{"title":"Study on Chinese Text Summarization Based on Extracting Sentences from Subtopics","authors":"Xinlai Tang","doi":"10.1109/WCSE.2009.474","DOIUrl":"https://doi.org/10.1109/WCSE.2009.474","url":null,"abstract":"In this paper, we propose a new method for Chinese text summarization. First, the document is segmented into several units in terms of the subtopics in the document. Then, the most representative sentences in each subtopic unit are selected as the summary sentences. By analyzing semantic structure of the documents first, the summary sentences are not redundancy and the coverage of each subtopic is balanced. Experimental results show that our approach is effective and efficient, and performance of the system is reliable.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114640629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of Recycle Bin Forensic Analysis Platform Based on XML Techniques","authors":"Gao Qinquan, Wu Shunxiang","doi":"10.1109/WCSE.2009.111","DOIUrl":"https://doi.org/10.1109/WCSE.2009.111","url":null,"abstract":"Windows Recycle Bin is an important component of the operating system and the algorithm is very important and worth exploring. Recycle Bin preserves deleted files and directories signs. So, it’s an important part to exam the control files of the Recycle Bin in computer forensic. In this paper, by parsing the structure of INFO2, we completely analyze the recovery model and algorithms of the Recycle Bin. And based on the use of XML structure, the parsing data are packaged in XML. By this way, a practical evidence analysis Platform is designed, which can work out and restore the information of deleted files into the form of a friendly user interface. This application will be an important information-gaining tool to conduct forensic analysis of a suspect’s computer system.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115091814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quality Tree of QFD: A New Method to Ensure Software Quality","authors":"M. Jianhong, Yang Jing, Luo Tao","doi":"10.1109/WCSE.2009.243","DOIUrl":"https://doi.org/10.1109/WCSE.2009.243","url":null,"abstract":"We bring a new method--QTQ (Quality Tree of QFD) to solve the problem, that software quality can not effectively ensure. QTQ is based on UML profile¿it integrates ideal solution and QFD. Its main point is: According to the concept of ideal solution, establish DTRQ (Distribution Tree of Requirement Quality), when analyze requirements of customer. Use DTRQ to guide design. On the basis of design, build DTDQ (Distribution Tree of Design Quality) and assess if CRDP (Change Rates of Design Plan) is acceptable, and then coding according to qualified DTDQ. In testing procedure, software quality is evaluated by the qualified DTDQ.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115509675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Architecture of Information Security in Enterprise Portal","authors":"Wei Wang, Ying Wang","doi":"10.1109/WCSE.2009.152","DOIUrl":"https://doi.org/10.1109/WCSE.2009.152","url":null,"abstract":"Analyzing the strategies and methods of information security in current Enterprise Portal, pointing out their shortages, and then design several function modules such as Role-Based-Fully Access Control, Right-Inherited-Hierarchically and Right Management, Access Group, Operation Policy of Information Security, Trusted-Data-Link, in order to construct an integrity safeguard system for information security in Enterprise Portal.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121541783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Model-Driven Reverse Engineering Approach for Semantic Web Services Composition","authors":"Weijun Sun, Shixian Li, Defen Zhang, Yuqing Yan","doi":"10.1109/WCSE.2009.403","DOIUrl":"https://doi.org/10.1109/WCSE.2009.403","url":null,"abstract":"Web service technologies are becoming increasingly important for integrating service-oriented applications. The Web services reverse engineering process becomes necessary in order to facilitate the reuse and composition of Web services. This paper describes a model driven Web service reverse engineering process, where Web service descriptions (WSDL) are transformed to UML models, then the generated UML models are integrated into composite Web services, finally the new Web service descriptions (OWL) are generated","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123518077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Songnian, Zou Qi, Jin Zhen, X. Xiaoyun, Y. Guozheng, Yao Li, Liu Yijun
{"title":"A Computational Model that Realizes a Sparse Representation of the Primary Visual Cortex V1","authors":"Z. Songnian, Zou Qi, Jin Zhen, X. Xiaoyun, Y. Guozheng, Yao Li, Liu Yijun","doi":"10.1109/WCSE.2009.40","DOIUrl":"https://doi.org/10.1109/WCSE.2009.40","url":null,"abstract":"On the basis of synchronous oscillation in the visual cortex and synchronized responses to external stimuli, we have proposed a complete neural computational model of visual information processing, which consists of multiscale filtering, phase synchronization, and inner-product formation. In the model, firing-spike trains are topologically mapped from the retina to the cortex V1 and are synchronously decoded by neural phase-locked loops (NPLLs), and then the model forms an inner product of the outputs of the NPLLs with the receptive fields of simple cells, which are densely distributed in the visual cortex. The inner-product operation leads these simple cells to fire; the simple cells in a firing state form an activation pattern that is a reconstruction of the image of the external visual stimulus. This computational model reveals clearly a computational process of inner-product formation that is an effective approach to realizing a sparse representation. The multiscale filtering, decoding, and inner-product operations on the visual image reflect the main properties of visual information processing, such as efficiency, simplicity, and robustness from the point of view of neural computation. This finding provides a neural computation suitable for realizing a sparse representation of external visual images and provides further insight into information processing in V1.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123836763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Research of Plug-In Based CAPP System with Plug-and-Play Characteristic","authors":"Sheng-wen Zhang, Jin-ju Liu, X. Fang","doi":"10.1109/WCSE.2009.464","DOIUrl":"https://doi.org/10.1109/WCSE.2009.464","url":null,"abstract":"It is difficult to solve the flexibility and adaptability of a computer aided process planning (CAPP) system. This paper analyzes the disadvantages of researching methods in traditional CAPP systems and presents the advantages and characteristics of Platform/Plugin structure, utilizes the Platform/Plug-in software structure to develop the framework of CAPP system. Using Plug-in technology to realize the main functions of CAPP system made the system excellent in plug-and-play characteristic. The presented paper discusses the basic thought of Plug-in technology, and establishes a framework of a Plug-in based CAPP system, provides the steps of developing process, accomplishes the customization development of the key functions and the assemble on the platform. By using the Plug-in technology with plug-and-play trait, the function of the system is improved without changing the main program. It significantly improves the flexibility and reusability of the system and it has great effect on the adaptability in CAPP domain.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121737359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing and Building of a Hong Lou Meng Chinese-English Parallel Corpus and its Web-Based Query System","authors":"Zequan Liu, Ying Yuan, Chaopeng Liu","doi":"10.1109/WCSE.2009.343","DOIUrl":"https://doi.org/10.1109/WCSE.2009.343","url":null,"abstract":"In this paper, an introduction of the designing and building of a Hong Lou Meng Chinese-English parallel corpus and its web-based query system was given in the first place and then the algorithms in the construction of the parallel corpus which contained one source text in Chinese and three target texts in English were analyzed in detail. As an indispensable step in the establishment of the parallel corpus and its web-based query system, database building was investigated elaborately. The building of this Chinese-English parallel corpus and its web-based query system was believed to eventually facilitate translation studies and other relevant linguistic and cultural disciplines on a systematical and comprehensive level.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128477338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. R., Adang Suhendra, Addien Febrinata, Anne Yuliyanti
{"title":"Secure Mobile Agent System in Peer-to-Peer Networks: A Review of Security Mechanisms Based on Several Security Issues","authors":"D. R., Adang Suhendra, Addien Febrinata, Anne Yuliyanti","doi":"10.1109/WCSE.2009.426","DOIUrl":"https://doi.org/10.1109/WCSE.2009.426","url":null,"abstract":"Peer-to-peer(P2P) technology can be naturally integrated with mobile agent technology in Internet applications, taking advantage of the autonomy, mobility, and efficiency of mobile agents in accessing, processing event securing data. In P2P, giving permission to client who could accessed data is needed to reduced client’s worrying of prevent any stealing private data. Under this assumption, in this paper, we address the problem of protecting mobile agent system in P2P networks. Some approaches of security mechanisms and techniques are then discussed.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129886609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xuequn Chen, Fulin Li, Ye Liu, Chengshan Yan, Lin Lin
{"title":"Neural Network Analog on Dynamic Variation of the Karst Water and the Prediction for Spewing Tendency of Springs in Jinan","authors":"Xuequn Chen, Fulin Li, Ye Liu, Chengshan Yan, Lin Lin","doi":"10.1109/WCSE.2009.131","DOIUrl":"https://doi.org/10.1109/WCSE.2009.131","url":null,"abstract":"Considering the factors that affect the karst water level, the improved Neural Network Model has been applied to construct the random model that analogs the dynamic change of karst water. The accuracy of our analog has been greatly improved compared with that of multi-line recurrence model; moreover, BP model has strong functions of study, fault tolerance and association. In a word, BP model is an effective tool to predict the dynamic change of karst water. In addition, the spewing tendency of springs in Jinan is analyzed based on our prediction results in this paper.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130906000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}