{"title":"Design of Product Management Module Based on UML in Electronic Commerce","authors":"Xiaoming Han","doi":"10.1109/ICACTE.2008.190","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.190","url":null,"abstract":"The development of network technology has accelerated the fusion between fields and cooperation between enterprises, promoted the profound reform from global industrial economy to global knowledge economy and provided the lasting motive force for the sustainable development of world manufacturing industry. Developing the region-oriented electronic commerce can effectively strengthen the cooperation between enterprises and improve the competitiveness of the whole region. The implementation techniques of product management module include distributed technology, parallel technology and data exchange technology, etc and product management module is a typical management module in electronic commerce platform. This paper gives a detailed discussion of product management module in electronic commerce.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124991592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A-Close+: An Algorithm for Mining Frequent Closed Itemsets","authors":"M. Shekofteh, A. M. Rahmani, M. A. Dezfuli","doi":"10.1109/ICACTE.2008.135","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.135","url":null,"abstract":"Association Rule Mining (ARM) is the most essential technique for data mining that mines hidden associations between data in large databases. The most important function of ARM is to find frequent itemsets. Frequent closed itemsets (FCI) is an important condense representation method for frequent itemsets, and because of its importance in recent years, there have been many algorithms implemented for it. One of the most fundamental algorithms for frequent closed itemset is A-close. In this paper, we optimize this algorithm using both optimized techniques \"reducing pruning time\" and \"reducing database size\", called \"A-close+\"..Results show that the performance cost of our algorithm is considerably less than A-close.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115805056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Region Growing Tree Delineation in Urban Settlements","authors":"Lau Bee Theng, C. A. Ling","doi":"10.1109/ICACTE.2008.140","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.140","url":null,"abstract":"Region growing has been widely used in image segmentation applications. Iovan et al. (2007) has used region growing technique to delineate trees in urban settlements with Quickbird imagery. However, there is a room for improvement in the extraction accuracy. This study attempts to improve the tree crown detections from high resolution satellite imagery with wavelet transform and region growing. We shall discuss how the biorthogonal wavelet transform is utilized in the segmentation first, and then follow by the grass/tree segmentation by region growing. It is proven that accuracy is higher when wavelets are integrated into the segmentation and extraction procedures.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121241101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Story Based Mobile Application for Requirements Engineering Process","authors":"M. Palamalai, R. Ahmad, M. H. Nizam","doi":"10.1109/ICACTE.2008.136","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.136","url":null,"abstract":"Requirements engineers have been eliciting requirements using various techniques, methods and tools. This paper proposes a mobile application tool to facilitate requirements elicitation process supporting story-based technique. Conventional devices and tools used in RE process in order to gather information mostly are deploying desktop computers or notebooks. Owing to their size and less mobility feature, they are usually not brought to the work place of the stakeholders. The advancing capabilities of mobile devices and mobile tools can significantly contribute to the facilitation of RE activities. A \"story based mobile application for requirements engineering process (SMAREP)\" is a mobile based application tool to help requirements engineers and analysts in eliciting, documenting and validating information from stakeholders.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"398 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121260107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Method on Specification and Verification of Component Interaction in Real-Time Reactive Systems","authors":"Yangli Jia, Zhoujun Li, Zhenling Zhang, Shengxian Xie","doi":"10.1109/ICACTE.2008.133","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.133","url":null,"abstract":"We present timed component-interaction automata with cost (TCIAC) to specify and verify component interaction behavior, timing cost and timing constraint information in component-based real-time reactive systems. TCIAC extends the description ability of component interaction automata by binding each action with a time interval and a timing cost value. The timing cost values of sequence and parallel actions can be worked out using a timing cost computing semiring we presented in this paper. TCIAC models of real-time components can be composed together based on the TCIAC composition definition. We discuss the application of TCIAC through a simple railroad crossing control system. We model the system using TCIAC for specifying and verifying the timeliness and other trustworthiness properties of component interaction.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133110308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Watermark Algorithm Research and Simulation Based on Different Frequency Coefficients","authors":"Gengming Zhu, N. Sang, Desheg Xiang, Shaobo Zhang","doi":"10.1109/ICACTE.2008.131","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.131","url":null,"abstract":"The digital watermarking technology fundamentally said that, belongs to the information hiding technology. Watermark algorithm proposed which in view of previous people and Inoue insufficient, proposed one kind is new based on the wavelet low frequency coefficient and the discrete cosine transformation (DCT) the territory intermediate frequency coefficient digital image watermarking algorithm. To this algorithm, (DCT) the territory intermediate frequency coefficient position replacement public watermark algorithm and proposed based on the discrete cosine transformation (DWT) the territory quantification public watermark algorithm has carried on the simulation analysis based on the separate wavelet transformation, finally indicated. After this algorithm although inserts the watermark the image quality to have the drop, has the good visual effect and robustness, can resist very many types the attack.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115687485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Seismic Data De-noising Based on Second Wavelet Transform","authors":"Fu Yan, Zhang Chunqin","doi":"10.1109/ICACTE.2008.118","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.118","url":null,"abstract":"A main task of geophysical exploration is to remove random noises in seismic data processing to improve the signal-to-noise ratio. Recently wavelet theory is applied widely to remove random noises in seismic data processing. A commonly used de-noising method is represented by Donoho. On the basis of Donoho's wavelet threshold de-noising processing method, the paper presents a de-noising method for seismic data based on second wavelet transform. The multi-scale wavelet transform is carried out for seismic data in the method, then second multi-scale wavelet transform is carried out again for wavelet coefficients in scale 1 mainly controlled by noises, zero is set for wavelet coefficient in scale 1 after second wavelet transform and reconstruction of wavelet coefficients in other scales is carried out, finally, the wavelet threshold de-noising processing is carried out for seismic section after above-mentioned processing. The results of theoretical model and practical data processing show that the method presented by the paper can effectively improve processing quality of seismic sections and S/N ratio of seismic data.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114183534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on a Safe and Efficient Payment Model in E-Commerce","authors":"Shao-ping Chen","doi":"10.1109/ICACTE.2008.191","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.191","url":null,"abstract":"Due to Internet¿s explosive and rapid popularity, e-commerce is recognized as a new growth point with the most potential in the future IT industry. E-commerce¿s core issue is the payment. How to make e-commerce operate in a safe and efficient environment is the key of the study. In the paper, a payment model based on the improved SET protocol, and all its software-modules are designed, and its practicality and security are analyzed. The improved SET protocol has optimized the transaction speed, and enhanced the security and applicability of the protocol.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126301964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tranquility and Anxiety in E-Business – A Fuzzy Approach","authors":"B. K. Mohanty","doi":"10.1109/ICACTE.2008.209","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.209","url":null,"abstract":"In this paper a methodology is introduced to rank the products in the e-business system as per customers' choice. The buyers' choices, in general, are in linguistically or fuzzily defined terms. The representation of these terms in the e-business system is a difficult task. Fuzzy number is used here to represent the same. Another behavioral aspect of the customer in the e-business is their inclinations while making a product purchase. This is also assimilated here through fuzzy numbers. The inclinations are taken here as; towards more, towards less and neutral. Very often inclinations and preferences occur along with tranquility and the anxiety in buyers' mind. The implicitly defined tranquility and anxiety are explicated here to make the e-business more customers' focused. This leads to the classification of the products into different preferential hierarchies according to the buyers' choices. The procedure is illustrated through an example.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130141784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Liang Zhi-cong, Chen Ping, Hu Sheng-ming, Bao Liang
{"title":"ACE-Based Design and Implementation of the Network Server in Online Games","authors":"Liang Zhi-cong, Chen Ping, Hu Sheng-ming, Bao Liang","doi":"10.1109/ICACTE.2008.28","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.28","url":null,"abstract":"Designed and implemented the ACE (Adaptive Communication Environment)-based network communication component that implemented the requirements in Online games. The component takes the ACE Proactor Framework as its core Framework, and takes the ACE Task Framework, ACE Streams Framework and ACE asynchronous Acceptor-Connector Framework as its auxiliary Frameworks. Thanks to these Frameworks, it gains various levels of concurrency.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129340315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}