By Topic

Future Computer and Communication, 2009. FCC '09. International Conference on

Date 6-7 June 2009

Filter Results

Displaying Results 1 - 25 of 87
  • [Front cover]

    Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (3430 KB)  
    Freely Available from IEEE
  • [Title page i]

    Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (27 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (83 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (111 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): v - ix
    Save to Project icon | Request Permissions | PDF file iconPDF (187 KB)  
    Freely Available from IEEE
  • Message from the Conference Chairs

    Page(s): x
    Save to Project icon | Request Permissions | PDF file iconPDF (89 KB)  
    Freely Available from IEEE
  • Organizing Committee

    Page(s): xi
    Save to Project icon | Request Permissions | PDF file iconPDF (84 KB)  
    Freely Available from IEEE
  • list-reviewer

    Save to Project icon | Request Permissions | PDF file iconPDF (75 KB)  
    Freely Available from IEEE
  • The Research on Reverse Mortgage Based on the Fluctuation of Housing Prices

    Page(s): 3 - 7
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (310 KB) |  | HTML iconHTML  

    The reverse mortgage is an important financing instrument which introduced housing finance or housing mortgage loan, it will effectively solve the problem of scarce resources for the aged; however, many problems occurred when brought into effect. One of the most critical problems is pricing. Since the pricing of Reverse Mortgage is such a complex problem, the paper would focus on the fluctuation of housing prices. Based on the researches, the paper aims to raise the problems calling for special attention in actuarial Reverse Mortgage pricing and in further, to propose suggestions and steps in practice. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stock Yield Forecast Based on LS-SVM in Bayesian Inference

    Page(s): 8 - 11
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (392 KB) |  | HTML iconHTML  

    Stock yield forecast has been an important issue and difficult task for both shareholders and financial professionals. In this paper, we introduce least square support vector machine (LS-SVM), an improved algorithm that regresses faster than standard SVM, and the parameters of model proposed are gained in the three levels of Bayesian inference. The work of this paper is as following: First, forecast daily stock Yield of Shanghai Security Exchanges of China using back propagation neural network (BPNN) and LS-SVM. Secondly, forecast the stock yield using LS-SVM in Bayesian framework. Finally, make a comparative analysis of the three algorithms. We reached conclusion that, in terms of forecast accuracy, LS-SVM outperforms BPNN, and when LS-SVM in Bayesian inference, the best result is achieved. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research and Implementation of Data Transfer in Grid

    Page(s): 12 - 15
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (305 KB) |  | HTML iconHTML  

    Grid is essential for data-intensive application which involves great data transfer among different storage systems. One fundamental service that could be applied to any grid for reliable, high performance data transmission is discussed. Based upon standard FTP protocol, Grid FTP could be extended to the third-party control data transfer, striped data transfer and parallel data transfer. So a Grid FTP service is developed upon Linux based Globus Toolkit 4 platform. According to the structure and process of the third-party control data transfer, a graphic interface is designed by Java CoG Kit to provide reliable and high-performance data transfer under grid environment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Design of an Automatic Evaluation System of Search Engine

    Page(s): 16 - 18
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (289 KB) |  | HTML iconHTML  

    At present, the search engine is getting more and more important. The frequency of use is getting higher and higher. In order to help users to choose a highly effective search engine, C# is used as a development tool. It researches and implements an automatic evaluation system of search engine which is accurate, highly effective, highly automatic, safe. The structure of the system is simple. It has four modules. Its functions are powerful. It can implement evaluation to search engines on the Web. It has the good promotion and application value. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Text Clustering Algorithm Based on Improved K_means

    Page(s): 19 - 22
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (358 KB) |  | HTML iconHTML  

    Text clustering is one of the difficult and hot research fields in the Internet search engine research. Using and improving K-means clustering techniques, a new text clustering algorithm is presented. Firstly, texts are preprocessed to satisfy succeed process. Secondly, the paper improves the gravity centers calculation method and algorithm flow of K-means cluster algorithm to improve efficiency and stability of original K_means algorithm. The experimental results indicate that the improved algorithm has a higher accuracy compared with the original algorithm, and has a better stability. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Human Pose Tracking Algorithm Based on Skeleton-Texture Model

    Page(s): 23 - 27
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (364 KB)  

    In order to achieve good tracking results in single camera environment, the human pose of recognition, based on a skeleton and texture model of video algorithms to identify the body is proposed. Single-camera in the background and complexity of the environment, the target audience can only show 2-D information. The algorithm will be the first skeleton to the human body in accordance with the balance weighted tree modeling approach, combined with the skin texture characteristics of the skeleton structure, texture model. Particle filter used for detection and tracking human body. Experiments show that the skeleton model and texture of video algorithms to identify the body with a high recognition rate and robustness, and can do real-time interaction. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Eutrophication Assessment of Nansi Lake, China through Remote Sensing Technology

    Page(s): 28 - 31
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (404 KB) |  | HTML iconHTML  

    This research investigated the distribution of eutrophication degree in Nansi Lake using remote sensing data. Nine sampling points were monitored with Chla, TP and TN three parameters in upper lake of Nansi Lake. TSI of each sampling points was calculated using Carlsonpsilas TSIM. Then the linear model between remote sensing data and TSIM of each field monitoring points in upper lake of Nansi Lake was built. The distribution of eutrophic state in upper lake of Nansi Lake was inversed, and the eutrophication was also assessed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of Escaped Criminals' Information Comparison System and Its Realization Based on Oracle

    Page(s): 32 - 34
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (289 KB) |  | HTML iconHTML  

    For the sake of practical application, a management system of escapees' information query and automatic comparison is designed and even realized by adopting reasonable scheduled technology: separation table, data dictionary and data types of Oracle, which makes the escaperspsila information get managed comprehensively and used efficiently. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ultra Wideband Cognitive Network Objective Issues

    Page(s): 35 - 38
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (353 KB) |  | HTML iconHTML  

    Ultra WideBand (UWB) is highly competent in satisfying many basic requirements of cognitive radio. Therefore, employing UWB in cognitive radio networks could be very instrumental for the successful penetration of cognitive radio into the wireless world. However, besides being a strong candidate for practical cognitive radio implementation, UWB can be considered as a supplement to cognitive radio systems that are realized by means of other wireless technologies. Therefore, it can be concluded that this way or the other, UWB will be an inseparable part of cognitive radio applications. UWB can offer various kinds of support to cognitive radio network. These include sharing the spectrum sensing information via UWB, locating the cognitive nodes in a cognitive network by means of IR-UWB, and sensing the physical environment/ channel with IR-Radar. In this paper,various cognitive UWB networks related issues including these supplementary uses of UWB will be discussed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rule of Vibration of Drill String in Deep Wells by ANSYS

    Page(s): 39 - 42
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (318 KB) |  | HTML iconHTML  

    With the exploitation of oil and gas underground, the engineering has developed toward the direction of deep well, even super deep well, the problem of fatigue of drill string has a great effect to drilling engineering. Resonance is one of the main reasons that induces drill string fatigue. In this paper drill string of deep well is object being studied. The models about axial vibration, lateral vibration and torsional vibration are set up. Modal vibrations of drill string are studied. Rules of all sorts of nature frequency are obtained by drilling instance, and analysis about vector plot of nodes is obtained. This paper proves theory bases for optimizing drill tool of deep well and drilling parameter and reducing drill string failure. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Study and Application on Rule of Drill String Axial Vibration with Delphi

    Page(s): 43 - 46
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (335 KB) |  | HTML iconHTML  

    Drill string vibration is a very prevalent phenomena, it does great effect to drilling engineering, drill string resonance is the main reason that causes the drill string fatigue. In this paper the drill string is object that is studied, the axial vibration is analyzed for the total system of drill string. The model of axial vibration is established, the rule about axial vibration of drill string is obtained, the nature frequency of axial vibration is found out by Delphi. Then, the rule can be used in the oil field for the drilling worker, the rule can provide reliable theory for decreasing drill fatigue and optimizing drilling parameter. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent Searching System Based on Manufacturing Resource Personalized Service

    Page(s): 47 - 51
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (460 KB) |  | HTML iconHTML  

    Currently, the traditional search techniques canpsilat meet peoplepsilas demand. Along with constantly improving the precision and recall ratio of search engine, the demand of personalized service becomes particularly outstanding. Intelligent search system of network manufacturing resource is a focused search engine which orients to network manufacturing resource. Meanwhile, the system includes personalized service to improve the intelligent level of search. In this article, considering the characteristics of network manufacturing resource environment, the author studies the personalized service model of retrieval system based on manufacturing resource, designs the architecture of the system, and scrutinizes the key techniques and core algorithms of the system. Lastly, the article shows the prototype system of intelligent searching system based on manufacturing resource personalized service. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation on the Safety of Chemical Industrial Parks Based on Membership Degree Transformation New Algorithm

    Page(s): 52 - 57
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (401 KB) |  | HTML iconHTML  

    The core of fuzzy evaluation on the safety of chemical industrial park is membership degree transformation. But the transformation methods should be questioned, because redundant data in index membership degree is also used to compute object membership degree, which is not useful for object classification. The new algorithm is: using data mining technology based on entropy to mine knowledge information about object classification hidden in every index, affirm the relationship of object classification and index membership, eliminate the redundant data in index membership for object classification by defining distinguishable weight and extract valid values to compute object membership. The paper applied the new algorithm in the fuzzy evaluation on the safety of chemical industrial park. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Next-Generation Storage Networks Based Optical Technology

    Page(s): 58 - 61
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (621 KB) |  | HTML iconHTML  

    Data storage plays an essential role in todaypsilas fast-growing data-intensive network services. New standards and products emerge very rapidly for networked data storage. It should be very obvious that there is no single optimal design for all the different kinds of optical networks that can be applied to cover all requirements, as well as handle all applications. iSCSI is one of the most recent standards that allow SCSI protocols to be carried out over IP networks. In this paper, analysis of next generation storage network's architecture, which based on optical communication technologies, is given, and IBM's GDPS is shown as an example. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Short Message Security Protocol for Home Network

    Page(s): 62 - 65
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (352 KB) |  | HTML iconHTML  

    The family information technology has caught the attention of various industries such as IT, home appliances, communication, and real estate. Based on the home network theories, this paper describes a remote control system via Internet and GSM SMS, which controls smart home network in wired access mode and wireless communication mode, respectively. Although SMS is widely used for a variety of applications, it is not suitable for the purpose of remote control because it suffers from transmission delay, lose and lacks of confidentiality. This study provides SMS-based protocol, which is designed with the mechanisms of reliable transmission and information encryption, thus it is capable for the home network of reliable remote control. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Research on Integrated Model to Provide QoS Guarantee

    Page(s): 66 - 68
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (323 KB) |  | HTML iconHTML  

    In this document several popular solutions on QoS are showed and itspsila advantage and disadvantage is analyzed. At last integrating the advantage of these solution a new QoS model is brought forward, which integrates MPLS traffic engineering, DiffServ and IntServ Simulations about this model are done, result is indicated, it can improve networkpsilas QoS clearly. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Research on Terminal QoS Control Mechanism for H.264 Video Stream

    Page(s): 69 - 71
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (252 KB) |  | HTML iconHTML  

    In this paper it designs a new streaming media transmission system which is guarantee of QoS and suitable for the transmission of real-time multimedia data (H.264 format). This transmitting system includes network conditions judge algorithm and the adaptive control algorithm for network transmission. This transmission system judges the situation of the network by calculating the data packet loss rate, then adjust the sending speed adaptively. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.