{"title":"Subspace Culling for Continuous Collision Detection","authors":"Yong Shui, Jinjin Zheng, Xuegang Ma, Hongjun Zhou, Lianguan Shen","doi":"10.1109/WCSE.2012.23","DOIUrl":"https://doi.org/10.1109/WCSE.2012.23","url":null,"abstract":"This paper presents a novel efficient culling method for continuous collision detection (CCD) problem performed by dimension reduction in subspace. The basic idea is to use a fast one-dimension (1D) reduced filter and a fast two-dimension (2D) reduced filter that remove large amount of false positives and elementary tests between the primitives. The culling method could be combined with other techniques. The algorithm has been implemented and tested on two benchmarks, including cloth-ball simulations and N-body simulations. The results demonstrate that the algorithm can efficiently reduce the number of elementary tests one order of magnitude, and improve the overall performance of collision query about one half.","PeriodicalId":244586,"journal":{"name":"2012 Third World Congress on Software Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127874961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Research of 3D Model Retrieval Algorithms Based on Normal Plane","authors":"Hongtao Xie, F. Shang, Yadong Zhou, Xincheng Gao","doi":"10.1109/WCSE.2012.50","DOIUrl":"https://doi.org/10.1109/WCSE.2012.50","url":null,"abstract":"According to the characteristics of the model number is relatively small, similarity, complexity is not high in the small professional model library, and the existing 3D model retrieval method can not effectively improve the efficiency. This paper puts forward the retrieval algorithms based on normal plane, extract normal vector of each triangular facet in models, in the surrounded icosahedron of model set every surface as the reference surface, calculating the normal number which go through each reference surface and the ratio of the face in line accounts for the whole area, using the Needleman/Wunsch algorithm in the dynamic programming calculating the similarity for matching. Experiments show that in the small professional model library the model retrieval algorithm based on normal plane can greatly improve the efficiency of the model retrieval.","PeriodicalId":244586,"journal":{"name":"2012 Third World Congress on Software Engineering","volume":"231 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131477948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of Cloud Print Key Technology Based on Identity Card","authors":"Wu Yun","doi":"10.1109/WCSE.2012.42","DOIUrl":"https://doi.org/10.1109/WCSE.2012.42","url":null,"abstract":"By using contact less IC smart card as a media for identity authentication, the paper analyses the conditions and ways to implement cloud print, and researches the key technology of universal print driver, data encryption, identity authentication and Print center interactive platform.","PeriodicalId":244586,"journal":{"name":"2012 Third World Congress on Software Engineering","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124952753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the Application of Water Inflow Prediction System of Diversion Tunnel in the Secondary Hydropower Station in Jinping","authors":"Xueping Li, Yunan Li","doi":"10.1109/WCSE.2012.44","DOIUrl":"https://doi.org/10.1109/WCSE.2012.44","url":null,"abstract":"In this paper, the GIS technology is applied to develop the water inflow prediction system of diversion tunnel and achieve the dynamic prediction of water inflow, thus providing technical decision-making for construction safety. The prediction of water inflow utilizes the analytical method and numerical simulation. Conduct the water inflow prediction for the tunnel according to the geological exploration data before the construction, and the obtained results will be saved in the evaluation system as a background database. Then carry out rectification for the parameters of water inflow model combined with the geological information and groundwater information of the tunnel construction, the revised parameters will be used to update the underlying database of water inflow prediction and evaluation, which is regarded as the prediction results of the water inflow of the on-site construction. This system implements the dynamic prediction of tunnel water inflow and its application in diversion tunnel in the secondary hydropower station of Jinping indicates that: it can provide a relatively accurate and intuitive hydro geological basis and engineering technical support for water exploring in safe tunnel excavation.","PeriodicalId":244586,"journal":{"name":"2012 Third World Congress on Software Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114664328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hierarchical Graph Models and Information Visualizaion","authors":"V. Kasyanov","doi":"10.1109/WCSE.2012.22","DOIUrl":"https://doi.org/10.1109/WCSE.2012.22","url":null,"abstract":"Graphs are the most common abstract structure encountered in computer science. Many modern systems, particular for graphics workstations, include structural information visualization. In this paper, we consider practical and general graph formalism called hierarchical graphs and present the Higres and Visual Graph systems aimed at supporting of information visualization on the base of hierarchical graph models.","PeriodicalId":244586,"journal":{"name":"2012 Third World Congress on Software Engineering","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117145836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Agent-based Logic Description Language for Dynamic Evolution","authors":"Li Qing-shan, Chu Hua, Li Cong","doi":"10.1109/WCSE.2012.11","DOIUrl":"https://doi.org/10.1109/WCSE.2012.11","url":null,"abstract":"Application of Agent technology to software evolution is considered to be a possible approach to make software be adaptable to environment change. The dynamic characteristic of environment causes difficulty to predict and control the act of Agent in software. Well-defined evolution logic is helpful to describe and limit individual behavior of Agent and coordination among Agents. In this paper, in view to dynamic environment, a process of software evolution in this kind of environment is given. In this process, Agent-based Software Evolution Logic Description Language (Agent SELDL) presented in this paper can give a particular description of evolution process and its logic. Finally, the validity of Agent SELDL is proved by an experiment of software evolution process in dynamic environment.","PeriodicalId":244586,"journal":{"name":"2012 Third World Congress on Software Engineering","volume":"2021 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124259275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Roles-based Access Control Modeling and Testing for Web Applications","authors":"Bo Song, Shengbo Chen","doi":"10.1109/WCSE.2012.19","DOIUrl":"https://doi.org/10.1109/WCSE.2012.19","url":null,"abstract":"Web applications are widely used in people's everyday life. They have permeated financial sectors, banking sectors, e-business and online shopping. Usually, different users have different permissions on these applications. Additionally, role-based access control (RBAC) mechanisms have been wildly integrated into web applications. The security and correctness of web applications are the most fundamental, crucial aspects to the success of business and organizations. In existing research work on modeling of RBAC, the user's roles and permissions are fixed and static, and do not consider that with the evolution and running of the system, the roles and permissions are dynamic. To the best of our knowledge, research work on role-based access control modeling and testing for web application has been seldom done. In this paper, taking the dynamic feature of roles and permissions into account, we propose an approach to modeling and testing web applications with role-based access control. We give out an algorithm to capture and compute the dynamicity of roles and permissions in running time. The FSM is employed to model the behavior of web applications, and then the augmented FSM (AFSM) is plied as a tool to model role-based access control. Finally, using the construction algorithm, the tests are generated automatically which satisfy the corresponding test coverage criteria.","PeriodicalId":244586,"journal":{"name":"2012 Third World Congress on Software Engineering","volume":"244 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124688162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study of Emergency Management Information System for Hydropower Project","authors":"Chen Jianguo, Sun Guofeng, Zhao Quanlai","doi":"10.1109/WCSE.2012.48","DOIUrl":"https://doi.org/10.1109/WCSE.2012.48","url":null,"abstract":"The China Three Gorges Project is the most important hydropower project nationwide. The safety and security of the project, both within construction phase and operation phase, benefits to national strategic interests. The hydropower project might encounter with natural disaster and manmade incident, such as earthquake, landslide, flood, fire, explosion, terrorism, etc. Emergency management information system (EMIS) should be established to enhance emergency management capability, which could provide science and technology support such as dynamical monitoring of significant hazard, risk evaluation, emergency response, etc. In this paper, EMIS design and some key technologies of the system is discussed. The process and business requirement of the system is analyzed. The technical structure and system function are designed. Finally, three key technologies are described: event chain technology, plan chain technology, online consultation technology.","PeriodicalId":244586,"journal":{"name":"2012 Third World Congress on Software Engineering","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132579519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Building and Practice of Multi-Project Portfolio Management System for Aviation Enterprises","authors":"X. Ma, Miaoxin Du, Bo Zhang, Qing-hong Le","doi":"10.1109/WCSE.2012.38","DOIUrl":"https://doi.org/10.1109/WCSE.2012.38","url":null,"abstract":"A Multi-project Portfolio Management System was established for aviation enterprises based on the best practice theories of Integrated Product Development, Portfolio Management and Stages-Gate. The suitability for aviation enterprises of this system involves two features: aviation enterprises organizational structure and business process of project management. Both single and multiple project management functions are involved in this system, which provides the environment of top-level planning and process management, also makes it realize coordination and dynamic control of activities during the process of product development. Meanwhile, resources balance, schedule control, stage audit and quality control for different projects and different project stages are achieved. Application shows that this system can improve the process and management ability of aviation complex products development effectively.","PeriodicalId":244586,"journal":{"name":"2012 Third World Congress on Software Engineering","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117107894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Coverage Criteria Guided Web Application Interactions Testing","authors":"Bo Song, Shengbo Chen","doi":"10.1109/WCSE.2012.17","DOIUrl":"https://doi.org/10.1109/WCSE.2012.17","url":null,"abstract":"Web applications are widely used in people's everyday life and are inherent interactive applications since their emergence. The structures of web applications are complex. Furthermore, the interaction features exacerbate their complexity. How to ensure their reliability and quality presents a challenge to software testers. In this paper, according to the features of web applications, we have formally defined and presented intra-page interactions coverage criteria, inter-page interactions coverage criteria, page-server interactions coverage criteria and scenario-based page-server interactions coverage criteria. Based on each of these coverage criteria, using a motivating example, we present a method to generate test sequences. We also give out the discussions on how to choose the corresponding coverage criteria to satisfy software requirements.","PeriodicalId":244586,"journal":{"name":"2012 Third World Congress on Software Engineering","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116106993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}