By Topic

2009 ETP International Conference on Future Computer and Communication

6-7 June 2009

Filter Results

Displaying Results 1 - 25 of 87
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (3430 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (27 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (187 KB)
    Freely Available from IEEE
  • Message from the Conference Chairs

    Publication Year: 2009, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (89 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2009, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (84 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009
    Request permission for commercial reuse | PDF file iconPDF (75 KB)
    Freely Available from IEEE
  • The Research on Reverse Mortgage Based on the Fluctuation of Housing Prices

    Publication Year: 2009, Page(s):3 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (310 KB) | HTML iconHTML

    The reverse mortgage is an important financing instrument which introduced housing finance or housing mortgage loan, it will effectively solve the problem of scarce resources for the aged; however, many problems occurred when brought into effect. One of the most critical problems is pricing. Since the pricing of Reverse Mortgage is such a complex problem, the paper would focus on the fluctuation o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stock Yield Forecast Based on LS-SVM in Bayesian Inference

    Publication Year: 2009, Page(s):8 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB) | HTML iconHTML

    Stock yield forecast has been an important issue and difficult task for both shareholders and financial professionals. In this paper, we introduce least square support vector machine (LS-SVM), an improved algorithm that regresses faster than standard SVM, and the parameters of model proposed are gained in the three levels of Bayesian inference. The work of this paper is as following: First, foreca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research and Implementation of Data Transfer in Grid

    Publication Year: 2009, Page(s):12 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (305 KB) | HTML iconHTML

    Grid is essential for data-intensive application which involves great data transfer among different storage systems. One fundamental service that could be applied to any grid for reliable, high performance data transmission is discussed. Based upon standard FTP protocol, Grid FTP could be extended to the third-party control data transfer, striped data transfer and parallel data transfer. So a Grid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Design of an Automatic Evaluation System of Search Engine

    Publication Year: 2009, Page(s):16 - 18
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    At present, the search engine is getting more and more important. The frequency of use is getting higher and higher. In order to help users to choose a highly effective search engine, C# is used as a development tool. It researches and implements an automatic evaluation system of search engine which is accurate, highly effective, highly automatic, safe. The structure of the system is simple. It ha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Text Clustering Algorithm Based on Improved K_means

    Publication Year: 2009, Page(s):19 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (358 KB) | HTML iconHTML

    Text clustering is one of the difficult and hot research fields in the Internet search engine research. Using and improving K-means clustering techniques, a new text clustering algorithm is presented. Firstly, texts are preprocessed to satisfy succeed process. Secondly, the paper improves the gravity centers calculation method and algorithm flow of K-means cluster algorithm to improve efficiency a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Human Pose Tracking Algorithm Based on Skeleton-Texture Model

    Publication Year: 2009, Page(s):23 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (364 KB) | HTML iconHTML

    In order to achieve good tracking results in single camera environment, the human pose of recognition, based on a skeleton and texture model of video algorithms to identify the body is proposed. Single-camera in the background and complexity of the environment, the target audience can only show 2-D information. The algorithm will be the first skeleton to the human body in accordance with the balan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Eutrophication Assessment of Nansi Lake, China through Remote Sensing Technology

    Publication Year: 2009, Page(s):28 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB) | HTML iconHTML

    This research investigated the distribution of eutrophication degree in Nansi Lake using remote sensing data. Nine sampling points were monitored with Chla, TP and TN three parameters in upper lake of Nansi Lake. TSI of each sampling points was calculated using Carlsonpsilas TSIM. Then the linear model between remote sensing data and TSIM of each field monitoring points in upper lake of Nansi Lake... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of Escaped Criminals' Information Comparison System and Its Realization Based on Oracle

    Publication Year: 2009, Page(s):32 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    For the sake of practical application, a management system of escapees' information query and automatic comparison is designed and even realized by adopting reasonable scheduled technology: separation table, data dictionary and data types of Oracle, which makes the escaperspsila information get managed comprehensively and used efficiently. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ultra Wideband Cognitive Network Objective Issues

    Publication Year: 2009, Page(s):35 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (353 KB) | HTML iconHTML

    Ultra WideBand (UWB) is highly competent in satisfying many basic requirements of cognitive radio. Therefore, employing UWB in cognitive radio networks could be very instrumental for the successful penetration of cognitive radio into the wireless world. However, besides being a strong candidate for practical cognitive radio implementation, UWB can be considered as a supplement to cognitive radio s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rule of Vibration of Drill String in Deep Wells by ANSYS

    Publication Year: 2009, Page(s):39 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (318 KB) | HTML iconHTML

    With the exploitation of oil and gas underground, the engineering has developed toward the direction of deep well, even super deep well, the problem of fatigue of drill string has a great effect to drilling engineering. Resonance is one of the main reasons that induces drill string fatigue. In this paper drill string of deep well is object being studied. The models about axial vibration, lateral v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Study and Application on Rule of Drill String Axial Vibration with Delphi

    Publication Year: 2009, Page(s):43 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (335 KB) | HTML iconHTML

    Drill string vibration is a very prevalent phenomena, it does great effect to drilling engineering, drill string resonance is the main reason that causes the drill string fatigue. In this paper the drill string is object that is studied, the axial vibration is analyzed for the total system of drill string. The model of axial vibration is established, the rule about axial vibration of drill string ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent Searching System Based on Manufacturing Resource Personalized Service

    Publication Year: 2009, Page(s):47 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB) | HTML iconHTML

    Currently, the traditional search techniques canpsilat meet peoplepsilas demand. Along with constantly improving the precision and recall ratio of search engine, the demand of personalized service becomes particularly outstanding. Intelligent search system of network manufacturing resource is a focused search engine which orients to network manufacturing resource. Meanwhile, the system includes pe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation on the Safety of Chemical Industrial Parks Based on Membership Degree Transformation New Algorithm

    Publication Year: 2009, Page(s):52 - 57
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (401 KB) | HTML iconHTML

    The core of fuzzy evaluation on the safety of chemical industrial park is membership degree transformation. But the transformation methods should be questioned, because redundant data in index membership degree is also used to compute object membership degree, which is not useful for object classification. The new algorithm is: using data mining technology based on entropy to mine knowledge inform... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Next-Generation Storage Networks Based Optical Technology

    Publication Year: 2009, Page(s):58 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (621 KB) | HTML iconHTML

    Data storage plays an essential role in todaypsilas fast-growing data-intensive network services. New standards and products emerge very rapidly for networked data storage. It should be very obvious that there is no single optimal design for all the different kinds of optical networks that can be applied to cover all requirements, as well as handle all applications. iSCSI is one of the most recent... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Short Message Security Protocol for Home Network

    Publication Year: 2009, Page(s):62 - 65
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB) | HTML iconHTML

    The family information technology has caught the attention of various industries such as IT, home appliances, communication, and real estate. Based on the home network theories, this paper describes a remote control system via Internet and GSM SMS, which controls smart home network in wired access mode and wireless communication mode, respectively. Although SMS is widely used for a variety of appl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Research on Integrated Model to Provide QoS Guarantee

    Publication Year: 2009, Page(s):66 - 68
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (323 KB) | HTML iconHTML

    In this document several popular solutions on QoS are showed and itspsila advantage and disadvantage is analyzed. At last integrating the advantage of these solution a new QoS model is brought forward, which integrates MPLS traffic engineering, DiffServ and IntServ Simulations about this model are done, result is indicated, it can improve networkpsilas QoS clearly. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Research on Terminal QoS Control Mechanism for H.264 Video Stream

    Publication Year: 2009, Page(s):69 - 71
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB) | HTML iconHTML

    In this paper it designs a new streaming media transmission system which is guarantee of QoS and suitable for the transmission of real-time multimedia data (H.264 format). This transmitting system includes network conditions judge algorithm and the adaptive control algorithm for network transmission. This transmission system judges the situation of the network by calculating the data packet loss r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.