{"title":"Study and Application of Embedded Teaching Method in Data Warehouse Course","authors":"Lin Jing","doi":"10.1109/IFITA.2010.146","DOIUrl":"https://doi.org/10.1109/IFITA.2010.146","url":null,"abstract":"Data warehouse course is a discipline that includes many subjects. There are theoretical teaching and practical teaching in this course. This paper introduces a new teaching method that is called an embedded teaching method. This method is applied to the data warehouse course successfully. Firstly, the ideas of this method are presented. Some associative knowledge in other courses is integrated to the data warehouse course. So teachers impart a whole knowledge structure and system to students in theory and practice. Then specific teaching steps are shown with examples. In the end of the paper, advantages of this teaching method are summarized.","PeriodicalId":393802,"journal":{"name":"2010 International Forum on Information Technology and Applications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121835861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Development of Meteorological Information Inquiry System Based on BREW","authors":"He Zonggang, Teng Ying-yan, Dou Qiao","doi":"10.1109/IFITA.2010.47","DOIUrl":"https://doi.org/10.1109/IFITA.2010.47","url":null,"abstract":"The paper aims at the research of network interface, document interface, such as control, mobile phone key event, capturing and processing changes in the state of network in the process of accessing the network based on the BREW platform for mobile phones, as well as the meteorological information system which is developed by Microsoft Visual C++ 6.0. The main function of the system is to read the city's geographical location and its corresponding information from resources file and text file, to visit the meteorology website, to read real-time meteorological information of selected cities from the Web site, as well as to show to the screen after filtering and formatting such meteorological information to ensure mobile phone users conveniently getting access to meteorological information.","PeriodicalId":393802,"journal":{"name":"2010 International Forum on Information Technology and Applications","volume":"05 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129775387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application Layer Anomaly Detection Based on HSMM","authors":"Xie Bailin, Yu Shunzheng, Wang Tao","doi":"10.1109/IFITA.2010.145","DOIUrl":"https://doi.org/10.1109/IFITA.2010.145","url":null,"abstract":"Today more and more network-based attacks occur at application layer. Observed from the network layer and transport layer, these attacks may not contain significant malicious activities, and generate abnormal network traffic. However, traditional security techniques usually detect attacks from those two layers. Although some security techniques can detect some application layer attacks, these techniques can only detect some known attacks, and these techniques can’t detect the unknown or novel attacks happened on application layer. In theory, application layer anomaly detection can detect the unknown and novel attacks happened on application layer, so the research of application layer anomaly detection is very important. This paper presents a new application layer anomaly detection method which based on HSMM. The experimental results show that this method has high detection accuracy and low false positive ratio.","PeriodicalId":393802,"journal":{"name":"2010 International Forum on Information Technology and Applications","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128581378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Frequency Domain Seismic Blind Deconvolution Based on ICA","authors":"Gao Wei, Huaishan Liu","doi":"10.1109/IFITA.2010.121","DOIUrl":"https://doi.org/10.1109/IFITA.2010.121","url":null,"abstract":"Independent components ansalysis (ICA) is combined with shot time Fourier transform(STFT) to improve the traditional frequency domain seismic deconvolution in this paper. Neglecting noise, the seismic record is changed from time domain to frequency domain with STFT in order to transform the common seismic model to the basic ICA model. By applying FastICA algorithm, reflectivity series and the seismic wavelet can be produced in frequency domain and changed back to the time domain subsequently. The model and real seismic data numerical examples all show the algorithm valid. The advantage of this new method is to inverse blindly the wavelet and the reflectivity effectively with no assumption of Guassality and whiten noise to reflectivity, and no assumption of minimum phase to seismic wavelet. The algorithm refered here propose a new way of seismic deconvolution and worth doing more researches.","PeriodicalId":393802,"journal":{"name":"2010 International Forum on Information Technology and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129895275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Commercial Banks Exceptional Client Distinguish Based on Data Mining","authors":"Yunfeng Liu, Xiaohui Wang, Dongsheng Zhai","doi":"10.1109/IFITA.2010.337","DOIUrl":"https://doi.org/10.1109/IFITA.2010.337","url":null,"abstract":"The commercial banks need identify exceptional client in their large number of customers to prevent abnormal customer’s risk. In this paper, four types of abnormal data detection method is introduced, present a new method - the k-medoids clustering algorithm combining genetic algorithm to detect the outlier. Finally, apply the algorithm to analysis credit data sets, detect outlier and identify abnormal customer","PeriodicalId":393802,"journal":{"name":"2010 International Forum on Information Technology and Applications","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129190888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Overview of Incremental Hash Function Based on Pair Block Chaining","authors":"Su Yunling, Miao Xianghua","doi":"10.1109/IFITA.2010.332","DOIUrl":"https://doi.org/10.1109/IFITA.2010.332","url":null,"abstract":"Hash function plays an important role in the area of information security. It is widely used to provide data integrity, message authentication, digital signature and password protection. Since incremental hash function was proposed in 1994, it has gained much attention for its property. It is high-speed to compute hash value of updated message according to previous hash value instead of re-computing it from scratch as tranditional hash function. it posseses not only efficiency but also security problems. There are a lot of scheme about it. At present, XOR Scheme and PCIHF Scheme are two typical incremental hash function based on pair block chaining. This article provides an overview of incremental hash function based on pair block chaing, namely the research on theory, efficiency, security and appliction.","PeriodicalId":393802,"journal":{"name":"2010 International Forum on Information Technology and Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129206056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of Fuzzy Comprehensive Evaluation Model for Displacement Efficiency of Cementing","authors":"Xu Bihua, Li Jian, Liang Dachuan, Yang Changxue","doi":"10.1109/IFITA.2010.243","DOIUrl":"https://doi.org/10.1109/IFITA.2010.243","url":null,"abstract":"The quality of cementing directly impacts on oil or gas well lifespan and production capacity of well. The direct reason of bad quality of cementing is inefficient displacement efficiency. Factors which are affecting the efficiency of displacement efficiency including: the middle situation of cases, displacement fluid status, contact time, drilling fluid properties, isolating fluid status. One theory of fuzzy mathematic—fuzzy comprehensive evaluation methodology and Model M (•, +) have been applied to built fuzzy comprehensive evaluation model of cementing displacement efficiency within this paper. That can comprehensively appraisal the factors which impact displacement efficiency, therefore, achieve the evaluation for cementing quality.","PeriodicalId":393802,"journal":{"name":"2010 International Forum on Information Technology and Applications","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123804109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Open Medical Information to Reduce Excessive Treatment in China","authors":"W. Zhigang","doi":"10.1109/IFITA.2010.259","DOIUrl":"https://doi.org/10.1109/IFITA.2010.259","url":null,"abstract":"The reasones for excessive treatment in China are asymmetric information, lackness of demand elesticity, commission of medicine and the lackness of supervision. To solve the problem, one practical way is to open medical information. When medical informaiton is opened, the degree of excessive treatment can be kept at a relatively low level.","PeriodicalId":393802,"journal":{"name":"2010 International Forum on Information Technology and Applications","volume":"410 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123864011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimum Power Allocation for Maximizing the Capacity both with Nonzero Mean and Covariance at the Transmitters","authors":"Jin Libiao, Zhang Naiqian, Lin Jianzeng","doi":"10.1109/IFITA.2010.22","DOIUrl":"https://doi.org/10.1109/IFITA.2010.22","url":null,"abstract":"The performance of MIMO systems may be improved significantly by using some set of channel knowledge at the transmitter. However, accurate instantaneous channel knowledge at the transmitter is costly and may be difficult to acquire. When the receiver side has the perfect channel state information, the capacity can be found with the transmit covariance which involves to find the optimum transmit directions and the optimum power allocation polices. Most recent work has been done on the MIMO capcity with channel side information, channel mean or channel covariance. But sometimes the trasmitter can get the channel mean and channel voariance simultaneously. this paper will study the optimum power allocation for maximizing the MIMO capcity both with the channel mean and channel covariance. It was shown that this policy can improve system performance compared with the only channel mean or channel covariance.","PeriodicalId":393802,"journal":{"name":"2010 International Forum on Information Technology and Applications","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123891438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cluster-Based Algorithm for Energy-Efficient Routing in Wireless Sensor Networks","authors":"Lejiang Guo, Weijiang Wang, Jian Cui, L. Gao","doi":"10.1109/IFITA.2010.137","DOIUrl":"https://doi.org/10.1109/IFITA.2010.137","url":null,"abstract":"Energy-efficient routing is a critical problem in multihop wireless networks due to the severe power constraint of wireless nodes, the research on routing algorithm is pivotal in the architecture of wireless sensor networks. This paper analyzes the implementation and existing issues in LEACH. Specifically for node energy and the network lifetime, it proposes an energy-efficient routing algorithm based on cycle-switching cluster head. It improves node energy efficiency, balances energy consumption of all sensor nodes, enhances reliability of data transmission and postpones network lifetime in comparison to LEACH. Simulation results showed that the algorithm is efficient. Moreover, the protocol increases the balance of energy dissipation, scalability and reliability of WSN.","PeriodicalId":393802,"journal":{"name":"2010 International Forum on Information Technology and Applications","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123938266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}