{"title":"Application and Study on Preconditioned Conjugate Gradient Method Algorithm in Concrete Ultrasonic Computerized Tomography","authors":"Fan Yao, Chu Yanli","doi":"10.1109/ITCS.2010.91","DOIUrl":"https://doi.org/10.1109/ITCS.2010.91","url":null,"abstract":"The structural characteristic is given by computerized tomography in non-destructive testing (NDT) of concrete. The position???size and style of inner defects can be shown. A Preconditioned Conjugate Gradient Method (PCG) from a view of probability for concrete image reconstruction is presented in this paper. In PCG, we present a class of conjugate gradient methods with a new conjugacy condition M which is proved under suitable conditions. The M combined with a general Conjugate Gradient Method, which lead to Preconditioned Conjugate Gradient Method (PCG). Computer simulation and concrete model of ultrasonic computerized tomography show that the PCG is more effective to improve the accuracy of computation and the quality of image reconstruction on concrete than the Conjugate Gradient Method (CG).","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125996953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Design of Meteorological Data Warehouse and Multidimensional Data Report","authors":"Nan Ma, Mei Yuan, Y. Bao, ZongMin Jin, He Zhou","doi":"10.1109/ITCS.2010.75","DOIUrl":"https://doi.org/10.1109/ITCS.2010.75","url":null,"abstract":"The paper designs and implements the meteorological data warehouse as well as the meteorological data report based on the Microsoft SQL Server. The purpose is to apply data warehouse technology in the meteorological research area. Using On-Line Analysis Processing(OLAP) and the multidimensional report, we get the beneficial data. The system generates meteorological data report, which can publish the report to the browser. The research is beneficial for meteorological phenomena studies.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127172201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Prediction of Large Scale Vacuum Furnace Using Thermal Analysis","authors":"Zhen-Zhe Li, Yong Li, Yun-de Shen, Jae-Woo Lee","doi":"10.1109/ITCS.2010.59","DOIUrl":"https://doi.org/10.1109/ITCS.2010.59","url":null,"abstract":"A method using thermal analysis has been recommeded to substitute the original method what was based on trial and error for manufacturing a high performance, low cost product. At first, a large scale vacuum furnace was modeled according to a real product, and it was simulated using the material properties in a previous study under the condition of having argon ambient gas. Finally, the performance of the large scale vacuum furnace was discussed using the obtained results of analysis. The method in this study will be used to produce an energy efficient, low cost product using optimization technique under the condition of fully satisfying user's design requirements.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"270 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133463566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Notice of RetractionResearch of Ontology-Based Model Representation Method","authors":"Dai Chao-fan, Feng Yang-he, Zhang Peng-cheng","doi":"10.1109/ITCS.2010.95","DOIUrl":"https://doi.org/10.1109/ITCS.2010.95","url":null,"abstract":"Model ontology representation is proposed to improve the standardization of model representation in model base system. There are model domain ontology, application ontology and ontology evolution in it. Model domain ontology ensures that the information of model is integrity and consistency, which is abstract of model information and relation on each other. Model application ontology is concretion of model information according with domain ontology as the resource of information of the model management modules. Model domain and application ontology are modified by using ontology evolution under model consistency. Model ontology representation is easy to be standardized and expanded by the instance.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130595790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hongfei Liu, Hualin Zhang, Yongshun Huang, Weixiong Lin
{"title":"The Study of Unbiased-estimation Threshold Wavelet De-noising Method Applied on Mid-wavelength Infrared Image","authors":"Hongfei Liu, Hualin Zhang, Yongshun Huang, Weixiong Lin","doi":"10.1109/ITCS.2010.56","DOIUrl":"https://doi.org/10.1109/ITCS.2010.56","url":null,"abstract":"With the rapid development of science and technology, the mid-wavelength Infrared imaging technology has been more and more widely used in military and industrial fields. Mid-wavelength Infrared image is so blurring and noisy that it is difficult to obtain good detection and recognition results and the de-noising for mid-wavelength Infrared image is extremely important. At present various de-noising methods have been applied and achieved partial results, but the methods all have their own limitations such that the high frequency signal is filtered and the edge of image is more obscure. Unbiased estimation threshold wavelet is used to filter the mid-wavelength Infrared images with intellective predictive threshold and no need to build up the accurate estimation of noise deviation. The simulation results show that this algorithm is superior to traditional filtering denoising methods and obtains high quality filtering images.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"3 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122338231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study of Pseudo-Automorphism Group about the C_n","authors":"Yanzhong Hu, Shan Lin, Huazhong Jin, Hao Li","doi":"10.1109/ITCS.2010.87","DOIUrl":"https://doi.org/10.1109/ITCS.2010.87","url":null,"abstract":"This paper proposes an approach based on graph isomorphism to find the correspondence in relational matching. We describe a pseudo-automorphism group as Pseudo-aut (G) of a graph G, which is a set of all pseudo-automorphisms of G. We discuss some properties of the Pseudo-aut(Cn) and the relationships between various elements, establish the relationship between the pseudo-isomorphic and the perfect matching. From these we reach some important conclusions: the Petersen graph is a special element of the Pseudo-aut(C5); the composition of the Petersen graph is just one of its origins; there exists a Hamiltonian graph of order 12, which is 3-connected, 3-regular, non-planar, non-bipartite, and its girth is 5.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133054935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Realization of Equipment's Archives Management System Based on Struts2 and Hibernate","authors":"Yang Guigui, Cheng Gengguo, Bao Kaomin, Wu Li","doi":"10.1109/ITCS.2010.120","DOIUrl":"https://doi.org/10.1109/ITCS.2010.120","url":null,"abstract":"This paper introduced three excellent web frameworks—Struts2, Hibernate and Site Mesh. It discussed the integration solution of the three frameworks and a method of page display based on Bridge mode, with the help of which we designed and realized the manage system of equipment's archives. The results showed that on one hand, this mode can lower the degree of coupling in layers and improve the development efficiency and shorten the development cycle of Web application; on another hand, the system built by this technique had an excellent maintainability and an expansibility.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124329120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Notice of RetractionThe Study of a Sociality Agent Architecture Based on Role","authors":"Jian Zhang, Guang-zhou Zeng, Zhiyuan Li","doi":"10.1109/ITCS.2010.63","DOIUrl":"https://doi.org/10.1109/ITCS.2010.63","url":null,"abstract":"At present, the research works about sociality agent emphasis on what are social mental status, and use abstract social mental status to establish sociality agent model. These works lack study that mapping sociality agent model to particular architecture, analysis running process of architecture, and prove architecture reasonable. Aim at this problem, based on understanding about human being sociality, from application angle, this paper think that sociality means agent can take on roles, play roles, and locate in some agent organization at all time; give agent role form describe and role model, define a sociality agent architecture based on role (R_SA) using Π calculus. Based on our theoretical analysis about modules interaction in R_SA, the R_SA can maintain architecture stable, and can be used in application area.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"122 1-2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120905316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Key Management for Multicast","authors":"Shuquan Li, Yue Wu","doi":"10.1109/ITCS.2010.82","DOIUrl":"https://doi.org/10.1109/ITCS.2010.82","url":null,"abstract":"With the development of the Internet, Multicast applications are deployed for mainstream use, IP multicasting is critical technology in those applications. The absence of security mechanism has limited the use of multicast. In order to protect communication confidentiality, Traffic in secure multicast is encrypted with a Session Encryption Key which is only to the certificated group members. Key management become essential issue for IP multicast. The aim of key management for multicast is for group members in one multicast session to generate, refresh and transfer keys which are used for encryption and authentication. Issues about scalability, reliability and robustness are important criterias for evaluating key management scheme. In this paper, we analyze problems in key management for multicast and review some typical schemes.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"49 14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121021924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Model of Performance & Achievement of Administrative Organizations Based on Knowledge-sharing","authors":"Sun Pei-shan, Fan Zhi-ping, Sun Xin-bo","doi":"10.1109/ITCS.2010.110","DOIUrl":"https://doi.org/10.1109/ITCS.2010.110","url":null,"abstract":"Firstly, this paper gives the definition of Performance and Achievements of Administrative Organizations (PAAO) and that of Knowledge Sharing. Secondly, it analyzes the problems accruing from China's traditional model of PAAO. Lastly, with the above analysis, it brings forward the improved Knowledge Sharing-based model of PAAO, analyzes the knowledge characteristics of administrative organizations and the mutual influences, and sets forth the important role that Knowledge Sharing plays in improving the model of PAAO.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128801675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}