2009 2nd IEEE International Conference on Computer Science and Information Technology最新文献

筛选
英文 中文
A flexible process model facilitated enactment 灵活的流程模型促进了制定
2009 2nd IEEE International Conference on Computer Science and Information Technology Pub Date : 2009-09-11 DOI: 10.1109/ICCSIT.2009.5234589
Weigang Li, Chunyan Ma, Junsheng Wu
{"title":"A flexible process model facilitated enactment","authors":"Weigang Li, Chunyan Ma, Junsheng Wu","doi":"10.1109/ICCSIT.2009.5234589","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234589","url":null,"abstract":"Control flow modeling in workflow systems commonly focuses on describing the semantics of routing relationship between activities. It constructs process routing structures by composing various kinds of split nodes and join nodes. But this approach isn't appropriate for workflow engine to execute and results in the complication of realization of the workflow engine. To accord with the nature of control flow, we investigate the control and respondence relation between process and activities firstly, then the routing relationship between activities directly. A control flow modeling approach based on ECA rules is proposed, which can model the dynamic behaviors of workflow by allowing the process and activity respond the events sent from inside and outside the workflow system. Moreover, complicated routing semantics are modeled by links and control points. With this approach, the executing mechanism of control flow is unified. It simplifies the realization of workflow engine.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117151603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation of temperature measurement system for grain storage based on ZigBee technology 基于ZigBee技术的粮库温度测量系统仿真
2009 2nd IEEE International Conference on Computer Science and Information Technology Pub Date : 2009-09-11 DOI: 10.1109/ICCSIT.2009.5234864
Fenghui Zhang, Huiling Zhou, Xiaoguang Zhou, Q. Liao
{"title":"Simulation of temperature measurement system for grain storage based on ZigBee technology","authors":"Fenghui Zhang, Huiling Zhou, Xiaoguang Zhou, Q. Liao","doi":"10.1109/ICCSIT.2009.5234864","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234864","url":null,"abstract":"Nowadays, the applications of WSNs are many and varied, and the applications in agriculture are still incipient. In this paper, we explore the feasibility of ZigBee technology for the measurement system in large-scale barns. According to traditional grain-temperature monitoring system and theory on attenuation of radio frequencies in grain, we propose the grain-temperature monitoring system using ZigBee technology. To evaluate the feasibility and the challenges of develop this system, some simulating experiments were designed. The results show that with the right selection of parameters it is an alternative solution to grain-temperature monitoring system using ZigBee technology and some future work also need to be done to optimize this system.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116341486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
TBRA: A scalable routing algorithm in highly mobile large scale pure ad hoc wireless mesh networks TBRA:高移动大规模纯自组织无线网状网络中的可扩展路由算法
2009 2nd IEEE International Conference on Computer Science and Information Technology Pub Date : 2009-09-11 DOI: 10.1109/ICCSIT.2009.5234827
Wei Ren, Yi Ren, Hui Zhang
{"title":"TBRA: A scalable routing algorithm in highly mobile large scale pure ad hoc wireless mesh networks","authors":"Wei Ren, Yi Ren, Hui Zhang","doi":"10.1109/ICCSIT.2009.5234827","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234827","url":null,"abstract":"In highly mobile pure ad-hoc wireless mesh networks, fast rerouting within low routing discovery delay is a mandatory requirement for routing algorithm to support interactive applications such as VoIP. Also, the communication overhead should be thwarted when networks grow to a large scale. We propose a Tree-Based Routing Algorithm - TBRA to facilitate such two goals. On one hand, TBRA has very low routing discovery delay due to its proactive property. On the other hand, TBRA performs more efficiently than other proactive protocols with respect to low communication overhead, which thanks to its short routing packet length, less numbers and smaller routing table size. Our modeling analysis and simulation results verify that routing setup delay of TBRA grows only linear to hop counts (scalable to node's speed) and communication overhead increases only linear to the number of nodes.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116472389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The design and realization of the management system based on SaaS in the small and medium building material enterprise 基于SaaS的中小型建材企业管理系统的设计与实现
2009 2nd IEEE International Conference on Computer Science and Information Technology Pub Date : 2009-09-11 DOI: 10.1109/ICCSIT.2009.5234404
M. Li, Wu Dan
{"title":"The design and realization of the management system based on SaaS in the small and medium building material enterprise","authors":"M. Li, Wu Dan","doi":"10.1109/ICCSIT.2009.5234404","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234404","url":null,"abstract":"Informatization construction in the small and medium building material enterprise in China has been pressing for the moment. However, due to the restrictions of financing, human resources, technology and so forth, the achievement of informatization has none the less many difficulties. The managing concept of “software as a service” (the mode of SaaS) has been used to design and realize the management system in such enterprise. In this paper, the author takes up with the following aspects in exploding and actualizing the management system based on SaaS: First of all, the overall designing of the management system make software to cover the core areas in management including the stocking, the vendition and the stockpile. Secondly, the application of the designing concept based on the shared database realizes the share of multi-users and make sure of the uniqueness, the integrality and the security for their information. Finally, the last question discusses how to maintain an effective assistant system for the service provider in order to provide the efficient and timely technological assistants other than reducing the cost.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123408797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Behaviors of bandwidth theft in Xunlei 迅雷网络的带宽盗窃行为
2009 2nd IEEE International Conference on Computer Science and Information Technology Pub Date : 2009-09-11 DOI: 10.1109/ICCSIT.2009.5235020
Min Zhang, Changjia Chen, N. Brownlee
{"title":"Behaviors of bandwidth theft in Xunlei","authors":"Min Zhang, Changjia Chen, N. Brownlee","doi":"10.1109/ICCSIT.2009.5235020","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5235020","url":null,"abstract":"As one of the most popular applications in China, Xunlei's excellent performance attracts us to pay more attentions to its system mechanism. The issue of bandwidth theft in Xunlei is one of our focuses. Although its proprietary nature and its use of data encryption hinder our studies of Xunlei to some extent, we analyze and evaluate behaviors of bandwidth theft in Xunlei based on our measurements. We not only observe the existence of bandwidth theft in Xunlei, but also find that it can deliver a large fraction of data using in-line links. In our further evaluation, we affirm the capability of Xunlei in integrating resources within a web site. Instead of condemning, we consider that the partial bandwidth theft in Xunlei can help us utilize Internet resources efficiently. Xunlei's partial bandwidth theft also inspired us to propose a business driven resource integration platform for making a good use of the whole Internet.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122081073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IT initiatives in education ‘A case study for J&K State’ 教育中的信息技术倡议:查谟克什米尔邦的案例研究
2009 2nd IEEE International Conference on Computer Science and Information Technology Pub Date : 2009-09-11 DOI: 10.1109/ICCSIT.2009.5234382
V. Mansotra, Vinod Sharma, G.S. Sambyal
{"title":"IT initiatives in education ‘A case study for J&K State’","authors":"V. Mansotra, Vinod Sharma, G.S. Sambyal","doi":"10.1109/ICCSIT.2009.5234382","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234382","url":null,"abstract":"Education is one of the most debatable topics in all over the world and so it should be. With limited time and limited resources the nation's future and its people depend on the efficiency of schools, colleges and universities. The world is undergoing a revolution in ICT that has tremendous implications for the current and future social and economic situation of all countries of the world. The application and use of ICTs, have tremendous potential for improvements in every sector including education. J&K State in India have a literacy rate much below the national average of 64.8%. People residing in hilly and rural areas of J & K state are not benefited especially in the field of education. A growing number of teachers are now beginning to realise the potential of ICT and all schools and teachers should be aware of what can now be achieved. In this context the authors made an attempt to study the existing scenario of education sector of the state particularly the use of technological tools in teaching learning process. For this purpose, a questionnaire was designed for getting feedback from the students with an objective to supplement the information already collected by having a visit to each school. The data so collected was analysed separately for government schools as well for public and private schools. The analysis carried out shows certain drastic differences in these different categories of schools.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117084387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Using parallel partitioning strategy to create diversity for ensemble learning 采用并行分块策略为集成学习创造多样性
2009 2nd IEEE International Conference on Computer Science and Information Technology Pub Date : 2009-09-11 DOI: 10.1109/ICCSIT.2009.5234490
Yi-Min Wen, Yaonan Wang, Wen-Hua Liu
{"title":"Using parallel partitioning strategy to create diversity for ensemble learning","authors":"Yi-Min Wen, Yaonan Wang, Wen-Hua Liu","doi":"10.1109/ICCSIT.2009.5234490","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234490","url":null,"abstract":"Divide-and-conquer principle is a fashionable strategy to handle large-scale classification problems. However, many works have revealed that generalization ability is decreased by partitioning training set in most cases, because partitioning training set can lead to losing classification information. Aiming to handle this problem, an ensemble learning algorithm was proposed. It used many sets of parallel hyperplanes to partition training set on which each base classifier was trained by the SVM modular network algorithm and all these base classifiers were combined by majority voting strategy when testing. The experimental results on 4 classification problems illustrate that ensemble learning can effectively reduce the descent of generalization ability for the reason of increasing classifier's diversity.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117197198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An event interaction structure for GUI test case generation 生成GUI测试用例的事件交互结构
2009 2nd IEEE International Conference on Computer Science and Information Technology Pub Date : 2009-09-11 DOI: 10.1109/ICCSIT.2009.5234773
Siyou Qian, Fan Jiang
{"title":"An event interaction structure for GUI test case generation","authors":"Siyou Qian, Fan Jiang","doi":"10.1109/ICCSIT.2009.5234773","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234773","url":null,"abstract":"Graphical User Interface (GUI) has become an important part of current software. But it is difficult for conventional test methods to test GUI due to the large number of states and the complexity among the events interaction. This paper presents an event interaction structure to model GUI and an algorithm to generate GUI interactive test cases. In this structure, the interaction relationships among events focus on the sharing variables or data or exchange messages of the event-handlers. Then the GUI interactive test cases are generated by analyzing the reading or writing operations of events or sending and receiving messages between events. Experiment shows that, under the condition of assuring event-based coverage rate, the number of effective GUI interactive test cases generated by our method is about 10 percent of the number of test cases generated by permutation and combination method.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123920572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Study of smart card technology and probe user awareness about it: A case study of Middle Eastern students 智能卡技术研究及用户对智能卡的认知:以中东学生为例
2009 2nd IEEE International Conference on Computer Science and Information Technology Pub Date : 2009-09-11 DOI: 10.1109/ICCSIT.2009.5234410
Hamed Taherdoost, M. Zamani, M. Namayandeh
{"title":"Study of smart card technology and probe user awareness about it: A case study of Middle Eastern students","authors":"Hamed Taherdoost, M. Zamani, M. Namayandeh","doi":"10.1109/ICCSIT.2009.5234410","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234410","url":null,"abstract":"Right now, in most of the countries, inside the people's wallet, they probably have a couple of credit cards, an identification card, automatic machine teller cards (ATM card), and maybe a few other plastic cards. Without realizing it, these plastic cards have become a very important part of their life. Although smart card technology improves security and convenient but it is not used in a wide range in Middle East countries. User acceptance is vital for further development of any fresh technology and smart card technology as well. One of the factors that can effect on the acceptance of smart card technology is users' awareness. The goal of this study is to present a general overview of smart card technology and identify the smart card's benefits, features and characteristics and moreover, the level of users' knowledge and awareness about smart card technology will be evaluated. In order to achieve this goal, a survey was conducted among the international students of University Technology Malaysia to measure their awareness of smart card technology.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124055673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Optimal identification method of nonlinear system based on GA-GHNNs P 基于GA-GHNNs P的非线性系统最优辨识方法
2009 2nd IEEE International Conference on Computer Science and Information Technology Pub Date : 2009-09-11 DOI: 10.1109/ICCSIT.2009.5234495
Lin Xiao-fei, Weng Mu-yun
{"title":"Optimal identification method of nonlinear system based on GA-GHNNs P","authors":"Lin Xiao-fei, Weng Mu-yun","doi":"10.1109/ICCSIT.2009.5234495","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234495","url":null,"abstract":"Gaussian-Hopfield neural network algorithm (GHNNs) is the most commonly used method of solving the identification problem of nonlinear systems, but learning rule (LMS rule) is easy to fall into local optimum. Genetic algorithm (GA) has globally optimal ability and can solve the locally optimal problem well. This paper puts forward GA-GHNNs algorithm and uses GA algorithm to solve the optimum parameters of GHNNs network. And finally, it carries out simulation experiments to prove the validity of the algorithm. Simulation results also show that this method has the ability to distinguish nonlinear systems.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124470858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信