{"title":"Design and implementation of college cadre evaluation system","authors":"Xuehua Song, Xiang Bao, Wenyun Wu, Hesheng Wu","doi":"10.1109/PACCS.2010.5627049","DOIUrl":"https://doi.org/10.1109/PACCS.2010.5627049","url":null,"abstract":"Working quality evaluation of college cadre is an important part of teaching quality assurance system in college. College cadre evaluation system (CCES) is a necessary method to realize modernization of college. Evaluation System designed in this paper is convenient, efficient and adaptive. This paper discusses the design principle, the overall structure and the function of the system, which is based on ASP.NET 2.0, ADO.NET and SQL Server 2005. It has flexible evaluation range management, evaluation criteria management and data processing function, and solves the drawbacks of traditional evaluation methods effectively. The test shows that this system has achieved good results, and it is helpful for improving the efficiency and fairness of working quality evaluation.","PeriodicalId":431294,"journal":{"name":"2010 Second Pacific-Asia Conference on Circuits, Communications and System","volume":"519 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116255398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless campus network security situation and solutions","authors":"Yong Yu, Qun Wang, Yan Jiang","doi":"10.1109/PACCS.2010.5626678","DOIUrl":"https://doi.org/10.1109/PACCS.2010.5626678","url":null,"abstract":"With the rapid development of wireless technology, WLAN technology is gradually integrate and replace the LAN technology, which has played an important role in promoting the development of campus information technology, will be an important component in campus network. Build a stable, safe, efficient, convenient wireless campus network has become the inevitable trend of development and construction of campus network. This paper describes the main advantages of WLAN, analyses the current major problems, studies the existing security measures, proposed a viewpoint from access control, authority distribution, content filtering, data encryption, user management, log auditing and several other Security aspects ,expected to provide some help with the construction of Digital Campus Network.","PeriodicalId":431294,"journal":{"name":"2010 Second Pacific-Asia Conference on Circuits, Communications and System","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116385085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"802.1x relay: A new model for authentication of nat-enabled router","authors":"Weilin Xu, Guangli Xu, Hua Zhang","doi":"10.1109/PACCS.2010.5626810","DOIUrl":"https://doi.org/10.1109/PACCS.2010.5626810","url":null,"abstract":"A broadband router with the Network Address Translation (NAT) technology is popular in the private networks. The compatibility with various access authentication mechanisms of public network is a key issue for achieving interconnects between public network and private network. This paper presents a compatible method for the broadband router to support various 802.1x authentication mechanisms. Adopting this method, the broadband router can be authenticated and authorized without a complex program in various authentication scenarios.","PeriodicalId":431294,"journal":{"name":"2010 Second Pacific-Asia Conference on Circuits, Communications and System","volume":"19 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120836304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scheduling algorithms in Wireless Mesh Networks: A review","authors":"M. Ghazvini, N. Movahedinia, K. Jamshidi","doi":"10.1109/PACCS.2010.5627027","DOIUrl":"https://doi.org/10.1109/PACCS.2010.5627027","url":null,"abstract":"Wireless Mesh Network (WMN) is considered to be an effective solution to support multimedia services in last miles due to their automatic configuration and low cost deployment. The main feature of WMNs is multi-hope communications which may result in increased region coverage, better robustness and more capacity. Implemented on limited radio range wireless media, WMNs bring about many challenges such as fading alleviation, effective media access control, efficient routing, quality of service provisioning, call admission control and scheduling. In this paper main concepts of scheduling in mesh networks are introduced and its basic techniques in WMNs are reviewed.","PeriodicalId":431294,"journal":{"name":"2010 Second Pacific-Asia Conference on Circuits, Communications and System","volume":"258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125797254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Notice of RetractionResearch on China's ERP project management and effective implementation","authors":"Daojin Fan, Xiaomin Yan","doi":"10.1109/PACCS.2010.5626591","DOIUrl":"https://doi.org/10.1109/PACCS.2010.5626591","url":null,"abstract":"Project management of the ERP project involves planning, organizing, coordinating and monitoring external and taken the continuing work program. Project management is implemented to attain the project's expected accomplishments and objectives. Good project management has a very important role in the effective implementation of ERP. In this paper, it explains the connotation of EPP project management, analysis of the effective implementation approach of ERP project management, pointed out the key points of ERP project management effective implementation. This research has some theoretical and practical value..","PeriodicalId":431294,"journal":{"name":"2010 Second Pacific-Asia Conference on Circuits, Communications and System","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125981555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of Mapping XML DTD to Relational Schema","authors":"Liu Huiling, Ye Feng","doi":"10.1109/PACCS.2010.5627006","DOIUrl":"https://doi.org/10.1109/PACCS.2010.5627006","url":null,"abstract":"This paper firstly analyzes elements, attributes and operators of XML DTD, then provides the methods of simplifing XML DTD and discusses of the rules and steps of Mapping XML DTD to Relational Schema. These rules not only achieve mapping elements and attributes in XML DTD to tables and fields of relational database, but also build linkage tables between some sub-element and its parent element, between some attributes and their respective elements, so effectively maintain semantic constraints in relational schemas which are from XML DTD. Finally, this paper gives an example of XML DTD and the mapping relational schema to prove the validity of the mapping rules.","PeriodicalId":431294,"journal":{"name":"2010 Second Pacific-Asia Conference on Circuits, Communications and System","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128362806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An ant optimization method for path planning on a cuboid","authors":"Huali Xu, Shoubao Su, Yang Yang","doi":"10.1109/PACCS.2010.5626607","DOIUrl":"https://doi.org/10.1109/PACCS.2010.5626607","url":null,"abstract":"Path planning on the surfaces of a cuboid is widespread in engineering applications. It has been employed in many areas, such as network routing, the emergency rescuing upon high-rise buildings, wall-climbing robots picking and placing on a box-shaped objects, a large scale cleaning on roofs or walls, as well as painting for furniture. There are three types, including 21 cases, of the distances between city pairs on the surface of a cuboid. Thus, the calculating the minimum distance methods are introduced in this paper by expanding and flipping the alternative faces of the cuboid. And then a new ant colony optimization-based method to solve the travelling salesman problems on the surfaces of a cuboid is presented and is tested on several TSPLIB benchmarks and some random point sets. Experimental results show that the proposed method is feasible and effective.","PeriodicalId":431294,"journal":{"name":"2010 Second Pacific-Asia Conference on Circuits, Communications and System","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128602095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Laterally driven tunable capacitors fabricated by a surface micromachining process for RF circuits","authors":"Qingquan Liu","doi":"10.1109/PACCS.2010.5626961","DOIUrl":"https://doi.org/10.1109/PACCS.2010.5626961","url":null,"abstract":"A laterally driven micro machined tunable capacitor is proposed. As an alternative to the traditional designs using two electrodes, three electrodes are used so that the series resistance could be reduced. This design also offers opportunities in the circuit design, since the DC-bias voltage is not applied on the two ports. To achieve the capacitance on the order of 0.4 pF, the electrodes are periodically arranged to form three groups of arrays. Thermal actuator arrays are employed to drive the movable electrodes. In order to simplify the design and fabrication, a structure using two layers to build the electrodes is provided, where the capacitance varies from 0.05 pF to 0.13 pF. This two-layer capacitor has been fabricated using a polysilicon surface micro machining process potentially compatible with CMOS process.","PeriodicalId":431294,"journal":{"name":"2010 Second Pacific-Asia Conference on Circuits, Communications and System","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128634579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on patent information retrieval based on ontology and its application","authors":"Zhai Dongsheng, Chen Lei, Wang Liqing","doi":"10.1109/PACCS.2010.5627065","DOIUrl":"https://doi.org/10.1109/PACCS.2010.5627065","url":null,"abstract":"In the economic environment of the world at present, the competition among the enterprises is the competition of the knowledge right. Because the patent is the most concentrated carrier of the knowledge, the efficiency of patent retrieval and utilization is an important way of the enterprises to understand their competitors, track the developed trend of the industrial technique and improve the independent innovation capability and core competitiveness of their own. But at present patent information retrieval systems based on the keyword match can't satisfy the users' demands on accuracy and completeness. So, this paper proposes to establish patent domain ontology, and expand the query based on it to realize semantic retrieval and improve the comprehensiveness and accuracy of the patent information retrieval.","PeriodicalId":431294,"journal":{"name":"2010 Second Pacific-Asia Conference on Circuits, Communications and System","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128636101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The fault-tolerant design and fault injection test for embedded software","authors":"Wang Ping","doi":"10.1109/PACCS.2010.5626979","DOIUrl":"https://doi.org/10.1109/PACCS.2010.5626979","url":null,"abstract":"The paper introduces the fault-tolerant technique of chuangxin-1 micro-satellite on-board computer. A fault injection test system is built to verify the fault-tolerant function. The test system is made up of monitor computer, Trace32 ICE, monitor instrument for output, and fault injection instrument. The test case is employed to verify the behavior of fault-tolerance and judge the validity of fault-tolerant design of hardware and software, and it includes typically test case name, test content, instrument and device, test method, verification method, expectation result, actual result, etc. The result shows that the fault injection test system can verify the fault-tolerant design well.","PeriodicalId":431294,"journal":{"name":"2010 Second Pacific-Asia Conference on Circuits, Communications and System","volume":" 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132040498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}