{"title":"Research Into County Economy Development and Financial Support of Hebei Province","authors":"Lixia Dong, Jingmei Yang","doi":"10.1109/ITA.2013.102","DOIUrl":"https://doi.org/10.1109/ITA.2013.102","url":null,"abstract":"County economy is an important part of regional economy, it is at the basic position in the national economy. As a big agriculture province, the county economic development of Hebei province will have a huge effect on the national economy, also affect its comprehensive economic strength ascension to a large extent. At the same time, the development of county economy cannot do without financial support, so the research on the relationship between county economic development and financial support has great theoretical and practical significance.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"09 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127287273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Method of Systemic EMC Evaluation for Missile","authors":"Bingqie Wang, Lei Wang, Q. Du","doi":"10.1109/ITA.2013.105","DOIUrl":"https://doi.org/10.1109/ITA.2013.105","url":null,"abstract":"Systemic EMC evaluation method for missile is presented in the paper for the first time. Systemic EMC performance EMC(S) is defined. EMC probability and interfered probability for sensitive port of receivers and other sensitive equipments are defined as well. EMC(S) evaluation system is founded based on interfered relationship matrices. EMC(S) can be evaluated along with the change of subsystem parameters. It is the foundation of EMC optimized design for missile system.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133118000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting and Tracking Volunteers in Expo Videos","authors":"Jianning Liang, Yan Zhou","doi":"10.1109/ITA.2013.29","DOIUrl":"https://doi.org/10.1109/ITA.2013.29","url":null,"abstract":"A method is introduced for detecting and tracking volunteers in expo surveillance videos. A detection box slides on the images from the videos from left to right and then from up to down. Since the volunteers wear the green clothes, only the patches of enough green pixels are passed for further processing. Then, three kinds of features i.e. RGB color features, SURF features and HOG features are extracted from the patches. These features are sent to a trained cascade boosting classifier to determine whether the patches are the volunteers. In the experiments, the proposed method demonstrates good performances on three videos.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131569484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on Coverage Performance for LTE-FDD System and Comparison with WCDMA System","authors":"Jun Xu, Fei Zhou, Yushan Pei, Yaoxu Zhang, Z. Lv","doi":"10.1109/ITA.2013.14","DOIUrl":"https://doi.org/10.1109/ITA.2013.14","url":null,"abstract":"Whenever new cellular technology is considered for mass deployment hundreds of its RF parameters go through tuning process with a view to find out optimum value. And usually, it costs a lot of time and money. Consequently, extensive simulation becomes meaningful before commercial deployment. System can be facilitated in numerous ways and cost would be greatly minimized. With the path loss and propagation model, the radius of the site, the sites spacing and the coverage area of the site can be calculated. The system characteristics of LTE FDD and the link budgets for LTE FDD and WCDMA are calculated in this paper.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115785836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Research on Cloud Computing Security","authors":"Ni Zhang, Di Liu, Yunyong Zhang","doi":"10.1109/ITA.2013.91","DOIUrl":"https://doi.org/10.1109/ITA.2013.91","url":null,"abstract":"This paper gives an overview on cloud computing security. To clarify cloud security, a definition and scope of cloud computing security is presented. An ecosystem of cloud security is shown to illustrate what each role in industry can do in turn. Then security impacts of cloud security for both customers and operators are analyzed. To overcome challenges from cloud security, many state-of-the-art technical solutions, e.g., continuation protection mechanism, IDM, data security, and virtualization security are discussed. Finally, best practices on perspective of operator are summarized and a conclusion is conducted.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114882586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Reformation of Education Caused by Cloud Computing","authors":"Guan Xiao-hui, Qian Ya-Guan","doi":"10.1109/ITA.2013.90","DOIUrl":"https://doi.org/10.1109/ITA.2013.90","url":null,"abstract":"The appearance of cloud computing has a great influence on education. It greatly affects the evolution of teaching mode and learning mode in colleges. This paper discusses the use of cloud computing in educational and learning area.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125395705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Harmonic Detection Using the Direct Weight Determination Neural Network","authors":"Li Han, Ruan Xiu-kai, Zhu Xiang-ou","doi":"10.1109/ITA.2013.77","DOIUrl":"https://doi.org/10.1109/ITA.2013.77","url":null,"abstract":"This paper presents a novel harmonic detection algorithm using the direct weight determination neural network for the electric power system. A new ANN structure is designed to strengthen the real-time capability of harmonic detection. The proposed algorithm employs the weight computation with sine base function to address the problem of harmonic detection. The optimal weight of this ANN with sine base function can be achieved by direct computation. This ANN can avoid the tediously long weight training and get the proper weight including the information of phase and amplitude of harmonic detection. The simulation computation demonstrates this algorithm has high precision and low computational complexity, and it has value in the harmonic detection of electric power system.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"16 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120927475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation-Based Research on Adjustment Technology of Ship Block Production Plan","authors":"N. Chen, Zhen Wang, Jianhua Wu","doi":"10.1109/ITA.2013.67","DOIUrl":"https://doi.org/10.1109/ITA.2013.67","url":null,"abstract":"Production plan was an important part of lean shipbuilding. Problems such as semi-finished products waiting, backlog in shipbuilding process were often present due to unreasonable plan. That caused the bottleneck problem of the assembly line. Built an QUEST simulation model of block assembly lines, in which the real plan data was imported. Selected production rhythm balancing, space utilization and plan completion as the system evaluation index to verify the rationality of the plan. Futher discussed the adjustment technologies and solutions of the production plan. Studies shown that simulation technology provides quantitative judgment basis and technical support for making rational shipbuilding production plan under the lean shipbuilding mode.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115370679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Weakly-Secure Network Coding Scheme Against Nodes Conspiracy Attack for Multicast System","authors":"Rong Du, Shenghong Li","doi":"10.1109/ITA.2013.41","DOIUrl":"https://doi.org/10.1109/ITA.2013.41","url":null,"abstract":"Since network information flow can achieve the max-flow in theory and the network throughput is increased by using network coding. At the same time, the security of network coding is of importance as the research of network coding increase. Different from previous wiretapping scenarios where the threat is posed by external wiretappers. We discuss the security in an internal angle: all intermediate nodes comply with the communication protocols which are potential wiretappers and the wiretappers can cooperate with each other to decode the packets sent from the source node. Most existing research on network coding designs with a given topology, we will consider the secure network topology design. In this paper, our purpose is to find the secure transmission topology that is suitable for network coding in transmission system. Based on the secure topology, we use network coding scheme which is weakly secure. Mathematical analysis and computer simulations show that the proposed protocol can prevents cooperative eavesdroppers from acquiring any useful information transmitted from source node to sink node.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117200791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prediction Model of Tongguan Elevation Changes in Flood Seasons","authors":"Min Li, Xiaoping Du, Lu Zhang","doi":"10.1109/ITA.2013.75","DOIUrl":"https://doi.org/10.1109/ITA.2013.75","url":null,"abstract":"Accurate prediction of Tong guan Elevation has important realistic significance in flood control of lower Weihe River. The existing predictive models of Tong guan Elevation Changes cannot use the historical data to forecast the possible changes of the nest year. This paper proposes a modeling method, using fast neural networks and feature selection techniques, completing the prediction of Tong guan Elevation Changes in Flood Seasons in the next year by using the past historical data to build the training model. This paper verifies the validity of the model through the collected data during the flood seasons, it confirms the validity of the proposed modeling approach.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127285291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}