese partial parsing well and give a considerable performance improvement compared to traditional finite-state approach. A new application in natural language processing of modal logic is revealed through this paper.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127681901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ajax Applied in Environment Monitoring System Based on WSN","authors":"Wei Han, K. Fang, Xiaohui Li, L. Zhang","doi":"10.1109/ISCSCT.2008.327","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.327","url":null,"abstract":"This article puts forward a method to access the data and analyzed results from the monitoring system of environment based on WSN with the B/S mode. It resolves the problem of low speed of page refresh with Ajax. The experiment shows that the partial refresh feature of Ajax can make it possible for the users to get access to the data and analyzed results easily through the browser, and experience a smarter response just like window programs.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132695633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Performance Analysis of Fast EAP Re-authentication Protocol","authors":"Qing Xu, C. Wan, A. Hu","doi":"10.1109/ISCSCT.2008.164","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.164","url":null,"abstract":"With extensions to current EAP key hierarchy, the EAP re-authentication protocol provides a consistent, method-independent and low-latency re-authentication mechanism to support intra-domain handoff authentication. This paper analyzed the efficiency of the EAP re-authentication protocol, and compared it with that of the EAP-TLS protocol. The result shows that the authentication delay of EAP re-authentication protocol is only twentieth of that in the EAP-TLS protocol.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"59 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133390617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}