E-Book, Englisch, Band 34, 260 Seiten
Luo / Qi Applied Computing, Computer Science, and Advanced Communication
1. Auflage 2009
ISBN: 978-3-642-02342-2
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
First International Conference on Future Computer and Communication, FCC 2009, Wuhan, China, June 6-7, 2009. Proceedings
E-Book, Englisch, Band 34, 260 Seiten
Reihe: Communications in Computer and Information Science
ISBN: 978-3-642-02342-2
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
This book constitutes the proceedings of the First International Conference on Future Computer and Communication: Applied Computing, Computer Science, and Advanced Communications, FCC 2009, held in Wuhan, China, in June 2009. The 32 revised full papers presented were carefully reviewed and selected from 110 submissions. The papers deal with agents, knowledge-based technologies, bioinformatics engineering, computer architecture and design, computer networks and security, data mining and database applications, high performance networks and protocols, multimedia and web services, network reliability and QoS, neural networks and intelligent systems, software engineering and agile development, antennas and propagation, information theory and coding, multiple access techniques, optical communications and photonics, RFID and microwave devices, satellite, space and wireless communications, signal and image processing, 3g, 4g mobile communications, communications IC design, instrumentation and control, as well as VLSI design.
Autoren/Hrsg.
Weitere Infos & Material
1;Preface;5
2;Organization;6
3;Table of Contents;8
4;The Model of the Statistical Geography Information System in Grid;11
4.1;Introduction;11
4.2;The Statistical Geography Information System in Grids;12
4.2.1;The Infrastructure of the Statistical Geography Information System in Grids;12
4.2.2;The Ways Solving the Problems;13
4.3;Application Instance and Key Problems;14
4.3.1;Concrete Flow;14
4.3.2;Several Key Problems and Solutions;15
4.4;Conclusion;17
4.5;References;17
5;Line-Scan Camera Control Pavement Detection System Research;18
5.1;Introduction;18
5.2;GPS and SCM Serial Port Communication as Well as Control Realizing Method;19
5.3;SCM Control the Line- Scan Camera in Real-Time;20
5.4;Image Analysis and Comparison;21
5.5;Conclusion;22
5.6;References;22
6;Emergency Command System Based on Satellite Link;24
6.1;Introduction;24
6.2;The Function of Emergency Command System;25
6.3;The System Composition and Operating Principle;26
6.4;System Configuration and the Parameters;28
6.5;System Debugging and Application;28
6.6;Summarize;29
6.7;References;30
7;SLA Monitoring Based on Semantic Web;31
7.1;Introduction;31
7.2;SLA Monitoring Motivations;32
7.3;Construction for the SLA Monitoring Based on Semantic Web;33
7.3.1;Service Requirement Management;33
7.3.2;Ontology Construction Process;33
7.4;SLA Monitoring Process Generation;36
7.5;Conclusion;37
7.6;References;38
8;Research and Application on Bloom Filter;40
8.1;Introduction;40
8.2;Bloom Filter;41
8.3;Simulation Scheme;43
8.4;Test Results and Discussion;44
8.5;Conclusion;44
8.6;References;45
9;Research on the DDS to Generate MSK Signal;46
9.1;Introduction;46
9.2;Principle of MSK Modulation;46
9.3;Principle of Direct Digital Synthesizers;48
9.4;Implement of MSK with AD9852;49
9.5;Conclusion;50
9.6;References;51
10;Establishment and Application of GIS Database in Urban Heritage Conservation;52
10.1;Introduction;52
10.2;Needed Data for Database Establishment;53
10.2.1;Needed Data for Urban Heritage Inventory;53
10.2.2;Needed Data for Urban Visual Management;53
10.2.3;Needed Data for Evaluation of Historical District Renewal;53
10.3;GIS Database for Urban Heritage Conservation;54
10.3.1;GIS Database for Urban Heritage Inventory;54
10.3.2;GIS Database for Urban Visual Management;55
10.3.3;GIS Database for Evaluation of Historical District Renewal;56
10.4;Application of GIS Database;57
10.4.1;Brief History of Case Study Area;57
10.4.2;Case Study;58
10.5;Conclusion;59
10.6;References;59
11;RFID Middleware Design Research;60
11.1;RFID Introduction;60
11.1.1;RFID Technology;60
11.1.2;RFID Tag;61
11.1.3;RFID Middleware;61
11.2;RFID Middleware Design;62
11.2.1;Filtering and Aggregation;62
11.2.2;Messaging;64
11.2.3;Reading from and Writing to a Tag;64
11.2.4;Reader Integration in IT-Service Management;65
11.3;RFIDStack;65
11.4;Conclusion;66
11.5;References;66
12;RFID Applications of Consumer Perceptions and Privacy Concerns;67
12.1;Introduction;67
12.2;Consumer Survey Results;68
12.3;RFID and Consumer Privacy;69
12.4;Database Security Issues;71
12.5;References;71
13;RFID Application of Addressing Consumer Privacy Challenges;74
13.1;Introduction;74
13.2;Addressing Consumer Privacy Challenges: Best Practices and Principles;75
13.3;Existing Industry Practices and Standards;75
13.4;Regulatory Approaches;77
13.5;Technological Approaches;78
13.6;References;79
14;New Interleaving and Forward Error Correction Strategies for Streaming;82
14.1;Introduction;82
14.2;Sender Based Repair;83
14.3;Forward Error Correction Technique;84
14.4;FEC Redundancy Control;84
14.5;Interleaving;85
14.6;Interleaving and FEC;86
14.7;Adaptive Model Based Burst Loss;88
14.8;Conclusion;90
14.9;References;90
15;Adjusting Forward Error Correction for Media Streaming;92
15.1;Introduction;92
15.2;Fectechique;93
15.3;Fec Performance Metrics;94
15.4;Interleaving;95
15.5;Proposed Protocol;98
15.6;Simulation Experiments;98
15.7;Conclusion;100
15.8;References;101
16;AR RAAM: A Reliable Routing Algorithim Using Ant Agents for Manets;102
16.1;Introduction;102
16.2;Proposed Algorithm;104
16.3;Experimental Results;106
16.4;References;106
17;Traffic Video Based Cross Road Violation Detection and Peccant Vehicle Tracking;110
17.1;Introduction;110
17.2;Mixture of Gaussian Background Model;111
17.3;Lane Line Detection Based on Hough Transformation;112
17.4;Vehicle Detection Based on Background-Frame BDWT and Cross Road Violation Detection;113
17.4.1;Background-Frame BDWT;113
17.4.2;Cross Road Violation Detection;114
17.5;Mean-Shift Tracking the Peccant Vehicle;114
17.6;System Frame and Experimental Results;116
17.7;Conclusions;117
17.8;References;117
18;An Anomaly Detection Immune Model Inspired by the Mechanism of DC- T Cell Interaction;119
18.1;Introduction;119
18.2;Related Work;120
18.2.1;Previous Work;120
18.2.2;The Mechanism of DC-T Cell Interaction in Danger Theory;121
18.3;An Anomaly Detection Immune Model;122
18.3.1;The Anomaly Detection Immune Model Overview;122
18.3.2;DC Functional Module;123
18.3.3;T Cell Functional Module;124
18.4;Conclusion;125
18.5;References;126
19;Design and Realization of Encoding Module for UHF RFID Based on FPGA;127
19.1;Introduction;127
19.2;ISO18000-6C Standard;128
19.3;The Principle and Realization of PIE Coding;128
19.3.1;The Principle of Digital Communication;128
19.3.2;PIE Coding Principle;129
19.3.3;The Realization of PIE Encoding Circuit;129
19.4;The Effect of Design;130
19.5;Conclusions;131
19.6;References;131
20;FPGA-Based CMOS Image Acquisition System;132
20.1;Introduction;132
20.2;The Structure Performance and Working Principium of CMOS Image Sensor;132
20.3;The Structure of System Design;133
20.4;Operating Principle and Implementation of System Modules;133
20.4.1;Implementation of CMOS Image Acquisition;133
20.4.2;The Module of VGA;135
20.5;The Results of This Design;135
20.6;Conclusions;136
20.7;References;136
21;Parallel Implementation of A5/2 Algorithm;138
21.1;Introduction;138
21.2;The Introduction of A5/2 Algorithm;139
21.3;The Parallel Realization of A5/2 Algorithm;140
21.3.1;The Parallel Realization of the Initialization;140
21.3.2;The Parallel Realization of Clock Controlling Stream Generation;141
21.3.3;The Parallel Realization of Clock Controlled Stream Generation;142
21.3.4;The Parallel Realization of Key Stream Generation;143
21.4;Analysis and Comparison of Performance;144
21.4.1;Analysis of Performance;144
21.4.2;Comparison of Performance;144
21.5;Conclusion;145
21.6;References;145
22;The Study of Model for Portfolio Investment Based on Ant Colony Algorithm;146
22.1;Introduction;146
22.2;Multi Objective Decision-Making Model of Portfolio Investment;146
22.3;Ant Colony Algorithm;148
22.4;Computation Example;149
22.5;Conclusion;150
22.6;References;150
23;Design of Embedded Network Interface Controller Based on ARM9 and ARMLinux;152
23.1;Introduction;152
23.2;Operating Principle of Embedded Network Interface Controller;153
23.2.1;Hardware Platform of Embedded Network Interface Controller;153
23.2.2;Selection of Embedded Operating System;154
23.3;Realizing Conversion between Ethernet Data and Serial Port Data;155
23.3.1;The Development Environment and Network Programming of Application Programs;155
23.3.2;Software Design;155
23.4;Application Examples of Embedded Network Interface Controller;158
23.5;Summary;159
23.6;References;159
24;The Design of Body Welding Line Base on the Virtual Manufacturing and Assembling Environment;160
24.1;Introduction;160
24.2;The Virtual Design System in Body Welding Line and Key Technology of Design;161
24.2.1;Welding Line Process Modeling;161
24.2.2;Welding Line Process Simulation;162
24.2.3;Welding Line Process Design;163
24.3;Examples of Designed Operation;163
24.4;The Design Feature of Body Welding Line Base on the Virtual Manufacturing and Assembling Environment;164
24.4.1;Effective Utilization of the Existing Designs and Resources Is the Core of Welding Line Design Base on the Virtual Manufacturing and Assembling Environment;164
24.4.2;Full Utilization of the Advanced Computer Technique Is the Means of Welding Line Design Base on the Virtual Manufacturing and Assembling Environment;165
24.4.3;Flexible Design Is the Trend of Development of Welding Line Design Base on the Virtual Manufacturing and Assembling Environment;165
24.4.4;Combination Design Is the Model of Welding Line Design Base on the Virtual Manufacturing and Assembling Environment;165
24.4.5;The Optimal Selection of Outsourced Manufacturing Enterprise Should Be Considered Simultaneously in the Course of Welding Line Design;165
24.5;Conclusion;166
24.6;References;166
25;Modeling Economic Spatial Contact among Cities with the Intensity and Structure Model of Urban Flow;167
25.1;Introduction;167
25.2;Database and Methodology;168
25.2.1;Database;168
25.2.2;Methodology;168
25.3;Result and Analysis;170
25.3.1;Intensity and Direction;170
25.3.2;Structure Difference;171
25.4;Discussion and Conclusion;172
25.5;References;172
26;Development of USB Device Driver in WinCE.Net;174
26.1;Introduction;174
26.2;USB Host Software Architecture in WinCE.Net;174
26.3;Development of USB Device Driver in WinCE.Net;175
26.3.1;Required Entrypoints for USB Device Driver;175
26.3.2;Stream Interface Driver;177
26.3.3;USB Device Driver Load Process;178
26.3.4;USB Device Driver Unload Process;180
26.4;Conclusion;180
26.5;References;180
27;Time-Varying Weighting Techniques for Airborne Bistatic Radar Clutter Suppression;181
27.1;Introduction;181
27.2;STAP and Bistatic Clutter;182
27.2.1;Bistatic STAP;182
27.2.2;Nonstationary Bistatic Clutter;182
27.3;Time-Varying Weighting Techniques;185
27.3.1;Derivative-Based Updating Algorithm (DBU);185
27.3.2;Nonlinearly Time-Varying Weighting Algorithm (NTVW);186
27.4;Simulation Results;187
27.5;Summary;188
27.6;References;188
28;Factor Analysis of Competencies of Software Project Managers in China;189
28.1;Introduction;189
28.2;Research;190
28.3;Data Analysis and Results;193
28.4;Conclusion;195
28.5;References;196
29;Radio Propagation Characteristics for Short Range Body-Centric Wireless Communications;197
29.1;Introduction;197
29.2;Radio Propagation with the Presence of Human Body;198
29.3;Shadowing Effect of Human Body;199
29.4;Conclusion;201
29.5;References;201
30;A New Efficient Multiple Messages Signcryption Scheme with Public Verifiability;203
30.1;Introduction;203
30.2;Preliminaries;204
30.3;Proposed Signcryption Scheme;205
30.3.1;Setup Phase;205
30.3.2;Key Generation Phase;205
30.3.3;Multiple Keys Generation Phase;206
30.3.4;Signcryption Phase;207
30.3.5;Unsigncryption Phase;207
30.3.6;Non-repudiation and Public Verification Phase;208
30.4;Analysis of the Proposed Scheme;208
30.4.1;Security;208
30.4.2;Efficiency;209
30.5;Conclusions;210
30.6;References;210
31;Research and Implementation of Reconfigurable Multiplier over Galois Field Targeted at Stream Cipher;211
31.1;Introduction;211
31.2;Applications Analysis;212
31.3;Design of the Reconfigurable Galois Field Multiplier;213
31.3.1;Introduction of Composite Field Multiplier;213
31.3.2;The Theory of Conversion of Basis;214
31.3.3;Design of the Reconfigurable Galois Field Multiplier;215
31.4;Performance and Analysis;216
31.4.1;Performance of This Design;216
31.4.2;Compare with Other Designs;217
31.5;Conclusion;218
31.6;References;218
32;Research of Grey Relation Theory Algorithm for Customer Classification of Manufacturing Enterprise;220
32.1;Introduction;220
32.2;Evaluation Index System for Customer ClassificationManagement;221
32.3;Model and Method of Customer Classification Grey Relation Evaluation;223
32.4;Case Study;224
32.5;Conclusions;226
32.6;References;226
33;General Structural Model and Application of Intelligent Decision Support System Based on Knowledge Discovery;228
33.1;Introduction;228
33.2;Structure and Limitation of Traditional Decision Support System;229
33.3;New Type Intelligent Decision Support System Based on Knowledge Discovery (IDSSKD);230
33.3.1;Theoretical Foundation of IDSSKD;230
33.3.2;Overall Structural Model of IDSSKD;231
33.3.3;The Core Components of IDSSKD;231
33.3.4;Main Modules of IDSSKD;231
33.4;Application of IDSSKD;233
33.5;Conclusions;234
33.6;References;235
34;Application of Improved GA in System of Public Vehicle Dispatching;236
34.1;Introduction;236
34.2;Related Works;237
34.3;The Establishment and Analysis of Public Vehicle Dispatching Model;238
34.3.1;Dispatching Principle Analysis;238
34.3.2;Time of Vehicle Arriving;239
34.3.3;Time of Passengers Waiting;239
34.4;Optimize of Public Vehicle Dispatching Model;240
34.4.1;The Analysis of Public Vehicle Company Model;240
34.4.2;The Analysis of Passenger Optimize Model;240
34.5;Application of Improved GA in $^F1_min$ and $^F2_min$;241
34.6;Results and Discussion;243
34.7;Conclusion and Future Work;243
34.8;References;244
35;Design and Implementation of Chat Room Based on UDP;245
35.1;Introduction;245
35.2;The Basic Principles of Socket;246
35.2.1;The Definition of Socket;246
35.2.2;Two Types of Operation of Socket;246
35.3;The Mechanism of Chat Room;247
35.3.1;The Part of Server;247
35.3.2;The Part of Server;248
35.4;The Final Effect of Design;249
35.5;Conclusion;249
35.6;References;249
36;Emotion Recognition in Modern Distant Education System by Using Neural Networks and SVM;250
36.1;Introduction;250
36.2;Affective Computing;252
36.3;Speech Emotion Recognition Based on Neural Networks;254
36.4;Facial Emotion Recognition Based on SVM;255
36.5;Conclusion;257
36.6;References;257
37;Author Index;258




