2012 Fourth International Conference on Computational and Information Sciences最新文献

筛选
英文 中文
Boundedness for Multilinear Commutators of theta-type Calderón-Zygmund Operator on Herz-Hardy Spaces Herz-Hardy空间上theta型Calderón-Zygmund算子的多线性换易子的有界性
R. Xie, Hailian Wang
{"title":"Boundedness for Multilinear Commutators of theta-type Calderón-Zygmund Operator on Herz-Hardy Spaces","authors":"R. Xie, Hailian Wang","doi":"10.1109/ICCIS.2012.96","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.96","url":null,"abstract":"In this paper, the boundedness for the multilinear commutators generated by θ-type Calderon-Zygmund operator with Lipschitz function is discussed, and we conclude that it is bounded on Herz-Hardy spaces.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128484168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Research and Implementation of the Linux Process Real-Time Monitoring Technology Linux进程实时监控技术的研究与实现
2012 Fourth International Conference on Computational and Information Sciences Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.342
Wu Kehi, Ge Yueguang, Chen Wei, Zhang Tong
{"title":"The Research and Implementation of the Linux Process Real-Time Monitoring Technology","authors":"Wu Kehi, Ge Yueguang, Chen Wei, Zhang Tong","doi":"10.1109/ICCIS.2012.342","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.342","url":null,"abstract":"With the rapid development of information technology, the computer has been more and more important in our lives. Especially it makes our working, learning and entertainments, and even consumptions dependent on the computer increasingly because of the popularity of network. However, the computer has brought us a lot of convenience, while it also makes us face with a variety of security risks. Computer viruses and Trojans become the most important factor of the hazards of computer security. This article proposes the security defense technology based on the Linux process real-time monitoring to prevent malicious processes running from the operating system kernel level. By preventing unauthorized programs and drivers to run, we can effectively prevent the Trojan horse and virus such as machine dog, and avoid being attacked maliciously. This paper introduces the principle, theoretical model and the technologies in the implementation of the security defense technology based on the Linux process real-time monitoring.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129042299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Deep Web Data Source Classification Based on Query Interface Context 基于查询接口上下文的深度网络数据源分类
2012 Fourth International Conference on Computational and Information Sciences Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.117
Zilu Cui, Yuchen Fu
{"title":"Deep Web Data Source Classification Based on Query Interface Context","authors":"Zilu Cui, Yuchen Fu","doi":"10.1109/ICCIS.2012.117","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.117","url":null,"abstract":"As the volume of information in the Deep Web grows, a Deep Web data source classification algorithm based on query interface context is presented. Two methods are combined to get the search interface similarity. One is based on the vector space. The classical TF-IDF statistics are used to gain the similarity between search interfaces. The other is to compute the two pages semantic similarity by the use of HowNet. Based on the K-NN algorithm, a WDB classification algorithm is presented. Experimental results show this algorithm generates high-quality clusters, measured both in terms of entropy and F-measure. It indicates the practical value of application.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124655221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Design and Development of the Basketball Course CAI Based on Web 基于Web的篮球课程CAI的设计与开发
2012 Fourth International Conference on Computational and Information Sciences Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.324
Qinghua Fang, Yukuo Wang
{"title":"The Design and Development of the Basketball Course CAI Based on Web","authors":"Qinghua Fang, Yukuo Wang","doi":"10.1109/ICCIS.2012.324","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.324","url":null,"abstract":"In order to solve the problems such as low teaching efficiency and backward teaching method of basketball course in higher vocational colleges, and realize the interworking and sharing of basketball course teaching recourses, a basketball course CAI teaching platform based on Web is designed. The design of this platform, combining subject characteristics of basketball course, uses Windows NT 4/2000Server as operating system platform, Microsoft SQL Server 7.0 as RDBMS, NAS for data storage and flow technology for video service. The basketball course CAI teaching platform based on Web Service can realize the dynamic integration of basketball course teaching resources and it has good integration, openness and encapsulation. The design scheme of basketball course CAI teaching platform based on Web Service can effectively solve and help the interconnection, interworking of basketball course PE teaching resources and adapt to the informatization development demands of PE teaching.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124668492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study on the Sensitivity of the Influence Factors for the Technology Transfer Price 技术转让价格影响因素的敏感性研究
2012 Fourth International Conference on Computational and Information Sciences Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.304
Zeng Yanlin
{"title":"Study on the Sensitivity of the Influence Factors for the Technology Transfer Price","authors":"Zeng Yanlin","doi":"10.1109/ICCIS.2012.304","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.304","url":null,"abstract":"The special attributes of technical goods decide the complexity of the transfer technology price. To be more scientific and rational to assess the technology transfer price, the technical transfer pricing must take into account the sensitivity of the price's influence factors. The paper uses the Analytic Hierarchy Process to systematically analyze the sensitivity of influence factors, and classify the influence factors in accordance with the sensitivity level. The result shows that the sensitivity level of all influence actors restrict significantly the proportion of the price model's elements. It is reasonable to introduce the extremely sensitive factors and sensitivity factors to correct pricing model, and this is the practical needs of the technology trading subject.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126669992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Service Differentiation Strategy Based on Packet Loss Rate for 802.11 Wirelesses LAN 基于丢包率的802.11无线局域网业务差异化策略
2012 Fourth International Conference on Computational and Information Sciences Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.278
Shujun Bi
{"title":"Service Differentiation Strategy Based on Packet Loss Rate for 802.11 Wirelesses LAN","authors":"Shujun Bi","doi":"10.1109/ICCIS.2012.278","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.278","url":null,"abstract":"With the rapid development of multimedia applications such as video on demand, VoIP, web conferencing, distant education etc. the current IEEE 802.11's Best-effect Service is unable to meet the different needs of these multimedia applications and users' request towards the quality of the network. Therefore, the research has broad prospects in improving the efficiency of the network and meeting the different needs of the users. This paper comes up with direct packet loss rate to realize service differentiation strategy, which allows high-priority node packet loss rate to be low while low priority node packet loss rate is high, beyond the condition that the total load is under control. This scheme is quite simple and easy to achieve without changing the 802.11 protocol.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126686303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application and Design of the Spectral Identification System Based on Neural Network and Fuzzy Control 基于神经网络和模糊控制的光谱识别系统的应用与设计
Min Chen, Hui Liu
{"title":"Application and Design of the Spectral Identification System Based on Neural Network and Fuzzy Control","authors":"Min Chen, Hui Liu","doi":"10.1109/ICCIS.2012.77","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.77","url":null,"abstract":"The spectral identification technology is a spectral basis of qualitative analysis. With the development of pattern recognition, spectral identification technology has become an important tool for rapid detection of medicine, environmental protection, petrochemical and other industries. The neural network nonlinear mapping, adaptive learning, robustness and fault tolerance features, has a wide range of applications in signal processing, knowledge engineering, pattern recognition and other fields. This paper meets the Lambert Beer law of spectral signals for the study, outlines the basic principles of neural networks for pattern recognition, and then according to the specific requirements of the spectrum recognition, multi-feature-based and neural network spectral identification programs, and conducts system design, the establishment of the basic model framework. Finally, an instance of the method is described.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126895177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-Based Cluster Partition Method in Wireless Sensor Networks 无线传感器网络中基于能量的聚类划分方法
2012 Fourth International Conference on Computational and Information Sciences Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.143
Xiao Shisong, Zou Xiangling, Zhang Feng, Feng Hui
{"title":"Energy-Based Cluster Partition Method in Wireless Sensor Networks","authors":"Xiao Shisong, Zou Xiangling, Zhang Feng, Feng Hui","doi":"10.1109/ICCIS.2012.143","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.143","url":null,"abstract":"Because the energy of the sensor nodes determines directly the wireless sensor network service life, so saving node energy which means prolonging the network life is very important. This paper proposes a new clustering method based on energy in the network with sensor nodes uniformly distributed.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114623515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Image Hiding Scheme Based on 3D Skew Tent Map and Discrete Wavelet Transform 基于三维倾斜帐篷映射和离散小波变换的图像隐藏方案
Ruisong Ye, Wei Zhou, Haiying Zhao
{"title":"An Image Hiding Scheme Based on 3D Skew Tent Map and Discrete Wavelet Transform","authors":"Ruisong Ye, Wei Zhou, Haiying Zhao","doi":"10.1109/ICCIS.2012.66","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.66","url":null,"abstract":"In this paper, an image hiding scheme based on 3D skew tent map and wavelet transform is proposed. One 3D skew tent map with three control parameters and one coupled map lattice are utilized to encrypt the secret image which will be imbedded in one host image. The encryption scheme consists of generating a chaotic orbit by the skew tent map to scramble the pixel positions and yielding a random gray value sequence by the coupled map lattice to change the gray values. The encrypted secret image and the host image are transformed by the wavelet transform and then are merged in the frequency domain. Experimental results show that the proposed hiding scheme is robust against malicious attacks like cropping, noising, etc.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114029002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Output Voltage Estimation for Vibration Energy Harvesters Using Relevance Vector Mechines 基于相关向量机的振动能量采集器输出电压估计
2012 Fourth International Conference on Computational and Information Sciences Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.201
Chuan Li, Daewoong Hong, K. Kwon, Jaehwa Jeong
{"title":"Output Voltage Estimation for Vibration Energy Harvesters Using Relevance Vector Mechines","authors":"Chuan Li, Daewoong Hong, K. Kwon, Jaehwa Jeong","doi":"10.1109/ICCIS.2012.201","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.201","url":null,"abstract":"By converting natural vibration into electricity, vibration energy harvesters (VEHs) provide promising self-power resources to drive wireless electronic systems. The output voltage is a vital parameter to evaluate the performance of a VEH. Considering the fact that relation between the operation conditions and the output voltage is nonlinear, a relevance vector machine (RVM) -based approach is proposed to estimate the output voltage. The vibration frequency, acceleration amplitude, and load resistance are employed as the input vectors so as to model the harvested electricity voltage which is the output vector of the RVM. An experimental set-up is used to collect real data for RVM modeling and precision evaluation. The results show that the proposed method is capable of estimating the output voltage for the VEH with good precision.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127836605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信