By Topic

Computer Science and Service System (CSSS), 2011 International Conference on

Date 27-29 June 2011

Filter Results

Displaying Results 1 - 25 of 1069
  • [Front cover]

    Publication Year: 2011 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (576 KB)  
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2011 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (74 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (64 KB)  
    Freely Available from IEEE
  • Welcome

    Publication Year: 2011 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (57 KB)  
    Freely Available from IEEE
  • Organizing Committees

    Publication Year: 2011 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | PDF file iconPDF (74 KB)  
    Freely Available from IEEE
  • Table of content

    Publication Year: 2011 , Page(s): 1 - 50
    Save to Project icon | Request Permissions | PDF file iconPDF (184 KB)  
    Freely Available from IEEE
  • Author index

    Publication Year: 2011 , Page(s): 1 - 28
    Save to Project icon | Request Permissions | PDF file iconPDF (85 KB)  
    Freely Available from IEEE
  • Research on clustering algorithm for space information networks

    Publication Year: 2011 , Page(s): 1595 - 1599
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (322 KB)  

    Space information networks, which have become a popular research focus, are a new type of self-organizing net work constituted by information systems of land, sea, air and space. A clustering algorithm for space information networks was proposed to enhance network scalability. Analytic hierarchy process (AHP) was used to select cluster heads, and then non overlapping k-hop clusters could be formed. With taking node mobility and cluster equalization of space information networks into account, mobile agents were used to migrate and duplicate functions of cluster heads in a recruiting way. Dynamical maintaining mechanisms like cluster merger/partition, reaffiliation and adaptive adjustment of information update period were also designed. Simulation results show the proposed clustering algorithm is suitable for use in space information networks and it can improve network scalability. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of competitiveness of value-net enterprise based on game theory

    Publication Year: 2011 , Page(s): 1110 - 1114
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (296 KB)  

    The value-net is the product of the rapid development of information economy. It is a new business design that uses digital supply chain concepts to achieve both superior customer satisfaction and company profitability, and coordinates member firms within the value-net, and extracts the core capabilities of the value creation. This paper introduces the concept and model of value-net. According to Michael Porter's Five Forces Model, this paper explores enterprises game description of the value-net by game theory, and explains the mechanism of creating profit by cooperative ways between enterprise and its co-workers, and also discusses the existence of value-net. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on the forecast method of water inrush in mine based on AHP

    Publication Year: 2011 , Page(s): 688 - 690
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (340 KB) |  | HTML iconHTML  

    It is essential to forecast water inrush area by processing the rich amount of information for hydrogeology in the mine. In this paper, we commence the study from the controlling factors of water inrush. Then we study the fitting process between AHP (Analytic Hierarchy Process) model and GIS normalization information after determining the controlling factors of water inrush level. Finally, we establish a water damage forecast model of coal footwall in mine. This paper experiment this method to carry out risk assessment of testing mine area, and verify it is validity to forecast water inrush. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hydro-generator units operating condition forecasting and fault diagnosis based on BP neural network

    Publication Year: 2011 , Page(s): 1315 - 1317
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (244 KB)  

    In this paper, from the Angle to predict , take hydro generating operation condition parameters (head, power) as input sample, take vibration, shaft waggling and pulse pressure, bearings temperature and so on parameter as output sample, create neural network prediction model. Train the established models, through comparing a different designs scheme, chose one smaller error model. Predict through the trained neural network modes ,and compare with the measurement values. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy aware adaptive directed diffusion algorithm of wireless sensor networks

    Publication Year: 2011 , Page(s): 385 - 388
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (318 KB) |  | HTML iconHTML  

    For the unbalanced energy consumption problem in Directed Diffusion and Energy Aware Directed Diffusion in heterogeneous networks, we propose the EAADD: Energy Aware Adaptive Directed Diffusion for Wireless Sensor Networks. This protocol changes the way of building reinforced path : flrst, we consider about the correlations of node available energy between adjacent rounds, then we use the adaptive algorithm to choose next hop node which is more durable. That means the node could forwards more package than other nodes in the same status. EAADD is a distributed protocol and could used in large scale environment for wireless sensor networks. Simulation results show that EAADD could not only prolong the life of single node, but also spread energy consumption more evenly throughout the network. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of rotating dynamics of table tennis

    Publication Year: 2011 , Page(s): 3038 - 3041
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (324 KB)  

    In table tennis, spinning ball is the mostly used skill by the sportsmen and the key to defeat the rival. How to serve the spinning ball based on the actual situation of the rival to achieve the final victory is a necessary skill which every excellent sportsman should have. The article mainly use the theory of biomechanics to reveal the mystery, find the mechanism of spinning ball, and provide a shortcut for sportsmen to master the skill. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TS flow analysis and design in IPTV performance testing instruments based on triple-play

    Publication Year: 2011 , Page(s): 918 - 921
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (450 KB) |  | HTML iconHTML  

    This article mainly described the contradiction between the existing test equipment and the surge of network data quantity and expounded the network data transmission principle and transmission mode of the TS flow which based on the development of triple-play. In the meantime, it analyzed the data of TS flow and designed the IPTV performance test equipment according to the IPTV performance test instrument's standards of TR101290.It proved that this IPTV performance testing instruments had obtained good application effect. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on international tacit knowledge in frontier domains in visualized information

    Publication Year: 2011 , Page(s): 1615 - 1618
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1022 KB)  

    Through using visualization technology and mapping knowledge domains, the paper explores the present situation and frontier domains of tacit knowledge. The data that the study used are downloaded from Web of Science and indexed by the topic word "tacit knowledge". Three results were obtained in the paper. First, more and more scholars especially from business management are focusing on research of tacit knowledge. Second, the document co citation map identifies several core authors and important literature from knowledge management, psychology and philosophy. Third, the frontier trends are presented by mapping on network of document-burst in tacit knowledge. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The construction research on the environmental cost management model of resource-enterprises in Inner Mongolia

    Publication Year: 2011 , Page(s): 1773 - 1776
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (280 KB)  

    This paper analyzes the characteristics of resource-based enterprises in Inner Mongolia, points out that it still need to go through a phase of resource consumption for Inner Mongolia. This paper studies and brings about an environmental cost management model of resource-enterprises in Inner Mongolia. The author points out that such kind of enterprises should procure cost information with activity-based costing (ABC) oriented by material and energy flow under cost management model of product life cycle then the information can bring support for the enterprises to undertake social responsibility, to make correct decision and for the government to make environmental policies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High speed IPv6 intrusion detection system based on MMDB

    Publication Year: 2011 , Page(s): 1308 - 1311
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (323 KB)  

    As the core next network protocol, IPv6 provides large-scale data addresses. So the data in the network is large scale. How to detect the large-scale data is a realistic question to the IPv6 IDS. In this paper, a new design method based on MMDB is put forward aimed at improving the speed and maneuverability of IDS and resolving the bottleneck of High speed IDS. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The quantitative analysis of research papers on library knowledge service in China in 1999–2010

    Publication Year: 2011 , Page(s): 4150 - 4153
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (269 KB)  

    Chinese Academic Journal Web Publication Library as a data source, with the bibliometric methods, the author statisticases and analyzes the distribution about the research Papers on Library Knowledge Service in 1999-2010 including Published time, journals, authors, subjects and so on, to understand the development Status about the Held in the past 15 years, in order to provide the reference on sustainable research. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Asymmetry Bi-directional RSVP for improving the network performance

    Publication Year: 2011 , Page(s): 170 - 173
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (255 KB) |  | HTML iconHTML  

    The classical Resource ReSerVation Protocol (RSVP) is a flow-based signaling protocol used for reserving resources in the network for a given session. The core of Integrated Service (IntServ) Model is RSVP. RSVP is a unidirectional resource reservation protocol; it can only reserve resources for the TCP data flow along the forward direction path, and cannot provide any protection to the ACK packets against congestion in reverse direction. In order to improve TCP performance over RSVP, we proposed a new protocol called ABi-RSVP (Asymmetry Bi-directional RSVP). ABi-RSVP reserves the backward resource by taking account of the ACK packets size, therefore improves the throughput of TCP flows and enhances the efficiency of the network. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discussion about the core of search engine again—Web Crawler

    Publication Year: 2011 , Page(s): 3188 - 3191
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (253 KB)  

    The web crawler is a common product of the network real-time refresh data and search engine technology at present. This article discusses and studies thoroughly how to apply the Web Crawler technique to realize the real-time refresh data and search engine technology. On the basis of deep analysis to the Web Crawler technique, this article gives a kind of solution to realize network communications between the server and the client in the local area network with the Web Crawler technique. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Online communities of practice research: A review of course FET8601 at the University of Southern Queensland

    Publication Year: 2011 , Page(s): 3369 - 3371
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (245 KB)  

    In spite of the exponential growth in the number of online education programs, there seems to be few effective theories that could offer a cogent basis to orient the practice of, or judge the quality of those products. However, the theories about the communities of practice provide an encompassing solution to the problem, because it can help us understand how individuals can achieve their optimal functioning level through guided social participation. And the FET8601 Course at the University of Southern Queensland is just the very example of online communities of practice. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The improvement of VTD-XML processing model

    Publication Year: 2011 , Page(s): 3711 - 3714
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (384 KB)  

    As a next generation of Web application, XML is quite easy and readable. However, existing XML processor is not. DOM (Document Object Model) uses too much memory and is quite slow. SAX (Simple API for XML) chooses to access information without structure, so it's uneasy to use. As the next generation of XML processing model, VTD-XML provides a wide range of uses and better choices .But VTD-XML also has shortages, because its processing model is fixed, it does not have enough flexibility and scalability. In this paper, through in-depth research on VTD-XML processing model, we put forward an improved method. The improved method will have better flexibility and scalability by calculating the size of XML documents, token length, nesting depth and dynamically adjust length of processing model. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Id-based and Cluster Key Distribution for ad hoc networks

    Publication Year: 2011 , Page(s): 2996 - 2999
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (294 KB)  

    An Id and Cluster-Based Key Distribution Scheme for MANET based on mechanism of identity-based cryptography and (t,n) threshold secret sharing is proposed in this paper. The new scheme is much different to traditional scheme, its secret shadows are not brought from the head of cluster, but from each node's private key signature. By getting together all these n secret shadows, the cluster head can construct polynomial. Any of nodes in this cluster can request these secret shadows from t of its neighbor nodes, and when a new node or roamer joins this cluster, it would be trusted after passing the authentication by cluster head, and then this new node can request t cluster key shadows and restitute cluster key by them. In all courses of cluster key distribution and restitution, every member's identity can be easily validated, so it can be prevented from all kinds of cheat. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A survey on context awareness

    Publication Year: 2011 , Page(s): 144 - 147
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (174 KB) |  | HTML iconHTML  

    We have reviewed the research of context awareness of recent years in this paper. First of all, we describe the definitions of context and context awareness which are made by different scholars in different fields, and propose our own definition. In addition, different classifications of context and context awareness are analyzed. We focus on context acquisition and sensing, context modeling and representation, context filtering and fusion, context storage and retrieval in context awareness computing. Finally, the context awareness application of domestic and foreign are discussed, and the development of the context awareness is prospected. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring semantic nouns in Tibetan language

    Publication Year: 2011 , Page(s): 492 - 495
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (187 KB) |  | HTML iconHTML  

    Making good use of semantics can help language understanding, thus can improve retrieve performance, getting more highly-ranked, relevant documents. Word families in Tibetan language can provide unexpected light on the Tibetan semantic world. We propose semantic categories between Tibetan nouns, which considered the relationship between the nouns and others. We propose an algorithm to calculate the semantic similarities of those nouns and to organize the meaning classes automatically from Tibetan-Chinese dictionary. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.