{"title":"Research on Product Configuration Model and Expression of Constraints","authors":"Zou Jiehui, Du Qun-gui, Huang Bingkang","doi":"10.1109/ISCSCT.2008.293","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.293","url":null,"abstract":"This paper presents a general product configuration structure model including its defects, firstly. Meanwhile, the old structure has been improved; the problem of product configuration is abstracted to combination problem, which remarkably improved the efficiency of model solving. Secondly, the definition and expression of constraint relations among parts is studied. By using graph-theory the constraint matrix was proposed. Then, the solving of a new model is studied. Finally, a simple example is given to show the solving process of the new structure model and prove its feasibility.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114321186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Signals Transform Circuit Based on Flexibility Technology and Its Hardware Implementation","authors":"Yi Wang, Xing-hua Fu","doi":"10.1109/ISCSCT.2008.278","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.278","url":null,"abstract":"A finite impulse compensation system is designed with charge coupled devices (CCD). The system can compensate the frequency response of various measuring device of network, such as instrument and sensor, etc. so as to extend their work frequency band. The main advantage of the design is its flexibility, the system can be easily changes in the weighting resistances of CCD, provide that the clock frequency can operate the CCD. At the end of this paper, the correctness of design principle has been verified in a simplified experimental condition, and some conclusions are introduced.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114333772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SIM-Array: A Flexible Storage System Simulator","authors":"Zhang Xiao, Zhao Xiao-nan, Chen Jian-quan","doi":"10.1109/ISCSCT.2008.202","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.202","url":null,"abstract":"Simulation is an important method in the research and development of storage and network system. A good simulator can save memory and times. There are many simulators developed, but most of those simulator aimed at performance and data schedule algorithm. None of those simulators can model manipuility and dependability in large scale storage network. In this paper, we present the facilities and design of the SIM-array storage system simulator. This simulator was originally intended to do manipuility modeling of storage network system. Over time it has been extended and generalized so that it can simulate several kinds of storage systems by change the configure file. It can simulate resource allocation and the fault event occurred in storage system. As a result, it can accelerate the process of development and research on manipuility and dependability in large scale storage network.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114704737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TC: The Transmission Control Strategy for Restricted Floating Sensor Network","authors":"L. Xiaodong, Fenghua Yuan, Guo Zhongwen","doi":"10.1109/ISCSCT.2008.172","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.172","url":null,"abstract":"Restricted Floating Sensor (RFS) proposed by Yunhao Liu is an important model in offshore data collection. There is a need for highly precise, real-time in many offshore monitoring. In this paper, we propose a Transmission Control (TC) strategy for RFS networks. This strategy can modify the transmission delay adaptively depending on users together with the changeful condition of wireless links. The experiment shows our work is succeeding in changing propagation delay by orders.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"122 24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114599986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Huaiqing Lin, Zhitang Li, Yejiang Zhang, Chuiwei Lu
{"title":"Hierarchical Fuzzy Trust Management for Customer-to-Customer in Peer-to-Peer eCommerce","authors":"Huaiqing Lin, Zhitang Li, Yejiang Zhang, Chuiwei Lu","doi":"10.1109/ISCSCT.2008.334","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.334","url":null,"abstract":"Peer-to-peer (P2P) eCommerce are commonly perceived as an environment offering both opportunities and threats. For peers to be effective they need some mechanism for managing this risk of failure. One way to minimize threats in such an open environment is to exploit reputation to help evaluate the trustworthiness of what and predict the future behaviors of peers. In this study, a set of parameters were identified for describing the trust of a peer and proposes a framework based on a series of underpinning relationships among these factors. In simulation, this trust model has been shown to improve the efficiency of P2P eCommerce system by significantly decreasing the amount of malicious behavior on the network.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114853688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"APR: A Trust Model Based on Perceived Risk for P2P E-commerce System","authors":"Junfeng Tian, Qian Liu","doi":"10.1109/ISCSCT.2008.195","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.195","url":null,"abstract":"To solve security problems of E-commerce system, this paper proposed a new trust model APR which is based on anticipative perceived risk. The concept of perceived risk was introduced into APR, many kinds of trust factor were taken to calculate the trust value among nodes, and an origination method was provided to integrate direct trust and recommendation trust. Comparing with other trust models, APR guaranteed the valuation accuracy of trust model and sharpened the anti-risk ability of nodes.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116537034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Xia, Mei Tang, Jianguo Jiang, Dun Li, Hao-wei Qian
{"title":"Energy Efficient Data Transmission Mechanism in Wireless Sensor Networks","authors":"N. Xia, Mei Tang, Jianguo Jiang, Dun Li, Hao-wei Qian","doi":"10.1109/ISCSCT.2008.94","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.94","url":null,"abstract":"In wireless sensor networks, data transmission is an essential step for various applications, and an energy efficient data transmission mechanism is needed since the energy resource of WSN is restricted. This paper investigates the coalition-based cooperative data transmission mechanism (CC-DTM), analyzes its entire energy consumption, and finds out the optimal number of sensor nodes needed in the cooperative data transmission. The condition under which CC-DTM is more energy-saving than the cluster approach is also deduced. Furthermore, an energy-load balanced node selection strategy is proposed. The results of simulation experiment show the validity of this energy efficient data transmission mechanism.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117094687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Algorithm for Solving the Complex Nonlinear Ecosystem","authors":"Yezhi Lin, Weiming Wang","doi":"10.1109/ISCSCT.2008.245","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.245","url":null,"abstract":"In this paper, by using the theories and methods of numerical analysis, a new algorithm for solving complex differential equations is established. Some examples are presented to illustrate the accuracy of the algorithm. It will be useful for solving the complex ecosystem.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115839763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of Multi-video Based Virtual Classroom and Its Application in English as Second Language Learning","authors":"Ruimin Zhang, Bofeng Zhang, J. Zhu, Huiting Huang","doi":"10.1109/ISCSCT.2008.160","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.160","url":null,"abstract":"As virtual classrooms become more and more popular, companies are focusing on developing collaboration tools that help boost the effectiveness of online learning environments. These tools are referred to as synchronous collaboration tools. However, few virtual classrooms have multi-video function. This paper develops a multi-video based virtual classroom (MVVC) by Java media framework (JMF), a new method to provide advanced media process ability. The experiments show that MVVC provides a wonderful multi-video environment for English as a second language (ESL) training.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115923213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Features Extraction from Frame Image Sequences","authors":"Zhiquan Feng, Peilin Du, Xiaona Song, Zhengxiang Chen, Ting-xin Xu, Deliang Zhu","doi":"10.1109/ISCSCT.2008.298","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.298","url":null,"abstract":"Human hand gesture features extraction from the frame image sequences is one of the key jobs in the process of human hand tracking based upon particle filtering (PF), because it provides PF with key data for computing the weight value of a particle. In order to satisfy the need of real time human hand tracking, a novel features extraction approach, aimed at optimization of processing speed, is put forward in this paper. First of all, the hand contour is approximately described by a polygon with concave and protruding, and the relationship between hand gesture polygon and its bounding box is studied. Secondly, a hand gesture contour algorithm(HGCA) is proposed to obtain the hand gesture polygon. Then, based on the HGCA, the approaches to gain the several main feature points are presented, including fingertips, roots of fingers, joints and the intersection of knuckle on different fingers. Finally, some of the comparison experimental results are presented. The main advantages of human hand features extraction put forward in this paper consist in its controllable precision and low time complexity.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115397446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}