{"title":"Research on 8PSK + STBC + MIMO about High-speed Transmission Scheme in Mobile Communications","authors":"Guangsheng Zhao","doi":"10.1109/ESIAT.2009.144","DOIUrl":"https://doi.org/10.1109/ESIAT.2009.144","url":null,"abstract":"According to BPSK¿STBC and QPSK¿STBC(Space-time block codes) wireless transmission system of two launch antenna and one or two receiving antenna, 8PSK+STBC high-speed wireless transmission system is proposed first in the research, and the transmission scheme is compared and simulated with Monte Carlo simulation from two aspects of noise performance and spectrum efficiency. The research results show that the scheme this paper has existed good noise performance and high spectrum efficiency that various schemes shows. 8PSK transmission scheme is still worth with application in the practice.","PeriodicalId":375180,"journal":{"name":"2009 Second Pacific-Asia Conference on Web Mining and Web-based Application","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125241729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Ding, Zhi-Xiang Li, Xiao-long Chang, Qiang Zhao
{"title":"Differential Electromagnetic Analysis on AES Cryptographic System","authors":"G. Ding, Zhi-Xiang Li, Xiao-long Chang, Qiang Zhao","doi":"10.1109/WMWA.2009.46","DOIUrl":"https://doi.org/10.1109/WMWA.2009.46","url":null,"abstract":"To study vulnerability of Advanced Encryption Standard(AES) against Side Channel Attacks(SCAs), First, the article analyzes the CMOS logical gate's electric current characteristic under the active status, explains data and electromagnetic emissions correlation of ICs¿establishes the electromagnetic information leakage Hamming Weight model. Next, aimed at the AES(128 bits) cryptographic system realized by the P89C668 microcomputer, Differential Electromagnetic Analysis (DEMA) algorithm was described, the choosing of attack point and the computational method were analyzed, an attack experiment was processed by DEMA, thereby obtaining secret key of AES(128 bits). After analyzing the experiment result at the instruction level, we find that the most serious leakage of secret information happens in the MOVX instruction which writes the output of S-box into external RAM. The result shows that EM information leakage exists in CMOS integrated circuit during work. DEMA is an effective attack on AES. It can provide a basis for implementing protective measures in the cryptographic systems.","PeriodicalId":375180,"journal":{"name":"2009 Second Pacific-Asia Conference on Web Mining and Web-based Application","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126139716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dual Digital Watermarking Algorithm for Image Based on Fractional Fourier Transform","authors":"Delong Cui","doi":"10.1109/WMWA.2009.60","DOIUrl":"https://doi.org/10.1109/WMWA.2009.60","url":null,"abstract":"In this paper, a dual digital watermarking embedding and detecting algorithm for image is presented, which uses the robust watermark and fragile watermark embed in the fractional Fourier transform (FRFT) domain of the image, and the watermark position and the transform order are used as the encryption keys. The experiment results show that the embedded watermark is perceptually invisible and robust to various image processing operations. Most importantly, the tampered place can be identified accurately.","PeriodicalId":375180,"journal":{"name":"2009 Second Pacific-Asia Conference on Web Mining and Web-based Application","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116873721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discuss on a Virtual Data on the Web","authors":"Cheng Chuanqing, Chen Xuexian","doi":"10.1109/WMWA.2009.68","DOIUrl":"https://doi.org/10.1109/WMWA.2009.68","url":null,"abstract":"This paper describes the virtual data’s conception and examples and proposes a scheme to integrate these data. Now the information systems grow so fast, this situation lets the communication among systems more complicate. So it will be very difficult to handle the logical business when the old way is used to define the different data and the complex, no- transplantable and humdrum way to handle them. This article summarizes the overall characters of the all complex data, propose a new processing mode ----the flat-form of the virtual data handling. And at last there is an example to show how to do in a factual situation.","PeriodicalId":375180,"journal":{"name":"2009 Second Pacific-Asia Conference on Web Mining and Web-based Application","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130678686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of Hospital Medicine Storage Information System Based on B/S Architecture","authors":"Yan Cao, Yanli Yang, Huamin Wang, Pengyun Zeng","doi":"10.1109/WMWA.2009.45","DOIUrl":"https://doi.org/10.1109/WMWA.2009.45","url":null,"abstract":"Hospital medicine storage information system is an important element of Hospital Information System (HIS). The implementation of hospital medicine storage information system based on B/S architecture is discussed. The main functions and implementation details of the system are presented. Based on Java 2 Platform Enterprise Edition (J2EE), using integrated open source frame, four-level structure is adopted to develop the system. Hereinto, the representation level, control level, and transaction logic level adopt the struts frame that accords with MVC mode, while the persistent data level adopts Hibernate frame. Consequently, it not only makes the system structure clear and maintainable, but also strengthens codes’ readability and reusability greatly.","PeriodicalId":375180,"journal":{"name":"2009 Second Pacific-Asia Conference on Web Mining and Web-based Application","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123313836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Combined Evaluation Method of Suppliers in Manufacturing Enterprise","authors":"Wuling Ren, Ningning Song","doi":"10.1109/WMWA.2009.70","DOIUrl":"https://doi.org/10.1109/WMWA.2009.70","url":null,"abstract":"The selection of supplier is very important in manufacturing enterprise. After analyzing the general approach for this problem, a new solution is proposed for this issue. By this method, the uniformity is increased, comprising to general. This article mainly combines Entropy and AHP through one kind of combination model to evaluate suppliers, realizing mutual compensation of advantages, obtaining more reasonable and scientific evaluating result.","PeriodicalId":375180,"journal":{"name":"2009 Second Pacific-Asia Conference on Web Mining and Web-based Application","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131958830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Information Technology in Enterprise E-Commerce Based on Grey Relational Clustering and Data Mining","authors":"Zhiming Qu","doi":"10.1109/WMWA.2009.20","DOIUrl":"https://doi.org/10.1109/WMWA.2009.20","url":null,"abstract":"Mining the implicit laws of poor information in the database is the important problems which need to be solved presently. Clustering analysis plays very important role in mining the data. The grey trend relation (GTR) clustering involved in the grey trend relation system is a good way to find the poor information in order to find the useful information to make decision, which is also an implement and development in data mining. Combining with the grey trend relation and using the general mathematical system theory, the GTR system model are setup. Through analyzing the data of sale system, it is can be seen that some different commodities in sale increment are similar and there are a few of different classification. Comparing with the real sale records, it is found that the results by the GTR clustering are in keeping with the investigation in the sale system.","PeriodicalId":375180,"journal":{"name":"2009 Second Pacific-Asia Conference on Web Mining and Web-based Application","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130236488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parametric Pivoting Algorithm for Parametric Quadratic Programming Problem","authors":"Yanwu Liu, Zhongzhen Zhang","doi":"10.1109/WMWA.2009.8","DOIUrl":"https://doi.org/10.1109/WMWA.2009.8","url":null,"abstract":"There are many applications related to parametric quadratic programming. The parametric quadratic programming problem causes much more computation than the common quadratic programming problem. We employ the parametric pivoting algorithm to improve the computing efficiency of the parametric quadratic programming problem. The algorithm can decrease calculation to obtain solution of quadratic programming problem by solving a small linear inequality system which is the linear part of the Karush-Kuhn-Tucker (KKT) conditions for the quadratic programming problem and is equivalent to the KKT conditions while maintaining complementarity conditions of the KKT conditions to hold. The key of the algorithm is the deduction of the parametric formula which can obtain the optimal solution of the problem under new value of the parameter more efficiently by making full use of the information of the obtained optimal solution to the problem under former value of the parameter. The parametric formula further decreases the computation of the optimal solutions under different value of parameter.","PeriodicalId":375180,"journal":{"name":"2009 Second Pacific-Asia Conference on Web Mining and Web-based Application","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130985453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Deflection of Strengthening Concrete Beam with Prestressed CFRP Sheets","authors":"Wang Xiangyang, Jiang Shaobo, Zhao Guanghui","doi":"10.1109/WMWA.2009.27","DOIUrl":"https://doi.org/10.1109/WMWA.2009.27","url":null,"abstract":"CFRP sheets have been widely used in strengthening concrete structures as a new material and prestressed CFRP sheets can improve the carrying capacity of beams. This paper researched the affection about the deflection and rigidity of concrete structures after strengthening with prestressed CFRP sheets, and derived related theoretic formulas. It is shown that the prestressed CFRP sheets can not dramatically change the deflection of the structures because the prestressed CFRP sheets are generally thin with small moment of inertia for the structural sections.","PeriodicalId":375180,"journal":{"name":"2009 Second Pacific-Asia Conference on Web Mining and Web-based Application","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127464978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Intellectualized Paper-pulp Measurement Management System","authors":"Zhang Kaisheng, Guo Guofa","doi":"10.1109/WMWA.2009.10","DOIUrl":"https://doi.org/10.1109/WMWA.2009.10","url":null,"abstract":"This paper introduces a method of intellectualized design of paper pulp measurement management system, in which the monolithic microcomputer and the vortex flow-meter, Concentration Meters are used to Automatic measurement, accumulation, and printing as well. Gamma Correction and Resilience transformation is carried in Domestic made concentration meter, which satisfies the measuring accuracy of the overall system. Owing to the simultaneous measuring data as necessary by using Embedded Handset System, this method has greatly facilitated secondary level management.","PeriodicalId":375180,"journal":{"name":"2009 Second Pacific-Asia Conference on Web Mining and Web-based Application","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123600127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}