By Topic

2010 International Forum on Information Technology and Applications

16-18 July 2010

Go

Filter Results

Displaying Results 1 - 25 of 126
  • [Front cover - Vol 3]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (400 KB)
    Freely Available from IEEE
  • [Title Page i - Volume 3]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • [Title page iii - Volume 3]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (154 KB)
    Freely Available from IEEE
  • [Copyright notice - Volume 3]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (116 KB)
    Freely Available from IEEE
  • Table of contents - Volume 3

    Publication Year: 2010, Page(s):v - xiii
    Request permission for commercial reuse | PDF file iconPDF (187 KB)
    Freely Available from IEEE
  • Welcome message from the General Chair of IFITA 2010 - Volume 3

    Publication Year: 2010, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (202 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee - Volume 3

    Publication Year: 2010, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (177 KB)
    Freely Available from IEEE
  • Program Committee - Volume 3

    Publication Year: 2010, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (153 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2010, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (123 KB)
    Freely Available from IEEE
  • Simulation Research of Communication Networks Based on Prim Algorithm

    Publication Year: 2010, Page(s):3 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (354 KB) | HTML iconHTML

    In order to improve the efficiency of the communication networks, we used the Kruskal algorithm and the Prim algorithm through algorithm comparison and analysis methods of data structure. A dynamic framework for the communication network installed system is built. Moreover, according to the actual framework of the communication network specific issues, the module chooses the Minimum Cost Spanning ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Impedance Matching System

    Publication Year: 2010, Page(s):7 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (562 KB) | HTML iconHTML

    In order to resolve the real-time, fast and stable matching problems as to the dynamic load of microwave plasma, including O2, N2, CF4, NF3, N2H2, etc, through the introduction of six-port test theory and impedance matching theory, the authors put forward a new method called automatic impedance match, which calculated reflectance using the FDTD algorithm. And they use the relationship between pin ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Security Framework for Agent-Based Non-fixed Services Composition

    Publication Year: 2010, Page(s):10 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (342 KB) | HTML iconHTML

    Mobile agents play a key role in many researches on non-fixed services composition, but threats from potentially malicious hosts become a great obstacle of services composition based on mobile agent technology because an agent on a malicious host is in a white-box attack context. A security framework based on bilinear pairings on elliptic curves using a special digital signature technique and a mu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Lightweight Buyer-Seller Fingerprinting Protocol

    Publication Year: 2010, Page(s):15 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (321 KB) | HTML iconHTML

    A buyer-seller fingerprinting protocol can enable a seller to successfully identify a traitor from a pirated copy, while preventing the dishonest seller from framing an innocent buyer. Existing protocols often create a large computation and bandwidth overhead for two reasons: one is a lot of asymmetric ciphers operations are performed and the other is the uniquely fingerprinted copies are sent to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GPS/SINS/BARO Integrated Navigation System for UAV

    Publication Year: 2010, Page(s):19 - 25
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (878 KB) | HTML iconHTML

    The GPS/SINS/BARO integrated system can provide high dynamic and accuracy navigation for UAV flight. In this paper, a GPS/SINS/BARO integrated system for UAV is presented. The system consists of a GPS receiver, an MEMS-based inertial measurement unit (IMU), a Barometer and a navigation processing unit. The GPS receiver provides three-dimensional velocity and position, the IMU provides three-dimens... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Prototype System for Aviation Safety Information Exchanges Based on International Comparative Research

    Publication Year: 2010, Page(s):26 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (307 KB) | HTML iconHTML

    Focusing on aviation safety information exchanges among different countries and international organizations in order to prevent air accident globally, a comprehensive comparison among relevant laws, regulations, taxonomies and database structures for aviation safety information adopted by ICAO, EU and China was made, and a prototype system for aviation safety information exchanges between the CAAC... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Design and Implementation of XML Semi-structured Data Extraction and Loading into the Data Warehouse

    Publication Year: 2010, Page(s):30 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (607 KB) | HTML iconHTML

    By analyzing the characteristics of Semi-structured data along with the actual Book Return Data (BokeDataInfo.xml) in the Auto department chain sales as an example, DOM objects extract, transform and load into the data tables of current level of detail of the Data Warehouse. The paper based XML Semi-structured data has designed and implemented a Data Warehouse ETL tool which based on the Semi-stru... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network Secure Transmission Based on Authentication for C/S Mode

    Publication Year: 2010, Page(s):34 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (429 KB) | HTML iconHTML

    Currently, network built with C/S model has been widely used in E-commerce, ERP and corporate intranets. Therefore, the security of network transmission in this model has become an increasingly important issue. In view of the low security of traditional DES algorithm and slow RSA encryption speed, this paper presented an Encryption Algorithms model of data packets on the basis of analyzing the met... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Power Control Scheme for WCDMA Systems Using Trellis-based Prediction Algorithm

    Publication Year: 2010, Page(s):38 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (369 KB) | HTML iconHTML

    In this paper, a trellis-based prediction algorithm was applied for the power control of WCDMA system for the first time. The principle of the algorithm was described. The power control events were modeled by a sequence of 0s and 1s by devising a trellis-based prediction method that adjusted the transmitting power strength based on the similarity of the power control states. The system capacity is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Application of Non-certificated Signcryption in Active Network

    Publication Year: 2010, Page(s):42 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (325 KB) | HTML iconHTML

    The Active Network is a new type network architecture which intermediate node could be programmed. However, its architecture feature bring many security problems which embarrassed the development of active network greatly. This context analyze and studies the characteristics of active network communication and the security problems exist in the process. At the same time, we put forward a safe comm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Business Process Management Framework Based on BPEL

    Publication Year: 2010, Page(s):45 - 48
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (375 KB) | HTML iconHTML

    Web Service is a revolution technology on internet. It is changing the way of interaction of the web form information-oriented to service-oriented. Thus there comes a new kinds of business process, called web service business process. At the same time, with the complexity of the business environment, many enterprises pay more and more attention to the process management..BPEL-based process compone... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficiency Measure Approach for Wireless Sensor Networks

    Publication Year: 2010, Page(s):49 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (343 KB) | HTML iconHTML

    Due to limited resources in wireless sensor networks (WSN), monitoring the residual energy of sensor nodes or average area energy is very important, but not enough. Exhaustion of one node won't lower the average energy of the region notably, but the efficiency of information exchange within that area may be affected obviously. In this paper, an efficiency measure approach for WSN is proposed to me... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault Diagnosis System of Locomotive Axle's Track Based on Virtual Instrument

    Publication Year: 2010, Page(s):53 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (418 KB) | HTML iconHTML

    Railway vehicle is usually working in hazardous environment. The operational status of axle, which is the railway vehicle's main components to run, affects the safe operation of the railway vehicle directly. Over the years, the railway of our country has remained low equipment-rate, high using-rate and high intensity-transport. In addition, because of the need of the rapid development of economy, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Design and Development of Fire Edutainment Software and its Application Research

    Publication Year: 2010, Page(s):57 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (399 KB) | HTML iconHTML

    During fire education, because of the particularity of the fire scene, learners are difficult to truly grasp and apply the relevant knowledge. This study which selecting the fire of knowledge as the main content, and making the teenagers as the target public, use of game engine to develop game-based educational software. It is difficult to present the fire scene in real life. But the technology of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Chinese Character System on Embedded Systems

    Publication Year: 2010, Page(s):61 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (298 KB) | HTML iconHTML

    This paper try to establish a Chinese system on a embedded system by discussing dot matrix coding, displaying and inputting approach of Chinese characters, it elaborates font codes of Chinese characters and their displaying process, and also describes the inner code, GB code and area code of the character system, and then introduces a high efficiency inputting-indexing way and two additional data ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development and Application of Land-Use Planning Management Information System Based on ArcGIS

    Publication Year: 2010, Page(s):64 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB) | HTML iconHTML

    With the startup of new round of planning, our land-use planning has entered a new stage of development. It is meaningful to build the land-use planning management information system, promote the scientific level of the land-use planning, improve the efficiency of daily work, strengthen the criterion of land-use planning management. The paper made a detailed operation-analysis according to the cha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.