{"title":"Monitoring System for Fatigue Driving Based on the Internet of Things","authors":"Fang Wu, Na Han, Peiyong Chen, Dong-Wei Chen","doi":"10.1109/ITA.2013.16","DOIUrl":"https://doi.org/10.1109/ITA.2013.16","url":null,"abstract":"Fatigue driving is a serious problem for human life and economy. In this paper, an alertness of fatigue driving estimating system was designed based on the internet of things with personal computer, 6410-ARM developed platform and the combination of GPS, GPRS and Zibgee peripheral modules. We also proposed the framework of algorithm, which is called dynamic sliding window detection, to distinguish level of fatigue state. With the real-time communication between monitoring center and vehicle terminal, it is able to keep the local and remote alarm, monitor vehicle information in remote, and deliver early warning signal to other vehicle around.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132434775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Application of Fuzzing in Web Software Security Vulnerabilities Test","authors":"Li Li, Qiu Dong, Dan Liu, Leilei Zhu","doi":"10.1109/ITA.2013.36","DOIUrl":"https://doi.org/10.1109/ITA.2013.36","url":null,"abstract":"Web applications need for extensive testing before deployment and use, for early detecting security vulnerabilities to improve the quality of the safety of the software, the purpose of this paper is to research the fuzzing applications in security vulnerabilities. This article first introduces the common Web software security vulnerabilities, and then provide a comprehensive overview of the fuzzing technology, and using fuzzing tools Web fuzz to execute a software vulnerability testing, test whether there is a software security hole. Test results prove that fuzzing is suitable for software security vulnerabilities testing, but this methodology applies only to security research field, and in the aspect of software security vulnerabilities detection is still insufficient.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133611080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research Into County Economy Development and Financial Support of Hebei Province","authors":"Lixia Dong, Jingmei Yang","doi":"10.1109/ITA.2013.102","DOIUrl":"https://doi.org/10.1109/ITA.2013.102","url":null,"abstract":"County economy is an important part of regional economy, it is at the basic position in the national economy. As a big agriculture province, the county economic development of Hebei province will have a huge effect on the national economy, also affect its comprehensive economic strength ascension to a large extent. At the same time, the development of county economy cannot do without financial support, so the research on the relationship between county economic development and financial support has great theoretical and practical significance.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"09 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127287273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Analysis Method for Power System Transient Signal Based on Improved Prony Algorithm and PSO Algorithm","authors":"Xuanfang Yang, Jialin Wang","doi":"10.1109/ITA.2013.55","DOIUrl":"https://doi.org/10.1109/ITA.2013.55","url":null,"abstract":"An analysis method for power system transient signal is proposed in this paper to improve the analysis precision for the transient signal including harmonic, inter-harmonic and decaying DC component. First of all, the multiple wavelet method is adopted to cut down the noise, and the differential algorithm is used to wipe off the decaying DC component whereas to magnify high frequency components. Then the amount of frequency components of the signal and its parameters values are estimated by improved Prony algorithm. Finally, the electric power parameter optimization model is set up based on these estimate, and the PSO algorithm is used to solve the model. The Mat lab simulation results demonstrated that the algorithm achieved high accuracy and rapid convergence.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126476382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Modeling and Visualization of Guangzhou Underground Space","authors":"Weijun Yang, Suzhi Wu","doi":"10.1109/ITA.2013.85","DOIUrl":"https://doi.org/10.1109/ITA.2013.85","url":null,"abstract":"The exploitation of Guangzhou underground space is very rapid and it needs an information platform to manage the data. Because of the complexity of underground space data, there is no mature system to manage, visualize and analyze all these data: pipeline, underground building and geologic data. Based on the construction practice of integrated management information platform for Guangzhou underground space, this paper illustrates the key technologies of underground space management information system which include data structure, data modeling, database integration, visualization, comprehensive analyze and shared use.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114443710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on Cylinder's Surface Current Density and Radar Cross Section (RCS) Resonance","authors":"Jinzu Ji, Feiliang Liu","doi":"10.1109/ITA.2013.33","DOIUrl":"https://doi.org/10.1109/ITA.2013.33","url":null,"abstract":"Perfect electric conductive cylinder's scattering is a typical 2-dimensional scattering and has accurate solution which is very helpful in study of conductor's surface wave, crawling wave and is often used for validation of computational algorithm. The surface currency density's magnitude and phase's distribution over the profile are studied and the incident polarization and frequency's influence on the surface currency are analyzed. The bi-static radar cross section (RCS) is calculated based on the far field approximation of Hankel's function and the RCS's resonant characteristics over the frequency and bi-static angle are studied. Analysis results show that RCS's variations with frequency and bi-static angle are similar and the resonant peaks numbers are the same. This result has important reference meaning to study of RCS's frequency and multi-static features.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128134750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Incorporating Consumer Browse Data: Extended Item-Based Top-K Recommendation Algorithms","authors":"Xiaomeng Du, Meng Su","doi":"10.1109/ITA.2013.65","DOIUrl":"https://doi.org/10.1109/ITA.2013.65","url":null,"abstract":"Personalized recommendation systems are becoming increasingly popular in e-commerce. One of the core recommendation algorithms is item-based recommendation algorithm, which recommend by finding products that are similar to other products using consumers' purchase data. However, purchase data contains too little information to reveal the real preference of consumers. The purpose of this paper is to extend the item-based top-k recommendation algorithm by incorporating consumers' browse data, which contains more useful information in revealing the preference of consumers. First, we extend the cosine-based method of modeling the similarity matrix between two products and construct an extended model subjected to varying conditions in terms of browse and purchase combination. Then we test our extended algorithm on a simulated data set and apply it to a real world data set provided by an online B2C company. Both the results of the simulation data and the real data show that our extended algorithm performs significantly better than the traditional item-based algorithm, in terms of hit rate (HR) and average reciprocal hit rank (ARHR). Specifically, our extended algorithm generates 113, 089 (4349.58%) more sales than random algorithms and 25, 335 (28.86%) more sales than traditional cosine-based algorithms. We discuss the theoretical and managerial implications in the conclusion part.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128235433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet of Things Technology and Intelligent Perception Technology in Inland Navigation Management and Emergency Response Service System","authors":"Feng Wang","doi":"10.1109/ITA.2013.11","DOIUrl":"https://doi.org/10.1109/ITA.2013.11","url":null,"abstract":"In this paper, problems existing in Inland Navigation Management and Emergency Response Service System are analyzed. Then solutions, which are based on Internet of Things Technology and Intelligent Perception Technology, are provided. Finally, the benefits due to the use of our solutions will be discussed at the end of this paper.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128063140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hao Wang, Zhe Li, Jun Luo, Shaorong Xie, Hengyu Li
{"title":"Design and Implementation of a Dual-Axis Sun-Tracking System Based on Microcontroller","authors":"Hao Wang, Zhe Li, Jun Luo, Shaorong Xie, Hengyu Li","doi":"10.1109/ITA.2013.94","DOIUrl":"https://doi.org/10.1109/ITA.2013.94","url":null,"abstract":"Solar energy is regarded as an extremely important renewable energy resource. More energy is produced when solar panel is perpendicular to the illumination of the sun. This paper describes in detail the design and construction of a solar tracking system with two degrees of freedom. A new solar illumination detector adopted in system can detect the sunlight accurately. Practical experiments show the system could meet the demands of detection accuracy, lower power, and higher reliability.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129601280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Method for the Fast Security Evaluation of Surface Drinking Water Sources in Western Mountain Areas","authors":"Yang Li, Yi Huang, Dinggui Luo","doi":"10.1109/ITA.2013.37","DOIUrl":"https://doi.org/10.1109/ITA.2013.37","url":null,"abstract":"Due to the nonpoint pollution of drinking water sources in western mountain areas and the lack of relevant monitoring data, four security indexes (water quality risk, water supply and demand ratio, water and soil erosion and flood control) are used to describe the water quality, water quantity, ecological and engineering safety of drinking water sources respectively. The fast-evaluating index system related to the security of drinking water sources in western mountain areas is further constructed. Additionally, this system was applied to the security assessment of a drinking water source in Cengong(a poverty-stricken county) of Guizhou Province, and a positive result was accquired. The research is of important theoretical and realistic significances in exploring and pushing the protection and pollution control of drinking water sources in western mountain areas.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134311690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}