2010 International Forum on Information Technology and Applications最新文献

筛选
英文 中文
Study and Application of Embedded Teaching Method in Data Warehouse Course 嵌入式教学法在数据仓库课程中的研究与应用
2010 International Forum on Information Technology and Applications Pub Date : 2010-07-16 DOI: 10.1109/IFITA.2010.146
Lin Jing
{"title":"Study and Application of Embedded Teaching Method in Data Warehouse Course","authors":"Lin Jing","doi":"10.1109/IFITA.2010.146","DOIUrl":"https://doi.org/10.1109/IFITA.2010.146","url":null,"abstract":"Data warehouse course is a discipline that includes many subjects. There are theoretical teaching and practical teaching in this course. This paper introduces a new teaching method that is called an embedded teaching method. This method is applied to the data warehouse course successfully. Firstly, the ideas of this method are presented. Some associative knowledge in other courses is integrated to the data warehouse course. So teachers impart a whole knowledge structure and system to students in theory and practice. Then specific teaching steps are shown with examples. In the end of the paper, advantages of this teaching method are summarized.","PeriodicalId":393802,"journal":{"name":"2010 International Forum on Information Technology and Applications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121835861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Development of Meteorological Information Inquiry System Based on BREW 基于BREW的气象信息查询系统的设计与开发
2010 International Forum on Information Technology and Applications Pub Date : 2010-07-16 DOI: 10.1109/IFITA.2010.47
He Zonggang, Teng Ying-yan, Dou Qiao
{"title":"Design and Development of Meteorological Information Inquiry System Based on BREW","authors":"He Zonggang, Teng Ying-yan, Dou Qiao","doi":"10.1109/IFITA.2010.47","DOIUrl":"https://doi.org/10.1109/IFITA.2010.47","url":null,"abstract":"The paper aims at the research of network interface, document interface, such as control, mobile phone key event, capturing and processing changes in the state of network in the process of accessing the network based on the BREW platform for mobile phones, as well as the meteorological information system which is developed by Microsoft Visual C++ 6.0. The main function of the system is to read the city's geographical location and its corresponding information from resources file and text file, to visit the meteorology website, to read real-time meteorological information of selected cities from the Web site, as well as to show to the screen after filtering and formatting such meteorological information to ensure mobile phone users conveniently getting access to meteorological information.","PeriodicalId":393802,"journal":{"name":"2010 International Forum on Information Technology and Applications","volume":"05 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129775387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application Layer Anomaly Detection Based on HSMM 基于HSMM的应用层异常检测
2010 International Forum on Information Technology and Applications Pub Date : 2010-07-16 DOI: 10.1109/IFITA.2010.145
Xie Bailin, Yu Shunzheng, Wang Tao
{"title":"Application Layer Anomaly Detection Based on HSMM","authors":"Xie Bailin, Yu Shunzheng, Wang Tao","doi":"10.1109/IFITA.2010.145","DOIUrl":"https://doi.org/10.1109/IFITA.2010.145","url":null,"abstract":"Today more and more network-based attacks occur at application layer. Observed from the network layer and transport layer, these attacks may not contain significant malicious activities, and generate abnormal network traffic. However, traditional security techniques usually detect attacks from those two layers. Although some security techniques can detect some application layer attacks, these techniques can only detect some known attacks, and these techniques can’t detect the unknown or novel attacks happened on application layer. In theory, application layer anomaly detection can detect the unknown and novel attacks happened on application layer, so the research of application layer anomaly detection is very important. This paper presents a new application layer anomaly detection method which based on HSMM. The experimental results show that this method has high detection accuracy and low false positive ratio.","PeriodicalId":393802,"journal":{"name":"2010 International Forum on Information Technology and Applications","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128581378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Frequency Domain Seismic Blind Deconvolution Based on ICA 基于ICA的频域地震盲反褶积
2010 International Forum on Information Technology and Applications Pub Date : 2010-07-16 DOI: 10.1109/IFITA.2010.121
Gao Wei, Huaishan Liu
{"title":"Frequency Domain Seismic Blind Deconvolution Based on ICA","authors":"Gao Wei, Huaishan Liu","doi":"10.1109/IFITA.2010.121","DOIUrl":"https://doi.org/10.1109/IFITA.2010.121","url":null,"abstract":"Independent components ansalysis (ICA) is combined with shot time Fourier transform(STFT) to improve the traditional frequency domain seismic deconvolution in this paper. Neglecting noise, the seismic record is changed from time domain to frequency domain with STFT in order to transform the common seismic model to the basic ICA model. By applying FastICA algorithm, reflectivity series and the seismic wavelet can be produced in frequency domain and changed back to the time domain subsequently. The model and real seismic data numerical examples all show the algorithm valid. The advantage of this new method is to inverse blindly the wavelet and the reflectivity effectively with no assumption of Guassality and whiten noise to reflectivity, and no assumption of minimum phase to seismic wavelet. The algorithm refered here propose a new way of seismic deconvolution and worth doing more researches.","PeriodicalId":393802,"journal":{"name":"2010 International Forum on Information Technology and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129895275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Commercial Banks Exceptional Client Distinguish Based on Data Mining 基于数据挖掘的商业银行特殊客户识别
2010 International Forum on Information Technology and Applications Pub Date : 2010-07-16 DOI: 10.1109/IFITA.2010.337
Yunfeng Liu, Xiaohui Wang, Dongsheng Zhai
{"title":"Commercial Banks Exceptional Client Distinguish Based on Data Mining","authors":"Yunfeng Liu, Xiaohui Wang, Dongsheng Zhai","doi":"10.1109/IFITA.2010.337","DOIUrl":"https://doi.org/10.1109/IFITA.2010.337","url":null,"abstract":"The commercial banks need identify exceptional client in their large number of customers to prevent abnormal customer’s risk. In this paper, four types of abnormal data detection method is introduced, present a new method - the k-medoids clustering algorithm combining genetic algorithm to detect the outlier. Finally, apply the algorithm to analysis credit data sets, detect outlier and identify abnormal customer","PeriodicalId":393802,"journal":{"name":"2010 International Forum on Information Technology and Applications","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129190888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Overview of Incremental Hash Function Based on Pair Block Chaining 基于对块链的增量哈希函数综述
2010 International Forum on Information Technology and Applications Pub Date : 2010-07-16 DOI: 10.1109/IFITA.2010.332
Su Yunling, Miao Xianghua
{"title":"An Overview of Incremental Hash Function Based on Pair Block Chaining","authors":"Su Yunling, Miao Xianghua","doi":"10.1109/IFITA.2010.332","DOIUrl":"https://doi.org/10.1109/IFITA.2010.332","url":null,"abstract":"Hash function plays an important role in the area of information security. It is widely used to provide data integrity, message authentication, digital signature and password protection. Since incremental hash function was proposed in 1994, it has gained much attention for its property. It is high-speed to compute hash value of updated message according to previous hash value instead of re-computing it from scratch as tranditional hash function. it posseses not only efficiency but also security problems. There are a lot of scheme about it. At present, XOR Scheme and PCIHF Scheme are two typical incremental hash function based on pair block chaining. This article provides an overview of incremental hash function based on pair block chaing, namely the research on theory, efficiency, security and appliction.","PeriodicalId":393802,"journal":{"name":"2010 International Forum on Information Technology and Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129206056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Research of Fuzzy Comprehensive Evaluation Model for Displacement Efficiency of Cementing 固井驱替效率模糊综合评价模型研究
2010 International Forum on Information Technology and Applications Pub Date : 2010-07-16 DOI: 10.1109/IFITA.2010.243
Xu Bihua, Li Jian, Liang Dachuan, Yang Changxue
{"title":"Research of Fuzzy Comprehensive Evaluation Model for Displacement Efficiency of Cementing","authors":"Xu Bihua, Li Jian, Liang Dachuan, Yang Changxue","doi":"10.1109/IFITA.2010.243","DOIUrl":"https://doi.org/10.1109/IFITA.2010.243","url":null,"abstract":"The quality of cementing directly impacts on oil or gas well lifespan and production capacity of well. The direct reason of bad quality of cementing is inefficient displacement efficiency. Factors which are affecting the efficiency of displacement efficiency including: the middle situation of cases, displacement fluid status, contact time, drilling fluid properties, isolating fluid status. One theory of fuzzy mathematic—fuzzy comprehensive evaluation methodology and Model M (•, +) have been applied to built fuzzy comprehensive evaluation model of cementing displacement efficiency within this paper. That can comprehensively appraisal the factors which impact displacement efficiency, therefore, achieve the evaluation for cementing quality.","PeriodicalId":393802,"journal":{"name":"2010 International Forum on Information Technology and Applications","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123804109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Open Medical Information to Reduce Excessive Treatment in China 开放医疗信息减少中国的过度治疗
2010 International Forum on Information Technology and Applications Pub Date : 2010-07-16 DOI: 10.1109/IFITA.2010.259
W. Zhigang
{"title":"Open Medical Information to Reduce Excessive Treatment in China","authors":"W. Zhigang","doi":"10.1109/IFITA.2010.259","DOIUrl":"https://doi.org/10.1109/IFITA.2010.259","url":null,"abstract":"The reasones for excessive treatment in China are asymmetric information, lackness of demand elesticity, commission of medicine and the lackness of supervision. To solve the problem, one practical way is to open medical information. When medical informaiton is opened, the degree of excessive treatment can be kept at a relatively low level.","PeriodicalId":393802,"journal":{"name":"2010 International Forum on Information Technology and Applications","volume":"410 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123864011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimum Power Allocation for Maximizing the Capacity both with Nonzero Mean and Covariance at the Transmitters 以非零均值和协方差最大化发射机容量的最优功率分配
2010 International Forum on Information Technology and Applications Pub Date : 2010-07-16 DOI: 10.1109/IFITA.2010.22
Jin Libiao, Zhang Naiqian, Lin Jianzeng
{"title":"Optimum Power Allocation for Maximizing the Capacity both with Nonzero Mean and Covariance at the Transmitters","authors":"Jin Libiao, Zhang Naiqian, Lin Jianzeng","doi":"10.1109/IFITA.2010.22","DOIUrl":"https://doi.org/10.1109/IFITA.2010.22","url":null,"abstract":"The performance of MIMO systems may be improved significantly by using some set of channel knowledge at the transmitter. However, accurate instantaneous channel knowledge at the transmitter is costly and may be difficult to acquire. When the receiver side has the perfect channel state information, the capacity can be found with the transmit covariance which involves to find the optimum transmit directions and the optimum power allocation polices. Most recent work has been done on the MIMO capcity with channel side information, channel mean or channel covariance. But sometimes the trasmitter can get the channel mean and channel voariance simultaneously. this paper will study the optimum power allocation for maximizing the MIMO capcity both with the channel mean and channel covariance. It was shown that this policy can improve system performance compared with the only channel mean or channel covariance.","PeriodicalId":393802,"journal":{"name":"2010 International Forum on Information Technology and Applications","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123891438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Cluster-Based Algorithm for Energy-Efficient Routing in Wireless Sensor Networks 基于聚类的无线传感器网络节能路由算法
2010 International Forum on Information Technology and Applications Pub Date : 2010-07-16 DOI: 10.1109/IFITA.2010.137
Lejiang Guo, Weijiang Wang, Jian Cui, L. Gao
{"title":"A Cluster-Based Algorithm for Energy-Efficient Routing in Wireless Sensor Networks","authors":"Lejiang Guo, Weijiang Wang, Jian Cui, L. Gao","doi":"10.1109/IFITA.2010.137","DOIUrl":"https://doi.org/10.1109/IFITA.2010.137","url":null,"abstract":"Energy-efficient routing is a critical problem in multihop wireless networks due to the severe power constraint of wireless nodes, the research on routing algorithm is pivotal in the architecture of wireless sensor networks. This paper analyzes the implementation and existing issues in LEACH. Specifically for node energy and the network lifetime, it proposes an energy-efficient routing algorithm based on cycle-switching cluster head. It improves node energy efficiency, balances energy consumption of all sensor nodes, enhances reliability of data transmission and postpones network lifetime in comparison to LEACH. Simulation results showed that the algorithm is efficient. Moreover, the protocol increases the balance of energy dissipation, scalability and reliability of WSN.","PeriodicalId":393802,"journal":{"name":"2010 International Forum on Information Technology and Applications","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123938266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信