ICCSE 2011 The 6th International Conference on Computer Science and Education August 3-5, 2011. Singapore Final Program & Book of Abstracts Organizer National Research Council of Computer Education in Colleges & Universities, China Technical Co-Sponsors IEEE Control Systems Chapter, Singapore National University of Singapore, Singapore Florida International University, USA Sichuan University, China INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE) PAST, PRESENT AND FUTURE 1st ICCSE 2006 The 1st International Conference on Computer Science & Education July 24-26, 2006. Xiamen, China http://iccse.xmu.edu.cn/2006/ 2nd ICCSE 2007 The 2nd International Conference on Computer Science & Education July 25-28, 2007. WuHan, China http://iccse.xmu.edu.cn/2007/ 3rd ICCSE 2008 The 3rd International Conference on Computer Science & Education July 25-28, 2008. Kaifeng, China http://iccse.xmu.edu.cn/2008/ 4th ICCSE 2009 The 4th International Conference on Computer Science & Education July 25-28, 2009. Nanning, China. http://iccse.xmu.edu.cn/2009/ 5th ICCSE 2010 The 5th International Conference on Computer Science & Education August 24-27, 2010. Hefei, China. http://iccse.xmu.edu.cn/2010/ 6th ICCSE 2011 The 6th International Conference on Computer Science & Education August 3-5, 2011. Singapore http://iccse.xmu.edu.cn 7th ICCSE 2012 The 7th International Conference on Computer Science & Education July 25-28, 2012. Sydney, Australia. http://iccse.xmu.edu.cn Table of Contents Welcome Message 1 Committees 2 Keynote Addresses 3 Information about Singapore 5 General Conference Information 9 Operation Timetable for Cruise 11 Program-at-a-Glance 13 Technical Program 17 Book of Abstracts 35 Author Index 79 This Page Intentionally Left Blank. Welcome Message On behalf of the conference organizing committee, we are happy to present this Final Program and the Proceedings of the 6th International Conference on Computer Science & Education (ICCSE 2011). Held at the amazing cruise SuperStar Virgo, August 3–5, 2011, the conference is organized by National Research Council of Computer Education in Colleges & Universities, China, and technically sponsored by the IEEE Control Systems Chapter, Singapore, Florida International University, USA, and Sichuan University, China. The conference aims to create a forum for scientists and practicing engineers throughout the world to present and discuss the most recent ideas, innovations, trends, experiences, and concerns in the field of computer science and education. The conference program includes one pre-conference workshop, 16 technical sessions, 2 keynote speeches by distinguished experts in the fields. ICCSE 2011 marks another milestone for the conference series, which was originally started in Xiamen, China, in 2006. Since then, ICCSE has sequentially been held in Wuhan, Kaifeng, Nanning and Hefei, respectively. Participants included many internationally renowned researchers and practicing engineers worldwide. This year, we have received 889 submissions from 12 countries and regions. With a rigorous review process conducted by the conference program committee, 341 high quality manuscripts have been accepted for presentation in the final technical program and for inclusion in the conference proceedings. Lying almost on the equator, Singapore is a thriving city-state that has overcome its dearth of natural resources to become one of the juggernaut economies of Asia. In the crowded streets of Chinatown, fortune tellers, calligraphers and temple worshippers are still a part of everyday life. In Little India, you can buy the best sari material, freshly ground spices or a picture of your favorite Hindu god. In the small shops of Arab Street, the voice of the imam can be heard from the nearby Sultan Mosque. Known for its high-tech wizardry, Singapore also offers a taste of the great Asian culture and provides a rare and unique retreat, full of vibrant action-packed adventure and opportunities to unwind while focusing on wholesome wellbeing. We wish to take this opportunity to thank all the members of the organizing committee, and the program committee for their effort and time. The conference would have not been existent and successful without their hard work. We are indebted to all the members of our team. Finally, we would like to particularly thank all our delegates for your interest, contributions and participation in ICCSE this year. We hope that it will be a rewarding and interesting experience, both technically and nontechnically, to all of you. We look forward to your strong support again in the future ICCSEs. Wish you all have a great time in Singapore! Yuan Kaibang and Cheng Xiang General Chairman ICCSE 2011 Zhang Fengxiang and Hai Lin Program Chairmen ICCSE 2011 1 Li Maoqing and Ben M. Chen Organization Chairmen ICCSE 2011 Committees General Chair Lin Zongli, University of Virginia, USA Shen Xiajiong, Henan University, China Wang Hong, Hubei College of Economics Weng Yang, Sichuan University, China Xu Bugong, South China University of Technology, China Xie Lihua, Nan yang Technological University, Singapore Zhang Xuesong, Southeast Missouri State University, USA Zhong Wende, Nanyang Technological University, Singapore Zhu Shunzhi, Xiamen University of Technology, China Yuan Kaibang, President of National Research Council of Computer Education in Colleges & Universities, China Cheng Xiang, National University of Singapore, Singapore Program Chairs Zhang Fengxiang, Huazhong University of Science and Technology, China Hai Lin, National University of Singapore, Singapore Publication Chair Organization Chairs Wang Jianliang, Nanyang Technology University, Singapore Xi Bin, Xiamen University, China Li Maoqing, Xiamen University, China Ben M. Chen, National University of Singapore, Singapore Program Committee Invites Session Chairs Ching-Shoei Chiang, Soochow University, Taiwan Chen Ben M., National University of Singapore Chen Chong, Fuzhou University, China Clarence W. de Silva, University of British Columbia, Canada Frank Lewis, University of Texas at Arlington, USA Huang Jie, Chinese University of Hong Kong Iven Mareels, University of Melbourne, Australia Jonathan Li, University of Waterloo, Canada Li Tao, Florida International University, USA Li Taoshen, Guangxi University, China Liu Tenghong, Zhongnan University of Economics and Law, China Li Xin, Louisiana State University, USA Luo Bin, Anhui University, China Li Tao, Florida International University, USA Weng Yang, Sichuan University, China Publicity Chairs Lin Chen, Xiamen University, China Wang Qing, Tianjin University, China Wang Ziyang, Beijing Jiaotong University, China Wei Shikui, Nanyang Technology University, Singapore Wei Wei, Norwegian University of Science and Technology, Norway Yang Fan, Xiamen University, China 2 Keynote Addresses Keynote Address I Impulse Stochastic Control and Composite Markov Processes Xi-Ren Cao Prof, Phd, Fellow of IEEE, Fellow of IFAC Shanghai Jiaotong University Hong Kong University of Science and Technology Abstract: Motivated by the portfolio management problem, we propose a composite model for Markov processes. The state space of a composite Markov process consists of two parts, J and J in the Euclidean space n R . When the process is in, it evolves like a continuous-time Levy process; and once the process enters J, it makes a jump (with a finite size) instantly according to a transition function like a direct-time Markov chain. The composite Markov process provides a new model for the impulse stochastic control problem, with the instant jumps in J modeling the impulse control feature (e.g., selling or buying stocks in the portfolio management problem). With this model, we show that an optimal policy can be obtained by a direct comparison of the performance of any two policies. Prof. Dr. Xi-Ren Cao received the M.S. and Ph.D. degrees from Harvard University, in 1981 and 1984, respectively. From 1984 to 1986, he was a research fellow at Harvard University. From 1986 to 1993, he worked as consultant engineer/engineering manager at Digital Equipment Corporation, Massachusetts, U.S.A. From 1993 to 2010, he was with the Hong Kong University of Science and Technology (HKUST), where he served as reader/professor/chair professor. Since July 2010, he is a chair professor of Shanghai Jiao Tong University and an affiliate member of the Institute for Advanced Study, Hong Kong University of Science and Technology. Dr. Cao owns three patents in data- and tele- communications and published three books in the area of performance optimization and discrete event dynamic systems. He is a Fellow of IEEE (1996), a Fellow of IFAC (2008), and is/was the Chairman of IEEE Fellow Evaluation Committee of IEEE Control System Society, Editor-in-Chief of Discrete Event Dynamic Systems: Theory and Applications, Associate Editor at Large of IEEE Transactions of Automatic Control, and Board of Governors of IEEE Control Systems Society and on the Technical Board of IFAC. His current research areas include and financial engineering, stochastic learning and optimisation, performance analysis of economic systems, and discrete event dynamic systems. 3 Keynote Address II A Framework for the Control of Multi-Agent Systems Jie Huang Prof, Phd, Fellow of IEEE, Fellow of IFAC, Fellow of CAA Department of Mechanical and Automation Engineering The Chinese University of Hong Kong Abstract: Over the past decade, with the increasing applications of wireless sensor networks, coordination of a group of mobile robots , autonomous vehicle formation and so on, various cooperative control problems such as consensus, flocking, and formation of multi-agent systems have attracted intensive attention. In this talk, we will describe a framework for handling various control problems for a multi-agent system. This framework will be called the cooperated output regulation problem. The core of this framework includes the establishment of the concepts of the distributed observer, and the distributed internal model. On one hand, we will show that this framework will set a stage for solving the asymptotic tracking and disturbance rejection problem in an uncertain multi-agent system via a distributed control approach. On the other hand, we will show that this framework contains many control problems of multi-agent systems such as consensus, synchronization, and formation as special cases, thus leading to a unified solution to several different control problems of multi-agent systems. Prof. Dr. Jie Huang studied Power Engineering at Fuzhou University from 1977 to 1979 and Circuits and Systems at Nanjing University of Science and Technology (NUST) from 1979 to 1982. He got his Master's degree from NUST in 1982 and was a faculty member there from 1982 to 1986. He completed his Ph.D. study in automatic control at the Johns Hopkins University in 1990 and subsequently held a postdoctoral fellow position there until July 1991. From August 1991 to July 1995, he worked in industry in USA. In September 1995, he joined the Department of Mechanical and Automation Engineering, the Chinese University of Hong Kong. He is now a professor and also the director of Applied Control and Computing Laboratory there. He served as a Science Advisor to the Leisure and Cultural Services Department of Hong Kong Special Administrative Region, and Honorary Advisor to Hong Kong Science Museum. His research interests include control theory and applications, robotics and automation, neural networks and systems biology, and guidance and control of flight vehicles. He authored two books and numerous papers. He received China State Natural Science Award, Class II, in 2010, Croucher Senior Research Fellowship award in 2006, and the best paper award (with Zhiyong Chen) of the Eighth International Conference on Control, Automation, Robotics, and Vision in 2004. He is IFAC Fellow and IEEE Fellow. Jie Huang is / was editor, associate editor, guest editor of several journals. He was Distinguished Lecturer of IEEE Control Systems Society from 2005 to 2008, a member of the Board of Governors of IEEE Control Systems Society from 2006 to 2007. He served as general chair, program chair in numerous international Conferences. 4 Information about Singapore Local Information Singapore is a tropical island country in Asian, it consists of the island itself and other 63 small islands and it is also a City Country. The country located at the south of Malaysia, adjacent to the Strait of Malacca and there are Singapore Strait in the south remote with Indonesia across the sea and Johor strait in the north separates with Malaysia between which links by long dam. With the geographical advantages location, Singapore developed into one of the most important financial, service and shipping centre. Except the island of Singapore, the relatively bigger islands are Pulau Tekong, Pulau Ubin and Sentosa Island. Singapore is a City Country and it means the City of Lion. Ever since 60s, the city are rebuilt and cleaned thus it is also called ‘Graden City’ The climate of Singapore is tropical climate and it characteristics with Warm humid. Thus, for those who are in favor of sunbath, swimming, shipping as well as other water sports, Singapore can be called paradise. Geography Singapore consists of 63 islands, including the main island, widely known as Singapore Island but also as Pulau Ujong. There are two man-made connections to Johor, Malaysia: the Johor–Singapore Causeway in the north, and the Tuas Second Link in the west. Jurong Island, Pulau Tekong, Pulau Ubin and Sentosa are the largest of Singapore's smaller islands. The highest natural point is Bukit Timah Hill at 166 m (545 ft). There are ongoing land reclamation projects, which have increased its land area from 581.5 km2 (224.5 sq mi) in the 1960s to 704 km2 (272 sq mi) today; it may grow by another 100 km2 (40 sq mi) by 2030. Some projects involve merging smaller islands through land reclamation to form larger, more functional islands, as with Jurong Island. About 23% of Singapore's land area consists of forest and nature reserves. Urbanisation has eliminated most primary rainforest, with Bukit Timah Nature Reserve the only significant remaining forest. Climate Singapore has a tropical rainforest climate with no distinctive seasons, uniform temperature and pressure, high humidity, and abundant rainfall. Temperatures usually range from 23 to 33 °C (73 to 91 °F). Relative humidityaverages around 79% in the morning and 73% in the afternoon. May and June are the hottest months, with the wetter monsoon season in November and December. From August to October, there is often haze caused by bush fires in neighboring Indonesia. Singapore does not observe summer time. The length of the day is nearly constant all year round. Culture Racial and religious harmony is regarded by the government as a crucial part of Singapore's success and played a part in building a Singaporean identity. Due to the many races and cultures in the country, there is no single set of culturally acceptable behaviours. The country is generally conservative socially but some liberalisation has occurred. Foreigners also make up 42% of the population and have a strong influence on Singaporean culture. A.T. Kearney named Singapore the most globalised country in the world in 2006 in its Globalization Index. The Economist Intelligence Unit in its "Quality-of-Life Index" ranks Singapore as having the best quality of life in Asia and eleventh overall in the world. Currency The local currency in Singapore is the Singapore Dollar (SGD). There are many currency exchange and banking facilities available at Singapore Changi Airport (SIN) and these include convenient ATM cashpoints, which are located throughout the airport. Transportation Singapore is a major international transportation hub in Asia, positioned on many sea and air trade routes. The Port of Singapore, managed by port operators PSA International and Jurong Port, was the world's second busiest port in 2005 in terms of shipping tonnage handled, at 1.15 billion gross tons, and in terms of containerised traffic, at 23.2 million twenty-foot equivalent units (TEUs). It is also the world's second busiest in terms of cargo tonnage, coming behind Shanghai with 423 million tons handled. In addition, the port is the world's busiest for transshipment traffic and the world's biggest ship refuelling centre. 5 Singapore is an aviation hub for the Southeast Asian region and a stopover on the Kangaroo route between Sydney and London. There are 8 total airports in the country, and Singapore Changi Airport hosts a network of 80 airlines connecting Singapore to 200 cities in 68 countries. It has been rated one of the best international airports by international travel magazines, including being rated as the world's best airport for the first time in 2006 by Skytrax. The national airline is Singapore Airlines. The island has a road system covering 3,356 kilometres (2,085 mi) which includes 161 kilometres (100 mi) of expressways. The public road system is served by the many bus services and a number of licensed taxi-operating companies, and thousands of people use these services everyday. Since 1987, the heavy rail passenger Mass Rapid Transit (MRT) metro system has been in operation. Electricity The standard power supply in Singapore is 220 volt AC with a frequency of 50 Hz. Hotels generally provide wall sockets accommodating both “straight two-pin plugs,” and “triangular 3-pins plugs” and in bathroom for razors and hair dryers. The details for power plugs sockets could be found at http://en.wikipedia.org/wiki/Electric_plug#Type_G . An adapter should be carried yourself, if required. Telephone The country code of Singapore is +65. Prepaid mobile phone cards, from MobileOne, SingTel and StarHub, can be purchased in retail shops with passport. International roaming service is available in both Singapore and the Cruise, but you should confirm with your service provider in advance. Shopping All kinds of articles right from designer brands, jewelery, fashion accessories and watches to electrical goods from around the globe are available in Singapore. You only need right information for the right place to shop. Orchard Road: This place has some biggest malls of Singapore. You can get all the items like stylish clothes, electronic goods, cosmetics, shoes, furniture or anything you are looking for, at Orchard Road. VivoCity: This is one of the biggest shopping malls of Singapore. At this place one can find all the major brands from all across the globe. Centrepoint: This one is most popular shopping hub in Singapore. There are stores that have special collections of electronics, furnishings, classical music, optical equipment, fine arts and, of course, casual clothings and so on The Heeren: An ideal place for music lovers. The biggest superstore HMV is situated in The Heeren. You can also enjoy some mouth-watering cuisines at this shopping junction. Bugis Junction: If you are good at bargaining, then this the shopping destination for you. Little India: A place to find Indian handicrafts and anything that is inspired by Indian culture. Central Shopping Belt: This place will give you an unforgettable shopping experience. Chinatown: Here one can find beautifully embroidered kimonos, clothes, jewelery and traditional crafts. Sim Lim Square: The heaven of electrical and electronic goods, computer softwares and hardware. Arab Street: Mainly deals in clothes and textiles. 6 Tourism Sentosa Sentosa is located in the main island of Singapore, south from downtown 1.5 kilometers of the idyllic holiday island which has spectacular adventure park museum of natural and historical sites and so on. Sentosa can let people away from urban cities. People who love seas can enjoy water activities along the beach, while those who love the natural can enjoy the underwater world, HuJi garden and butterfly garden. In the historical sites, there are western cable forts, maritime museums and Singapore host museums. In the theme park , existed a 37meter-high merlion tower called the fantasy island, which can let visitors from downtown high-rise buildings overlook Sentosa and the surrounding landscape around. After nightfall, the music fountain is dancing with the rhythm of symphony. Singapore River Singapore River is the only river in Singapore. She is a river about 4.1 kilometers long, that formed by the rushing sea and the artificially canal. The merlion statuary standing at sea beach is the symbol of Singapore. Chinatown Chinatown Singapore is located in the south of Chinatown. Chinese city was known as “Chinatown”, because the original inhabitants cleaning with bullock cart. Today, it is the modern shopping center, including kinds of vendors and old shop. The Fo Ya temple is built by Shifazhao (a famous Buddha) in the November 2002. In Chinatown, The main hall feed a solemn Buddha, also called “LIFE” or “future Buddha”, who is also services the public. If you come to Chinatown Maybe the FoYa Temple is a good place for your visiting and blessing. Merlion Park According to the ancient classics records, in that time, Singapore is named Temask. In the 14th century, the legend says that there is an ancient Indonesia prince found the island (Singapore), he saw a magical beast there, and later he learned that the beast is a lion. In this, the prince named the island “Singapore”. Now, there are more than one million visitors from all over the world, coming to visit the Merlion Park and taking photos with it. Singapore Flyer The wheel diameter of the 42-story Singapore Flyer is reached at 150 meters. The total height of the 42- story Singapore Flyer is 165 meters. The 28 installed air condition cabin can accommodate 28 passengers separately. It takes about 30 minutes to rotate. The flyer wheel is located in the center of the south coast. It can not only take a view of the outside scenery of Singapore downtown, but also can view the Singapore’s straits including Indonesia Island, which is the busiest shipping settings in the world. Singapore Zoo The Singapore Zoo is located in the central of Singapore. It is designed with an open concept, taking the use of the natural reserve of the central for barriers. So it can allow visitors not to be disturbed with cages and iron column, and that the visitors can see the scenery clearly. The Singapore Zoo covers 28 hectares. There are 250 kinds of mammal animals, birds and reptiles. Total volume of the animals is nearly 3000.The Singapore Zoo shows many endanger animals, including dragon, sleep bear, golden monkeys and the largest heard ape in the world. The Esplanade The Esplanade, which is completed in October 2002, being one of the landmarks in Singapore. The appearance of The Esplanade is peculiar outstanding. It is like two big durians, so a lot of people call it “The Durian Art Center”. It is composed of 4,590 pieces of glass roof sunshade. It is based on the simulated calculation of Singapore sunshine environment settings. The flavor of the internal is European theater. The function of it is pluralism, 7 including center hall, theater, shopping centers, restaurants and outdoor performance space, let the eastern and western art culture bump the most beautiful park. Mount Faber Mount Faber is situated in the southern part of Singapore and the total area is extending to 56.46 hectares. More than 100 meters of flowers in the 1960s ,and it was established in 1994. Mount Faber Park added more infrastructures after completely renovated and the resort island of sentosa cable station is also here。Looking around on the mountains, the scenery is very beautiful. We can not only see the city at night amongst the complex from the mountain but also be intoxicated with the night view and the romantic atmosphere in all around. If you have time to take up the hill on feet, you can enjoy the beauty of the surroundings. 8 General Conference Information The 6th International Conference on Computer Science & Education (ICCSE’11) will be held on from August 3 to 5, 2011, in Singapore. The conference is jointly organized by National Research Council of Computer Education in Colleges & Universities, China and technically sponsored by IEEE Control Systems Chapter, Singapore, National University of Singapore, Singapore, Florida International University, USA and Sichuan University, China. Language The official language of the conference is English. Registration Fee Categories Singapore Dollar Chinses Yuan Paper Upload Attendee Standard Rate S$ 500 RMB 2600 1 1 Student Rate S$ 400 RMB 2000 1 1 The 2nd paper for the S$ 160 same first author. RMB 800 1 0 Accompanying Person S$ 400 RMB 1800 0 1 Over Length Fee S$ 50 per page RMB 250 per page The regular length is 6 pages including references. Extra CD-ROM & Book of S$ 50 per pack Abstracts RMB 250 per pack Each paper registration already includes one pack. Banquet Fee RMB 300 per pax Include the meals, banquet and the city tour S$ 60 per pax The registration fee covers + Delegates: Name badge * Admission to all sessions * Admission to the exhibition * Conference kit * Opening and Closing Sessions * All receptions * Meals * Souvenir * Free City Tour + Accompanying persons: Name badge * All reception * Meals * conference dinner and one social/cultural event * City Tour + The conference registration fee is nonrefundable, and does not include post-conference travel or accommodation. Onsite Registration Hours and Location Date: 3 August 2011 (Wed) Time: 10:00 – 17:40 Venue: #2-25/27, Cruise Centre, 1 Maritime Square, Singapore Cruise Centre, Level 2, Singapore Important notes for VISA l Please apply your multiple-entry Singapore VISA, if required. l Please apply your Malaysia visa advance for this following Country passport: Israel, Serbia Montenegro, and Yugoslvia. 9 Airport Pick-up Shuttle Bus There is a shuttle bus on both Aug 2 (Tuesday) and Aug 3(Wedensday), 2011. l Stops and Schedule: (1)Terminal 3 at 16 :20 à (2) Terminal 1 at 16 :30 à (3) Terminal 2 at 16 :40 à(4) Hotel (Aug 2) / Cruise Centre (Aug 3). l Meeting Points: Information Counter in each terminal. ICCSE volunteers will stay at these meeting points to collect delegates in Aug 2 and 3. l For more information for Changqi Airport, please visit http://www.changiairport.com/. - For whom miss the shuttle bus If you miss the shuttle bus or want to go to the Cruise Center yourself, you may l By Taxi. The taxi rate from Airport to Cruise Center is 25-35 SGD, in 30 – 40 mins. l By MRT (Subway). To get to the city, passengers need to transfer to the west bound train at Tanah Merah (EW4, Green Line) train station. The last train service leaving Changi Airport station which would allow a transfer to the last west bound train at Tanah Merah station is scheduled at 11.18pm. The MRT station for Cruise Center is HarbourFront(NE1, Purple line), and use Exit B to get into Cruise Center. l For more information for MRT, please visit http://www.publictransport.sg 10 Operation Timetable for Cruise SuperStar Virgo 2-Night Redang Cruise Operated by Star Cruises, Singapore Check-in Counter: #2-25/27, Cruise Centre (1 Maritime Square, Singapore Cruise Centre, Level 2, Singapore 099253) Date Time Program 03/8 Wed. 10:00 Start to register Delegates could deposit luggage in our registration counter, then leave for city tour. 16:30 Start to the boat Delegate came back to registration counter to collect the luggage then start to the boat. 17:40 Registration counter closed 18:00 Start the dinner 18:30 Immigration closed 20:00 Depart 07:00 Get up 07:30 08:10 08:30 – 11:30 11:45 – 12:45 13:00 14:00 – 19:00 Breakfast 04/8 Thu Keynote Speech Lunch Remark All delegates and staffs check in the boat International buffet at deck 12 Chinese food at deck 6 Buffet at deck 12 At The Lido Room, Deck 7/8. You can choose Chinese food or Western food The boat reach Redang Island Redang Island* 1, Snorkeling, 3-4 hours at $45.00 per pax (at own expense) 2, Diving, 3 hours at $155.00 per pax 3, Discovery Scuba, 1 hour at $125.00 per pax Note: l Meal at own expense l Limited seat available, need to advance booking. l If you do not like to go to Redang Island, you can stay on the boat. l Please prepare your own swimming suit and sunblock 18:10 20:00 Banquet at Bella Vista (deck 6) All delegates and staffs have the dinner together Dress code: Elegant casual, no shorts or open-toed footwear is allowed. All garments for gentlemen must come with a collar. If the delegates do not like to take the Chinese food, he/she still can choose the western food at same restaurant. 05/8 07:00 Get up 11 Fri 07:30 – 08:10 Breakfast 08:30 – 11:00 11:30 Plenary Panel Session 11:45 – 13:00 13:00 14:00 Lunch 14:30 - Check your cabin Disembark Sentosa Tour Buffet breakfast at deck 12 At Picture House at deck 8 Max for 80 pax, first come first serve and the door will closes once venue is filled. Take your luggage from your cabin Take your lunch Check out Immigration Delegates will be sent to Sentosa Island for free tour. Note: □1.A shuttle bus will be scheduled to send delegates to the conference-recommended hotel, if delegate book the room in advance, at 21:00 pm. □2.Delegate also can book his preferred hotel, and arrange his/her journey freely onward. □3.Recommended Hotel (at own expense) Oxford Hotel 218 Queen Street, Singapore 188549 - S$ 150.00 per room per night with breakfast. Link Hotel www.linkhotel.com.sg 50 Tiong Bahur Road, Singapore 168733 - S$ 200.00 per room per night with breakfast. Gallery Hotel www.galerryhotel.com.sg 1 Nanson Road Singapore 238909 @ Robertson Quay - S$ 230.00 per room per night with breakfast & internet 12 Program at a Glance 13 This Page Intentionally Left Blank. 14 Agenda of ICCSE 2011 l Pre-Conference Workshop, Taiyuan, China (July 25-27, 2011) Sunday, July 24 Zhuofan Haojing Hotel, Taiyuan, China 13:00–21:00 Onsite Registration Lobby Monday, July 25 l 08:30 - 09:00 Opening Ceremony 09:30 -11:30 Plenary Panel Session (MoA) 14:30 – 18:00 Taiyuan City Tour Conference, Singapore (August 3-5, 2011) Wednesday, Aug 3 1 Maritime Square, Singapore Cruise Centre, Level 2, Singapore 10:00–17:40 Onsite Registration; Cruise Check-in. Counter #2-25/27, Cruise Centre Thursday Morning, Aug 4 SuperStar Virgo Cruise 08:00–08:20 Opening Ceremony 08:20-08:50 Group Photography 09:10-10:00 Keynote Speech I (ThK1) The Lido Room, Deck 7/8 The Lido Room, Deck 7/8 Impulse Stochastic Control and Composite Markov Processes Xi-Ren Cao Prof, Phd, Fellow of IEEE, Fellow of IFAC Shanghai Jiaotong University Hong Kong University of Science and Technology 10:20-11:10 Keynote Speech II (ThK2) The Lido Room, Deck 7/8 A Framework for the Control of Multi-Agent Systems Jie Huang Prof, Phd, Fellow of IEEE, Fellow of IFAC, Fellow of CAA Department of Mechanical and Automation Engineering The Chinese University of Hong Kong 10:20-11:10 Invited Speeches (ThA) 12:00-13:30 The Lido Room, Deck 7/8 Luncheon Thursday Afternoon, Aug 4 Redang Tour 18:30-19:30 Banquet (ThB) 15 Bella Vista (deck 6) 19:30 – 22:00 Free Talk Session (ThC) Bella Vista (deck 6) Track/Region 1 2 3 4 Topic ThC1 Artificial Intelligence II ThC2 Computer Education V ThC3 Computer Education VI ThC4 Web-based Education Mode Track/Region 5 6 7 8 Topic ThC5 Web Application ThC6 Communication & Networking II ThC7 Computer Application III ThC8 Control Technology Track/Region 9 10 11 12 Topic ThC9 Computer Application IV ThC10 Communication & Networking III ThC11 Computer Education VII ThC12 Wireless Mesh Network Track/Region 13 14 15 Topic ThC13 Computer Application IV ThC14 Database & Systems Engineering II ThC15 Computer Education VII Friday Morning, Aug 5 Parallel Sessions (FrA) Track 1 2 FrA 08:30-10:30 FrA1 Computer Education FrA2 Computer Education II 12:30-13:30 Picture House (deck 8) Luncheon Friday Afternoon, Aug 5 Sentosa, Singapore A shuttle bus will be scheduled to send delegates to the conference-recommended hotel at 21:00 pm. 16 Technical Program 17 This Page Intentionally Left Blank. 18 Jing Chunfeng Wu Di Li Xiaoli Shao Yongni MoA 1 Artificial Intelligence MoA 1.1 The Calculation Approach of the Nearest Neighbor Distance of Chaotic Time Series’s Reconstructed Space, pp. 1-5. Gong Zhuping South China Univ. of Tech. Zhao Kuiling South China Univ. of Tech. Zhejiang Inst. of Mechanical & Electrical Engineering Zhejiang Univ. Zhejiang Univ. Zhejiang Univ. MoA 2.6 Design of Transcutaneous Coupling Wireless Charger, pp. 41-46. Li Ning Xiamen Univ. Yu Xiao Xiamen Univ. Zhang Ning Xiamen Univ. MoA 1.2 Delay-Dependent Robust Stability and Stabilization for Norm-Bounded Uncertain Systems with Time-Varying Delay, pp. 6-11. Li Lee National Sun Yat-Sen Univ. Junshen Chen National Sun Yat-Sen Univ. MoA 2.7 The Application of Pipeline Technology: An Overview, pp. 47-51. Li Yizhen Xiamen Univ. Ling Lin Xiamen Univ. Wu Jun Xiamen Univ. MoA 1.3 Study on Power E-Commerce Network Security Technique and Design Based on Firewall, pp. 12-15. Yang Liuqing Fuzhou Vocational & Technical Inst. Hu Yu Fuzhou Vocational & Technical Inst. Huang Weimin Fuzhou Vocational & Technical Inst. MoA 3 Control Technology MoA 3.1 Optimization Research of Building Exports Positions based on the Evacuating Movement, pp. 52-55. Song Bingxue Univ. of Sci. & Tech. Beijing Wang Ziyang Beijing Jiaotong Univ. MoA 1.4 The Research and Practice of Inquiry Learning Model Based on the Network Environment, pp. 16-18. Jihua Ye Jiangxi Normal Univ. Dengwen Gan Jiangxi Normal Univ. Pingliao Zhu Jiangxi Normal Univ. Jiangxi Vocational & Technical Chunlan Wang College of Electricity MoA 3.2 Parameters Optimization of Mechanical Arm PID Controllers Based on CLPSO Algorithm, pp. 56-60. Li Xiaolong Southwest Jiaotong Univ. Chen Yanjie Hunan Univ. Yu Xiao Xiamen Univ. MoA 1.5 Application of Individualized Teaching Model for Basic Computer Science at Vocational Colleges, pp. 19-21. Zhejiang Inst. of Mechanical Zhou Zili & Electrical Engineering Zhejiang Inst. of Mechanical Feng Hanrong & Electrical Engineering MoA 3.3 The Robust H∞ Control for Discrete-time Switched Interval System, pp. 61-65. Zhang Damin Zhejiang Univ. Zhang Xiaoli Xiamen Univ. Lu Zhengyu Zhejiang Univ. MoA 1.6 The Design and Research Based on the Intrusion Detection Model of Packet Filtering Technology, pp. 22-23. Li Cuizhi Business College of Shanxi Univ. Zhang Hui Business College of Shanxi Univ. Wu Liping Business College of Shanxi Univ. MoA 3.4 Simulation of the Intelligent Control Circuit based on Petri Net, pp. 66-69. Jihua Ye Jiangxi Normal Univ. Jianlian Li Jiangxi Normal Univ. Fangqi Deng Jiangxi Normal Univ. Jiangxi Vocational & Technical Chunlan Wang College of Electricity MoA 2 Computer Application MoA 3.5 Design of Vertical Parking Monitor System, pp. 70-73. Changqing Cai Changchun Inst. of Tech. Lixin Wang Shenyang Univ. of Tech. Yan Zhao Univ. of Sci. & Tech. of China MoA 2.1 The Apply of ID3 in Stock Analysis, pp. 24-27. Chen Chen Chinese People's Armed Police Force Academy MoA 3.6 The Control Algorithm for a Photovoltaic Inverter to be Applied in Weak Power Grid, pp. 74-77. Shi Zhenyin Gansu Electric Power Design Inst. Zheng Xin Gansu Electric Power Design Inst. Wang Liping Gansu Electric Power Design Inst. MoA 2.2 A New Approach for Noisy Iris Database Indexing Based on Color Information, pp. 28-31. Qin Zhao Taiyuan Univ. MoA 2.3 The Development and Designation of Visual Experiments on Demonstration and Assembly of Computers, pp. 32-34. Yu Hongtao Inner Mongolia Univ. for Nationalities Bo Jinli Inner Mongolia Univ. for Nationalities MoA 4 Artificial Intelligence MoA 2.4 Based on Excel and Macro Designing Standardization Self-test System, pp. 35-37. Zhou Minghong Business College of Shanxi Univ. MoA 4.1 Multi-objective Optimization in Dynamic Environment:A Review, pp. 78-82. Rui Chen Xiamen Univ. Wenhua Zeng Xiamen Univ. MoA 2.5 Discrimination of Varieties of Rice Using Near Infrared Spectral by PCA and MDA Model, pp. 38-40. Zhejiang Inst. of Mechanical Zhou Zili & Electrical Engineering MoA 4.2 Design and Realization of SPI Interface in Lithium-ion Battery Voltage Measuring System, pp. 83-87. An Shiqi Qingdao Univ. of Sci. & Tech. Qi Anning Qingdao Univ. of Sci. & Tech. 19 Zhu Yuwei Qingdao Inst. of Bioenergy & Bioprocess Tech. MoA 6.1 S-T Analysis of Classroom Teaching, pp. 136-140. Yuan Jun Guangxi Teachers Education Univ. Ou Huanghai Guangxi Teachers Education Univ. MoA 4.3 A Multidimensional Data Analysis System Based on MDA for Educational Data Warehousing, pp. 88-94. Xuejian Yan Shandong Univ. Xueqing Li Shandong Univ. MoA 6.2 Research and Practice on Higher Vacational “Photogrammetry and Remote Sensing” Course Construction, pp. 141-144. Tong Biao Liaoning Provincial College of Communication Wu Wenbo Liaoning Provincial College of Communication MoA 4.4 A Comparison of Multi-Tenant Data Storage Solutions for Software-as-a-Service, pp. 95-98. Shaoquan Fang Tsinghua Univ. Qiuli Tong Tsinghua Univ. MoA 6.3 Exploration of Visual Teaching for Digital Filter Design, pp. 145-148. Yang Fulong Lanzhou Univ. of Tech. Zhang Aihua Lanzhou Univ. of Tech. Lin Dongmei Lanzhou Univ. of Tech. MoA 4.5 A Design of Distributed Collaborative Intrusion Detection Model, pp. 99-101. Zhang Hui Business College of Shanxi Univ. MoA 6.4 Base on Human-Computer Interaction Perspective to Analyze the Factors of Technology Acceptance Model on IRSSP for Taiwan Recommendatory Admission, pp. 149-153. Chien-Yun Dai National Taiwan Normal Univ. Jin-Jung Jang National Taiwan Normal Univ. Tzu-Hao Lee National Taiwan Normal Univ. Yu-Tsang Chen Chung Shan Industrial Commercial High School Yu-Hsi Yuan National Taiwan Normal Univ. MoA 4.6 Research on M-learning supported by 3G/4G, pp. 102-106. Zhizhen Yang Shanghai Second Polytechnic Univ. Zhihui Yang North China Univ. of Tech. MoA 4.7 Implementation of Software Testing Course Based on CDIO, pp. 107-110. Zhang Yinnan Zhejiang Univ. of Sci. & Tech. Wang Xiaochi Zhejiang Univ. City College MoA 6.5 A Mode of Ability-targeted Computer Curriculum Reform Based on Projects in Engineering Education, pp. 154-157. Zhejiang Inst. of Mechanical Yifang Zhang & Electrical Engineering Zhejiang Inst. of Mechanical Binwei Yang & Electrical Engineering MoA 5 Software Engineering MoA 5.1 A Study on the Methods of Software Testing Based on the Design Models, pp. 111-113. Tangtang Xie Southwest China Univ. Jun Li Southwest China Univ. Hanrong Chen Southwest China Univ. Hailing Xiong Southwest China Univ. MoA 6.6 Improving Computing Undergraduates’ Entrepreneurial Abilities, pp. 158-161. Huang Lingli China Jiliang Univ. Huang Jun China Jiliang Univ. MoA 5.2 Design of Database Architecture in the SaaS-based Multi-tenant Educational Information System, pp. 114-119. Jiangman Xu Shandong Univ. Xueqing Li Shandong Univ. Xinxiao Zhao Shandong Univ. MoA 6.7 The Educational Modeling Languages in Instructional Design: Towards a UML Applications, pp. 162-165. Zhi Jiang Jimei Univ. ThA 1 Computer Application MoA 5.3 Design of a Multiple Modeling Language Supported Workflow Architecture in Educational Information System, pp. 120-125. Xinxiao Zhao Shandong Univ. Xueqing Li Shandong Univ. Jiangman Xu Shandong Univ. ThA 1.1 An Empirical Study of Consumer’s Repurchase Intention of Tablet PC, pp. 166-171. Yin-Tsuo Huang Toko Univ. Kuowei Lee National Taichung Inst. of Tech. Wenyuan Chan Yunnan Univ. MoA 5.4 The Construction of Chinese Chess Computer Game Platform, pp. 126-128. Wei Zhou Northeastern Univ. Jianchang Liu Northeastern Univ. Yuanhe Zhao Northeastern Univ. ThA 1.2 Application of ICT in Human Machine Interface Design Course, pp. 172-175. Liu Wenjie Northwestern Polytechnical Univ. Zhou Yuntao Northwestern Polytechnical Univ. MoA 5.5 Research and Design of Network Behavior Management System Based on B/S Architecture, pp. 129-132. Deng Xinxin Xiamen Univ. Qiu Zhongpan Xiamen Univ. Yang Xiaofang Xiamen Univ. ThA 1.3 Improving University e-Learning with Exploratory Data Analysis and Web Log Mining, pp. 176-179. Chakarida Nukoolkit King Mongkut's Univ. of Tech. Thonburi Praewphan Chansripiboon King Mongkut's Univ. of Tech. Thonburi Satita Sopitsirikul King Mongkut's Univ. of Tech. Thonburi MoA 5.6 Application of Lightweight Software Framework Based on SSH, pp. 133-135. Weixing Wang Chongqing Univ. ThA 1.4 Research on Distance Collaborative Activities for Teacher Education based on Online Video and Cloud Computing MoA 6 Computer Education 20 Environment, pp. 180-185. Baocong Jiao Sufang An Hongyun Wang Haiguang Fang Selection, pp. 222-225. Geng Yan Wang Wenjing Capital Normal Univ. Captical Normal Univ. Captical Normal Univ. Captical Normal Univ. ThC 1.11 User Alias Authority Ranking Based on Email Communication Relation Analysis, pp. 226-231. Meijuan Yin Zhengzhou Info. Sci. & Tech. Inst. Junyong Luo Zhengzhou Info. Sci. & Tech. Inst. Xiaonan Liu Zhengzhou Info. Sci. & Tech. Inst. Xiao Li Zhengzhou Info. Sci. & Tech. Inst. ThC 1 Artificial Intelligence ThC 1.1 Research on Expert System of Diseases and Insects of Jujube Based on Neural Networks, pp. 186-188. Song Jianwei Shijiazhuang Univ. Wu Shuomei Shijiazhuang Univ. Ren Ji Shijiazhuang Television College Yu Xiaohong Hebei Taihang Machinery Industries Corporation ThC 1.12 DNA Computing Research Progress and Application, pp. 232-235. Yanyan Huang Xiamen Univ. Ling He Xiamen Univ. ThC 1.13 P2P Caching Sequences Based on Partial Trust Negotiation Game, pp. 236-239. Chunzhi Wang Hubei Univ. of Tech. Ruoxi Wang Huazhong Normal Univ. Hong Li Hubei Univ. of Tech. Chen Hongwei Hubei Univ. of Tech. ThC 1.2 Research on UAV Health Evaluation Based on PNN, pp. 189-190. Kun Zhang Northwestern Polytechnical Univ. Deyun Zhou Northwestern Polytechnical Univ. ThC 1.3 An Iterative Algorithm for Solving Complementarity Problems and its Convergence, pp. 191-194. Yalu Liu Beijing Inst. of Petro-Chemical Tech. Dandan Yang Inner Mongolia Normal Univ. ThC 1.14 The Automatic Detection Algorithm of Tongue Cancer Stem Cells Based on Fuzzy Pattern Recognition, pp. 240-244. Kehe Cai Wuhan Univ. Mengyi Liu Wuhan Univ. Yuyu Zhang Wuhan Univ. ThC 1.4 Research on CPS Spatio-Temporal Event Model Based on the State, pp. 195-198. Chen Lina National Univ. of Defense Tech. Huang Hongbin National Univ. of Defense Tech. Deng Su National Univ. of Defense Tech. ThC 1.15 A Novel Circle Covering Algorithm Based on Coulomb Force Model for the Problem of Locating Repeaters, pp. 245-249. Yuyu Zhang Wuhan Univ. Jiquan Yin Wuhan Univ. Peng Zhang Wuhan Univ. ThC 1.5 Development of Particle Swarm Optimization Algorithm, pp. 199-204. Yu Chen Xiamen Univ. Fan Yang Xiamen Univ. Quan Zou Xiamen Univ. Chen Lin Xiamen Univ. ThC 1.16 Constructing the Representation Model of Arithmetic Word Problems for Intelligent Tutoring System, pp. 250-255. Yuhui Ma Bohai Univ. Kai Tan Bohai Univ. Limin Shao Bohai Univ. Xiaojing Shang Bohai Univ. ThC 1.6 Text Cohesion Visualizer, pp. 205-209. Chakarida Nukoolkit Praewphan Chansripiboon Pornchai Mongkolnam Richard Watson Todd Business College of Shanxi Univ. Business College of Shanxi Univ. King Mongkut's Univ. of Tech. Thonburi King Mongkut's Univ. of Tech. Thonburi King Mongkut's Univ. of Tech. Thonburi King Mongkut's Univ. of Tech. Thonburi ThC 1.17 Design of Automated Course Scheduling System Based on Hybrid Genetic Algorithm, pp. 256-259. Yong Ouyang Hubei Univ. of Tech. Yi Chen Hubei Univ. of Tech. ThC 1.18 Heuristic Simulated Annealing Genetic Algorithm for Traveling Salesman Problem, pp. 260-264. Luo Delin Xiamen Univ. Zhao Lixiao Xiamen Univ. Xu Zhihui 95168 Military Unit ThC 1.7 Improve VSM Text Classification by Title Vector Based Document Representation Method, pp. 210-213. Tian Xia Shanghai Second Polytechnic Univ. Yi Du Shanghai Second Polytechnic Univ. ThC 1.19 Iterative Learning Control for Uncertain Time-delay Linear System, pp. 265-268. Jie Wu Hubei Normal Univ. Xisheng Zhan Hubei Normal Univ. ThC 1.8 Formal Contexts in Ontologies, pp. 214-217. Sun Yu Yunnan Normal Univ. Xia Youming Yunnan Normal Univ. Li Zhiping Yunnan Normal Univ. ThC 1.20 Research on Intelligent Test Paper Generation Base on Improved Genetic Algorithm, pp. 269-272. Chen Xiumin Hebei Normal Univ. of Sci. & Tech. Wang Dengcai Hebei Normal Univ. of Sci. & Tech. Zhu Meining Hebei Normal Univ. of Sci. & Tech. Yang Yanping Hebei Normal Univ. of Sci. & Tech. ThC 1.9 A New Method for Classification in DNA Sequence, pp. 218-221. Qingda Zhou Xiamen Univ. Qingshan Jiang Shenzhen Inst.s of Advanced Tech., Chinese Academy of Sci.s Dan Wei Xiamen Univ. ThC 1.21 An Improved System Dynamics Model for China’s Ration Demand System, pp. 273-277. ThC 1.10 Question Classification Oriented Chinese Framenet Feature 21 Yanhua Li Xiuxia Lu Bingjun Li Henan Agricultural Univ. Henan Agricultural Univ. Henan Agricultural Univ. ThC 2.4 Measurements and Analysis of Internet Physical Properties Based on ICMP, pp. 320-323. Jinjun Hu Southwest Univ. of Sci. & Tech. Ling Xing Southwest Univ. of Sci. & Tech. Jianguo Ma Southwest Univ. of Sci. & Tech. Qiang Ma Southwest Univ. of Sci. & Tech. ThC 1.22 A New Approach to Stability Analysis of Systems with State Delay, pp. 278-280. Jie Wu Hubei Normal Univ. ThC 2.5 Improvement on Decoding of the (71, 36, 11) Quadratic Residue Code, pp. 324-329. Hungpeng Lee Fortune Inst. of Tech. Hsinchiu Chang Fortune Inst. of Tech. ThC 1.23 Research of Optimal Placement of Active Reference Tags Based on LANDMARC Algorithm, pp. 281-285. Weiguang Shi Tianjin Univ. Kaihua Liu Tianjin Univ. Chunya Ni Tianjin Univ. Ge Yan Tianjin Univ. ThC 2.6 The Test and Analysis of FMO Model in Error Concealment Based on H.264, pp. 330-332. Du Li Jiangxi Univ. of Sci. & Tech. Junqin Wu Jiangxi Univ. of Sci. & Tech. ThC 1.24 Diagonal Recurrent Neural Network with Output Feedback and its Application, pp. 286-288. Lisang Liu Xiamen Univ. Xiafu Peng Xiamen Univ. ThC 2.7 Study on Digital Measurement Methods of Engine Transient Speed and Corresponding Error, pp. 333-336. Cheng Wang Huaiyin Inst. of Tech. Shanzhen Xu Huaiyin Inst. of Tech. ThC 1.25 Jurisprudence on New Developments of Brain Science, pp. 289-292. Wu Xuyang Xiamen Univ. Zou Yuzhuo Xiamen Univ. ThC 2.8 Power Design of 3G Wireless Data Terminal Based on USB Bus, pp. 337-339. Liu Xiaochun Chang-an Univ. Hu Dongping ZTE Corporation ThC 1.26 Law Philosophy Analysis: Application of Medical Instruments for Direct Reading and Influence of the Activities of Cranial Nerve, pp. 293-296. Wu Xuyang Xiamen Univ. Zou Yuzhuo Xiamen Univ. ThC 2.9 Spatial Sampling Criteria for Recognition of Structures, pp. 340-343. Han Yueping North Univ. of China Li Ruihong North Univ. of China Han Yan North Univ. of China ThC 1.27 A Fast Adaptive Stream Cipher Algorithm and Expanded Search, pp. 297-304. Xiaojing Hu Xiamen Univ. Lizhao Liu Xiamen Univ. Ying Wang Xiamen Univ. Maoqing Li Xiamen Univ. Tianhua Zhang Louisiana Tech Univ. ThC 2.10 Face Recognition Based on Singular Value and Feature-matrix, pp. 344-347. Hu Hongping North Univ. of China Li Ruihong North Univ. of China Zhou Hanchang North Univ. of China ThC 1.28 An Indoor Positioning Technology Based on GA-BP Neural Network, pp. 305-309. Miao Kehua Xiamen Univ. Chen Yaodong Xiamen Univ. Miao Xiao Xiamen Univ. ThC 3 Computer Application ThC 3.1 A New Study on the Integrating of Random Walk Process and Multiple Point Geostatistics to Model the Fluvial Reservoir, pp. 348-350. Yin Yanshu Yangtze Univ. Ding Hui Yangtze Univ. Shi Shuyuan Yangtze Univ. ThC 2 Communication Technology ThC 2.1 A Transient Signal Detection Technique Based on Flatness Measure, pp. 310-312. Xuemin Zhang Changchun Inst. of Tech. Changqing Cai Changchun Inst. of Tech. Jianhong Zhang Changchun Inst. of Tech. ThC 3.2 Integrating Data from Multiple Disciplines for Reservoir Microfacies Forecasting, pp. 351-353. Yin Yanshu Yangtze Univ. Feng Shu Yangtze Univ. ThC 2.2 An Improved Warped DFT Algorithm Based on Signal Sparse Representation, pp. 313-315. Jian Zhou Anhui Univ. Chenyang Cui Anhui Univ. Guofeng Zhu Anhui Univ. Yaguang Ding Anhui Univ. Liang Tao Anhui Univ. ThC 3.3 Research of Spatial Index & Caching for Power GIS, pp. 354-357. Wang Xiaohui North China Electric Power Univ. Wu Kehe North China Electric Power Univ. Xu Xuerong North China Electric Power Univ. ThC 3.4 A Research of Online Exam System Based on SSH Architecture, pp. 358-360. Li Gengming Xiamen Univ. ThC 2.3 Finite Element Analysis of Composite Leaf Spring, pp. 316-319. Zheng Yinhuan Wuhan Univ. of Tech. Xue Ka Wuhan Univ. of Tech. Huang Zhigao Wuhan Railway Vocational College of Tech. ThC 3.5 Application Research of Fuzzy Clustering Approach in the New Rural Cooperative Medical Insurance System Module, pp. 22 361-364. Tang Zhong Yang Gefeng Ou Xu Liang Zhisheng Supportive E-Learning Environment, pp. 411-415. Ye Conghuan Xiaogan Univ. Guangxi Medical Univ. Guangxi Medical Univ. Guangxi Medical Univ. Guangxi Medical Univ. ThC 3.18 A Service Computing Model Based on Interaction Among Local Campus Clouds, pp. 416-419. Ye Conghuan Xiaogan Univ. ThC 3.6 Information Technology in Teacher's Professional Skill Training Application, pp. 365-369. Xilong Tan Hubei Univ. of Education Huiling Wang Hubei Univ. of Education ThC 3.19 The Forecasting of Shanghai Index Trend Based on Genetic Algorithm and Back Propagation Artificial Neural Network Algorithm, pp. 420-424. Li Yizhen Xiamen Univ. Zeng Wenhua Xiamen Univ. Lin Ling Xiamen Univ. Wu Jun Xiamen Univ. Lu Gang Xiamen Univ. ThC 3.7 Scheduling Model of Access Requests in Open Storage Architectures, pp. 370-374. Xian Wu Soochow Univ. Jianxi Fan Soochow Univ. Jiwen Yang Soochow Univ. ThC 3.20 Constructions on Disaster Tolerant Backup System of Management Information System, pp. 425-427. Liangping Zhang Chongqing Tech. & Business Univ. Weixing Wang Beihai Vocational College ThC 3.8 High-cost-performance and Simple Moving Sticks Length Measurement Device, pp. 375-379. Du Bo Changchun Inst. of Tech. Cai Changqing Changchun Inst. of Tech. ThC 3.21 The Land Use Planning Environmental Impact Assessment in Longnan City, pp. 428-432. Yingying Liu Northwest Normal Univ. Peiji Shi Northwest Normal Univ. Chunyu Liu Northwest Normal Univ. Jinghu Pan Northwest Normal Univ. ThC 3.9 Research Based on Real Time Monitoring System of Digitized Agricultural Water Supply, pp. 380-383. Yunchen Liu Shandong Univ. Yu Chen Shandong Univ. Yunpeng Zhang Shandong Univ. Jun Tong Shandong Univ. ThC 3.22 Data Decoding of Flight Recorder Tape Based on Image Recognition, pp. 433-436. Yang Quanfa Beihang Univ. Ren Zhang Beihang Univ. Hu Shuzheng Beijing Aeronautical Tech. Research Center Wang Zheng Beijing Aeronautical Tech. Research Center ThC 3.10 How to Regulate Computer Crime in Germany Criminal Law, pp. 384-385. Chunlin Wang Jiangsu Univ. ThC 3.11 A Parameter Selection of Support Vector Machine with Genetic Algorithm for Citrus Quality Classification, pp. 386-390. Tang Guoxiang Southwest Univ. Qu Ming Southwest Univ. Wang Xuan Southwest Univ. Lv Jiake Southwest Univ. ThC 3.23 Simulation and Experimental Study on Electromagnetic Field in Magnetic Particle Clutch, pp. 437-440. Shanzhen Xu Huaiyin Inst. of Tech. Cheng Wang Huaiyin Inst. of Tech. ThC 3.12 Application of Data Mining in the Analysis of Needs of University Library Users, pp. 391-394. Tingting Zhu Changchun Inst. of Tech. Lili Zhang Changchun Inst. of Tech. ThC 3.24 A Novel Method Based on Lines Clustering for Extracting Multi-ROI in Images with Simple Background, pp. 441-444. He Jun Beijing Normal Univ. Sun Bo Beijing Normal Univ. Yu Lejun Beijing Normal Univ. ThC 3.13 Analysis of Properties on Cargo Constrained System of Truck Rollover Based on MATLAB/simulink, pp. 395-397. Zhao Yan Wuhan Univ. of Tech. Wang Jun Wuhan Univ. of Tech. ThC 3.25 Multi-objective Optimization Design of Multi-piece Leaf Springs Based on Pareto, pp. 445-448. Wu Yonghai Huaiyin Inst. of Tech. Fan Qinman Huaiyin Inst. of Tech. ThC 3.14 Analysis of Swinging Angle Hydraulic Detection System of Constant Velocity Universal Joints Based on MATLAB, pp. 398-401. Wang Jun Wuhan Univ. of Tech. Zhao Yan Wuhan Univ. of Tech. ThC 3.26 A New Improved Algorithm Applicated in NCO Based on Specific Angle, pp. 449-451. Liu Bin Taiyuan Inst. of Tech. He Qiusheng Taiyuan Univ. of Sci. & Tech. ThC 3.15 Combined Water Seam Crystallizer’s Thermal Field Analysis and Simulation , pp. 402-405. Dachao Hu Shanghai Inst. of Tech. Junling Hu Univ. of Bridgeport ThC 3.27 Modeling and Simulation of Truck with Random Vibration Response, pp. 452-455. Wu Yonghai Huaiyin Inst. of Tech. Fan Qinman Huaiyin Inst. of Tech. ThC 3.16 The Inquiry in Hospital Beds Arrangement Based on Queuing Theory, pp. 406-410. Ou Yang Guangxi Teachers Education Univ. ThC 3.28 Numerical Analysis on the Pressure Waves in Tunnels, pp. 456-459. Bao Haitao Huaiyin Inst. of Tech. ThC 3.17 ThC 3.29 Service Delivery Using Social Network Analysis in P2P Study the Effect of Rear Spoiler on Car Aerodynamics 23 Characteristics, pp. 460-463. Bao Haitao Xu Mingbao Zhou Xiaojun Huaiyin Inst. of Tech. ThC 3.30 Research of Ant Colony Algorithm and the Application of 0-1 Knapsack, pp. 464-467. Ling He Xiamen Univ. Yanyan Huang Xiamen Univ. The Maintenance Section of North Xiangfan The Maintenance Section of Jianan ThC 4.3 A Hybird Hierarchical Architecture for 3D Multi-Cluster NoC, pp. 512-516. Wang Jiawen Nanjing Univ. Li Li Nanjing Univ. Zhang Yuang Nanjing Univ. Pan Hongbing Nanjing Univ. He Shuzhuan Nanjing Univ. Zhang Rong Nanjing Univ. ThC 3.31 Research on the Strategy of Power Management for Submersible Temperature Logger, pp. 468-471. Dalei Song Ocean Univ. of China Bin Liu Ocean Univ. of China Fangjie Yu Ocean Univ. of China Bing Xue Ocean Univ. of China ThC 4.4 Implementation Scheme for Capacitive Touch Sliding, pp. 517-520. Bo Jiang Wuhan Polytechnic Univ. Long Zhou Wuhan Polytechnic Univ. ThC 3.32 Community Mining in Dynamic Social Networks—Clustering Based Improved Ant Colony Algorithm, pp. 472-476. Zhang Nan Jilin Univ. Wang Zhe Jilin Univ. ThC 4.5 Performance Comparison of Single Board Computer: A Case Study of Kernel on ARM Architecture, pp. 521-524. Naufal Alee Univ. Malaysia Perlis Mostafijur Rahman Univ. Malaysia Perlis R. B Ahmad Univ. Malaysia Perlis ThC 3.33 Cluster, Grid and Cloud Computing: A Detailed Comparison, pp. 477-482. Naidila Sadashiv Acharya Inst. of Tech. S.M Dilip Kumar Univ. Visvesvaraya College of Engineering ThC 4.6 A Mobile RFID Localization Algorithm Based on Instantaneous Frequency Estimation, pp. 525-530. Jiexiao Yu Tianjin Univ. Kaihua Liu Tianjin Univ. Peng Luo Tianjin Univ. ThC 3.34 Design and Optimization of Drip Irrigation Emitters Using Directly of Sewage, pp. 483-488. Jiang Fan Guangzhou Univ. Huang Chunman Guangdong Baiyun Univ. Xiang Jianghua Guangzhou Univ. Wang Yijun Guangzhou Univ. ThC 4.7 Flash Aging Prevention Technique (FAP) for Flash Based Solid State Disks, pp. 531-536. Anam Zaman National Univ. of Sci. & Tech., Pakistan Sumayya Shiraz National Univ. of Sci. & Tech., Pakistan Saba Zia National Univ. of Sci. & Tech., Pakistan Abdullah Mansoor National Univ. of Sci. & Tech., Pakistan Farooq Ahmed National Univ. of Sci. & Tech., Pakistan ThC 3.35 Design of the USB Download Interface Based on Embedded POS, pp. 489-491. Zhu Zhengwei Changzhou Univ. Gu Hao Changzhou Univ. ThC 4.8 Room Temperature and Humidity Monitoring and Energy-saving System, pp. 537-540. Xianzhe Hua Guizhou Univ. ThC 3.36 Practice and Application of Multisim in Digital Electronic Experiment Teaching, pp. 492-494. Yan Guohong Zhejiang Sci-Tech Univ. Zhang Shuiying Zhejiang Sci-Tech Univ. Du Jingjing Zhejiang Sci-Tech Univ. ThC 4.9 Optical Burst Switching for Many-Core Processor-to-Memory Photonic Networks, pp. 541-546. Quanyou Feng National Univ. of Defense & Tech. Dongsong Ban National Univ. of Defense & Tech. Huanzhong Li National Univ. of Defense & Tech. Wenhua Dou National Univ. of Defense & Tech. ThC 3.37 Virtualization in Railway Datacenter Management Environment, pp. 495-498. Wei Wang Beijing Jiaotong Univ. Yu Zhao Beijing Jiaotong Univ. ThC 4.10 A Research on Storage Performance Optimization of Virtual Machine, pp. 547-551. Dongsheng Yin Sun Yat-sen Univ. Jianan Liang Sun Yat-sen Univ. ThC 3.38 Health Care Fraud Detection Using Nonnegative Matrix Factorization, pp. 499-503. Shunzhi Zhu Xiamen Univ. of Tech. Yan Wang Xiamen Univ. of Tech. Yun Wu Xiamen Univ. of Tech. ThC 4.11 The System MP3 on the Basis f SD Card Applied to the Elevator Multimedia, pp. 552-556. Zheng Xiaoyi Xiamen Univ. Li Suxun Xiamen Univ. Zhang Ning Xiamen Univ. Yan Lingjie Xiamen Univ. ThC 4 Computer Architecture ThC 4.1 Voice for the Voiceless, pp. 504-507. K.Rajeswari Sri Sai Ram Engineering College E.Jeevitha Sri Sai Ram Engineering College MR.Meenakshi Sri Sai Ram Engineering College V.K.G. Kalaiselvi Sri Sai Ram Engineering College ThC 5 Computer Education ThC 5.1 The Study of Higher Education of the Disabled from the Perspective of Human Capital Theory, pp. 557-561. Xiaoyan Liu Tianjin Univ. of Tech. Han Tan Tianjin Univ. of Tech. ThC 4.2 Research for Rotor Monitoring System Based on Virtual Instrument Technology, pp. 508-511. Huang Zhigao Wuhan Railway Vocational College of Tech. 24 Chengyin Zhang Xiaoqian Guo Tianjin Univ. of Tech. Tianjin Univ. of Tech. Research and Practice on Teaching Computer Science Undergraduates Based on Educational Games, pp. 605-608. Feng Yang Heilongjiang Univ. Guangtian Zhou Heilongjiang Univ. ThC 5.2 China-U.S. Educational Exchange in the History, pp. 562-567. Yanxiang He Wuhan Univ. Ye Tian Wuhan Univ. Jie Deng State Univ. of New York at Binghamton ThC 5.14 Surveying and Analyzing Graduate Students' Studying Satisfaction Degree, pp. 609-613. Qiaoyun Chen Nanjing Normal Univ. Yi Li Nanjing Normal Univ. ThC 5.3 Innovation of Practical Teaching Pattern of Network Engineering Specialty Based on Capability, pp. 568-571. Liu Wenzhi Jiangsu Province Support Software Engineering R & D Center for Modern Info. Tech. Application in Enterprise Liu Zhaobin Jiangsu Province Support Software Engineering R & D Center for Modern Info. Tech. Application in Enterprise Zhao Hongyi Xi'an Univ. of Tech. ThC 5.15 Analysis on the Difference between Public Education and Social Security in Regulating Income Distribution, pp. 614-618. Zeng Yi Wuhan Univ. ThC 5.16 Research and Implement of the Virtual Laboratory of Power Electronics Based on LabVIEW, pp. 619-622. Qiong Cheng Hubei Univ. of Tech. Bo Fu Hubei Univ. of Tech. ThC 5.4 The Research of College Computer Courses Teaching Quality Improvement, pp. 572-576. Qing Ye Jiangxi Univ. of Traditional Chinese Medicine Minghai Jiao Northeastern Univ. ThC 5.17 Research on Multi-purpose Training-based Curriculum System of Computer Concept, pp. 623-626. Wei Yuanyuan Wuhan Textile Univ. Wei Min Wuhan Univ. of Tech. ThC 5.5 Core Basic Course Group Construction in Computer Major, pp. 577-579. Wang Zhixiao China Univ. of Mining & Tech. Meng Fanrong China Univ. of Mining & Tech. ThC 5.18 Study on the Coordinated Development between Higher Vocational & Technical Education, pp. 627-630. Wang Yudong Jiangmen Polytechnic Chen Yao Jiangmen Polytechnic ThC 5.6 Analysis of Computer Teaching Reform from the Perspective of Learning Psychology at Univeristy of Chinese Medicine, pp. 580-583. Xiuju Zhan Guangzhou Univ. of Chinese Medicine Xiufeng Liu Guangzhou Univ. of Chinese Medicine ThC 5.19 A Practical Teaching Approach to Management Information System Course, pp. 631-633. Haihe Shi Jiangxi Normal Univ. ThC 5.7 Research on Web-based Teaching and Learning Self-directed Platform, pp. 584-587. Ping Yan Shenyang Aerospace Univ. Minghai Jiao Northeastern Univ. ThC 5.20 The Thinking of Computer Language Courses in China, pp. 634-637. Yu He Beijing Tech. & Business Univ. ThC 5.21 An Investigation of Undergraduate Software Engineering Curriculum: Iranian Universities Case Study, pp. 638-644. Amin Khodabandeh Amiri Mazandaran Univ. of Sci. & Tech. Maria Banari Mazandaran Univ. of Sci. & Tech. Narges Yousefnezhad Mazandaran Univ. of Sci. & Tech. ThC 5.8 Analysis of Knowledge Based Graphical Password Authentication, pp. 588-591. Gaurav Agarwal Invertis Univ. Saurabh Singh Invertis Univ. Ajay Indian Invertis Univ. ThC 5.22 Kill Two Birds with One Stone: Boosting Graduate Students’ Abilities in Simulation by Realization Dynamic Demonstration Experiments, pp. 645-648. Wang Rui Beihang Univ. Liu Yuming Beihang Univ. Zhao Yan Beihang Univ. ThC 5.9 Network Course Design for Secondary Vocational Education, pp. 592-594. Huang Xingyun Wuhan Univ. of Tech. Guangxi Mech.& Elec. Industry School Ou Qizhong Guangxi Teachers Education Univ. ThC 5.10 Exploration of Education Reform Based on 32-bit Assembly Language Programming, pp. 595-599. Lin Shan Hubei Univ. of Tech. ThC 5.23 Ideas Transforming in the Public Arts Education of Virtual Museum, pp. 649-653. Jiang Zhaojun Nanjing Univ. of Aeronautics & Astronautics Wu Zhibin Nanjing Univ. of Aeronautics & Astronautics ThC 5.11 Exploration of Ternary Training Mode on Continuing Education, pp. 600-601. Liu Baobin Jiangsu Economic & Trade Tech. Inst. Zhou Wei Zhejiang Univ. ThC 5.24 Research on Talent-training Mode of Modern Computer Hardware Design, pp. 654-656. Wei Yuanyuan Wuhan Textile Univ. Wei Min Wuhan Univ. of Tech. ThC 5.12 The Computer Basic Education for Postgraduates in Colleges under Network Teaching Auxiliary Platform Reform and Exploration, pp. 602-604. Boqin Liu Southwest Univ. Junmei He Southwest Univ. ThC 5.25 Construction of Curriculum System on Webpage Design and Website Development in Higher Vocational Colleges, pp. 657-659. Zhejiang Water Conservancy & Guan Xiaohui Hydropower College Zhou Zhimin Zhejiang Water Conservancy & ThC 5.13 25 Hydropower College Yangmei Zheng ThC 5.26 Practical Notes on Teaching Computer Basics in English to International College Students in China, pp. 660-664. Ken Chen Ningbo Univ. Rong Jiang Ningbo Univ. Qingnian Huang Ningbo Univ. Robert M. Randoy O'Hare International Airport Guangxi Youth Leaders College ThC 5.38 Education Reform on Software Programming Courses for Non-IT-Majoring Undergraduates, pp. 715-719. Shaobing Song Hangzhou Normal Univ. Ge Yu Hangzhou Normal Univ. ThC 5.39 Network Education Platform Design of Space for Future Teacher, pp. 720-722. Ou Qizhong Guangxi Teachers Education Univ. Zhang Lanfang Guangxi Normal Univ. ThC 5.27 Design and Exploration of the English Website of the Course Analog Electronic Technology, pp. 665-667. Liang Likai Shandong Univ. Zheng Yamin Shandong Univ. Tong Qiang Shandong Univ. ThC 5.40 Mathematical Education (Computer Application) Professional Facing Difficulties and Countermeasures, pp. 723-725. Qiang Yi Jiujiang Univ. Li Xingnan Jiujiang Univ. Zhou Jingui Jiujiang Univ. ThC 5.28 Research on the Application of Video Cases in Computer Education of College Students, pp. 668-670. Hanrong Chen Southwest Univ. Tangtang Xie Southwest Univ. ThC 5.41 A Study on the Models of Teaching Computer Basic Course in Social Computing Context, pp. 726-729. Chunying Zhang Hebei United Univ. Jianjing Li Hebei United Univ. Xiao Chen Hebei United Univ. ThC 5.29 The Research of Teaching Methodology on Operating System Process Control, pp. 671-674. Zhengde Zhao Shanghai Univ. Genchang Zhao Shanghai Univ. ThC 5.42 Knowledge Representation and Algorithms Automatic Solving Integral Problems, pp. 730-735. Nhon Do Ho Chi Minh City Univ. of Tech. Thu_Le Pham Ho Chi Minh City Univ. of Tech. ThC 5.30 Perspective: Employment Conditions for Computer Engineering Related College Graduates in China, pp. 675-680. Ken Chen Ningbo Univ. Qingnian Huang Ningbo Univ. Ming Hu Ningbo Univ. Robert M. Randoy O'Hare International Airport ThC 5.43 Design and Research of Multimedia Teaching in Sports Technique Class of University, pp. 736-739. Wu Yajuan Chang-an Univ. ThC 5.31 ICT Education in Rual Areas of Southwest China: A Case Study of Zhongxian County, Chongqing, pp. 681-685. Lv Jiake Southwest Univ. ThC 5.44 Research on the Computer Teaching System for Talent Cultivation Based on Kano’s Model, pp. 740-743. Ping Yan Shenyang Aerospace Univ. Minghai Jiao Northeastern Univ. ThC 5.32 Wiki-based Collaborative Learning For Colleges Specialty English Writing Education, pp. 686-690. Tang Guoxiang Southwest Univ. Xie Deti Southwest Univ. Wang Xuan Southwest Univ. ThC 5.45 Open-ended Practical Project-based Instruction Mode Under Netwrok Environment, pp. 744-747. Gang Cen Zhejiang Univ. of Sci. & Tech. Xuefen Lin Zhejiang Univ. of Sci. & Tech. Junyan Luo Zhejiang Univ. of Sci. & Tech. ThC 5.33 Teacher Robot, A New Concept of Modern Teaching, pp. 691-696. Aihua Zhang Bohai Univ. Zhongdang Yu Bohai Univ. ThC 5.46 The Exploration of the Teaching System of Operation System, Enhancing the Comprehensive Quality of Students, pp. 748-750. Tangtang Xie Southwest China Univ. Zhilin Ren Southwest China Univ. Hanrong Chen Southwest China Univ. Jun Li Southwest China Univ. ThC 5.34 An Intelligent Educational Software for Automatic Problem Solving in Linear Algebra, pp. 697-702. Nhon Do Van Ho Chi Minh City Univ. of Tech. Hung Chau Kim Ho Chi Minh City Univ. of Tech. Van Ho Long Ho Chi Minh City Univ. of Tech. ThC 5.47 Learning Outcomes of Programming Language Courses Based on Peer Code Review Model, pp. 751-754. Yanqing Wang Harbin Inst. of Tech. Li Hang Harbin Inst. of Tech. Sun Yanan Harbin Inst. of Tech. Jiang Yu Harbin Inst. of Tech. Yu Jie Harbin Inst. of Tech. ThC 5.35 Exploration and Practice of Software Engineering Core Curriculum Construction, pp. 703-705. Guangquan Zhang Soochow Univ. Mei Rong Jinan Univ. ThC 5.36 Collaboration of Online Educational Instruction: Analysis of the Use of Online Teaching Tools for High School Students, pp. 706-709. Floriana Falcinelli Univ. of Perugia Cristiana Brunelli Univ. of Perugia ThC 5.48 Exploration and Practice on Higher Mathematics Teaching Reform under the Condition of Modern Information Technology, pp. 755-757. Xiongwei Liu National Univ. of Defense Tech. Jianping Li National Univ. of Defense Tech. ThC 5.37 Study on Teaching Strategies of “College Computer Foundation”, pp. 710-714. ThC 5.49 The Research on User Satisfaction of Easy Teaching Web of 26 Taipei Assessed via Information Quality, System Quality, and Technology Acceptance Model, pp. 758-762. Chien-Yun Dai Taiwan Normal Univ. Manting Kao Taiwan Normal Univ. Charng-Tzer Harn Taiwan Normal Univ. Yu-Hsi Yuan Taiwan Normal Univ. Wan-Fei Chen Taiwan Normal Univ. Li Wang Hydropower College Zhejiang Water Conservancy & Hydropower College ThC 5.61 Classroom Teaching Strategies Creative Abilities, pp. 808-810. Jiang Daiyou Chang'an Univ. ThC 5.50 Study on Curriculum Design of System on Chip, pp. 763-765. Jianfeng An Northwestern Polytechnical Univ. Xiaoya Fan Northwestern Polytechnical Univ. Shengbing Zhang Northwestern Polytechnical Univ. Wengxing Li Northwestern Polytechnical Univ. ThC 5.62 Research and Design CSCL Model Based on Ubiquitous Learning Environments, pp. 811-814. Qi Xinxing Southwest Univ. of Sci. & Tech. Liu Zhiqin Southwest Univ. of Sci. & Tech. ThC 5.63 Teaching Discrete Mathematics with the Constructivism Learning Theory, pp. 815-816. Hu Yahong Zhejiang Univ. of Tech. Wang Weihong Zhejiang Univ. of Tech. Jiang Li Zhejiang Univ. of Tech. ThC 5.51 On the Necessity of Distance Learning Courseware Building for EFL Adult Learners, pp. 766-768. Bi Huiying Changchun Inst. of Tech. ThC 5.52 Research on the Construction of Practical Teaching System for Computer Majors, pp. 769-771. Zhang Ping Zhengzhou Info. Tech. Univ. Han Lin Zhengzhou Info. Tech. Univ. Zeng Guangyu Zhengzhou Info. Tech. Univ. ThC 5.64 On Constructing Tridimensional Visual Teaching Resource System for Informational Discipline Platform Courses, pp. 817-820. Tongcheng Huang Shaoyang Univ. Liping Yin Shaoyang Univ. ThC 5.53 Using Cooperation Between University and Enterprise to Improve the Comprehensive Competitiveness of Student in Computer Science, pp. 772-775. Liu Chengxia Beijing Info. & Tech. Univ. Cai Ying Beijing Info. & Tech. Univ. Shen Meie Beijing Info. & Tech. Univ. ThC 6 Computer Graphics ThC 6.1 Overview of Video-Based Vehicle Detection Technologies, pp. 821-825. Kun Wu Xiamen Univ. Haiyin Zhang Xiamen Univ. Tianmao Xu Xiamen Univ. Ju Song Xiamen Univ. ThC 5.54 How to Improving the Non-computer Science Students’ Computer Ability, pp. 776-778. Wang Zilan Southwest Jiaotong Univ. Xie Pan Southwest Jiaotong Univ. Lin Jing Southwest Jiaotong Univ. ThC 6.2 Fuzzy Clustering Application in Medical Image Segmentation, pp. 826-829. Yang Gefeng Guangxi Medical Univ. Ou Xu Guangxi Medical Univ. Liang Zhisheng Guangxi Medical Univ. ThC 5.55 Multidimensional Teaching Research on University Computer Foundation Course, pp. 779-782. Dan Guo Harbin Univ. of Commerce ThC 5.56 General Education Extra-curricular Training Program for Computer Major College Undergraduates: Practice and Exploration, pp. 783-787. Xin Mingjun Shanghai Univ. Wu Yue Shanghai Univ. ThC 6.3 A Spatio-temporal Filtering Method for Motion Estimation, pp. 830-834. Wang Rui Beihang Univ. Zhao Yan Beihang Univ. Tang Yujun Beihang Univ. Yuan Yan Beihang Univ. ThC 5.57 ViSiMIPS: Visual Simulator of MIPS32 Pipelined Processor, pp. 788-793. Md Tahsin Kabir North South Univ. Mohammad Tahmid Bari North South Univ. Abul L. Haque North South Univ. ThC 6.4 Measuring Thickness from 3D Gray-scale Image by Fuzzy Distance Transform, pp. 835-838. Qi Zhong Xiamen Univ. Hong Duan Xiamen Univ. Jiangui Wu Xiamen Univ. ThC 5.58 Information Capacity Training of College Students: Problems and Solutions, pp. 794-798. Bi Tingyan Weifang Univ. Xu Qiuhua Weifang Univ. ThC 6.5 A Photo Based 3D Garment Making System for Educational Purpose in Style Reconstruction and Evaluation, pp. 839-842. Yueqi Zhong Donghua Univ. ThC 5.59 Research on Construction of Information Literacy Curriculum System in Colleges, pp. 799-803. Bi Tingyan Weifang Univ. Liu Li Weifang Univ. ThC 6.6 A Novel Rate Control Algorithm of Video Coding Based on Visual Perceptual Characteristic, pp. 843-846. Ruan Ruolin Wuhan Univ. Hu Ruimin Wuhan Univ. Li Zhongming Xianning Univ. ThC 5.60 Research on Software Undergraduates Training Countermeasures Based on the Competency Model, pp. 804-807. Shihai Zhu Zhejiang Water Conservancy & ThC 6.7 A Video Coding Error Concealment Method for AVS-P2 Standard, pp. 847-851. Ruan Ruolin Wuhan Univ. 27 Hu Ruimin Chen Hao Li Zhongming Wuhan Univ. Wuhan Univ. Xianning Univ. The Fuzzy Decision and Simulation of Washer Control, pp. 891-896. Yu Zhen Xiamen Univ. Xu Fang Xiamen Univ. ThC 6.8 Traffic Indication Symbols Recognition with Shape Context, pp. 852-855. Kai Li Xiamen Univ. Weiyao Lan Xiamen Univ. ThC 7.6 Study on the Application of the Fuzzy RBF Neural Network in the MIMO Furnace Control System, pp. 897-900. Yun Zhang Changchun Inst. of Tech. Daofeng Zhou Jinlin Univ. Xuemei Chen Jinlin Univ. Mingshuang Bi Water Resources Department of the Jilin Province ThC 6.9 Analysis of Regional Comparative Advantage and Spatial Distribution of Jiaozuo Rehmannia, pp. 856-859. Zhang Shengwu Northwest Normal Univ. Li Kongwen West Anhui Univ. Zhang Xiaozhou Northwest Normal Univ. ThC 7.7 An Adaptive Neural PID Controller for Torque Control of Hybrid Electric Vehicle, pp. 901-903. Yun Zhang Changchun Inst. of Tech. Mingshuang Bi Water Resources Department of the Jilin Province Xiumin Yu Jinlin Univ. Sina Xu Jinlin Univ. ThC 6.10 A New Scheme for 3D Face Recognition Based on 2D Gabor Wavelet Transform Plus LBP, pp. 860-865. Yi Jin Beijing Jiaotong Univ. Yizhi Wang Beijing Jiaotong Univ. Qiuqi Ruan Beijing Jiaotong Univ. Xueqiao Wang Beijing Jiaotong Univ. ThC 7.8 Study on Direct Torque Control System of Switched Reluctance Motor, pp. 904-908. Ji Keyan Changchun Inst. of Tech. Zhang Zhuo Changchun Inst. of Tech. ThC 6.11 3D Surface Stagnography Using Geometry Images, pp. 866-870. Qing Huang Louisiana State Univ. S. S. Iyengar Louisiana State Univ. Xin Li Louisiana State Univ. ThC 7.9 Research on Improved SIFT Feature Matching Arithmetic in the SAR Vision Matching Aided Navigation, pp. 909-914. Xiong Zhi Nanjing Univ. of Aeronautics & Astronautics Wang Dan Nanjing Univ. of Aeronautics & Astronautics Zhang Dan Nanjing Univ. of Aeronautics & Astronautics Liu Jianye Nanjing Univ. of Aeronautics & Astronautics ThC 6.12 Dynamic Harmonic Texture Mapping using Methods of Fundamental Solutions, pp. 871-875. Huanhuan Xu Louisiana State Univ. Xin Li Louisiana State Univ. ThC 7.10 Design of a Large Scale Wind Turbine Generator Set Yaw System, pp. 915-918. Liu Wenzhou Changchun Inst. of Tech. Cai Changqing Changchun Inst. of Tech. Zhang Zhuo Changchun Inst. of Tech. ThC 7 Control Technology ThC 7.1 Research and Design of the New System Combined with Mine and Torpedo, pp. 876-879. Ye Binqiang Chongqing Univ. of Tech. Zhao Mingfu Chongqing Univ. of Tech. Deng Yiyuan Chongqing Univ. of Tech. Xu Zhongyu Chongqing Univ. of Tech. Wang Yi Chongqing Univ. of Tech. Liao Hao Chongqing Univ. of Sci. & Tech. ThC 7.11 Study on Vehicle Magnetic Particle Clutch Control and Bench Test, pp. 919-922. Shanzhen Xu Huaiyin Inst. of Tech. Cheng Wang Huaiyin Inst. of Tech. ThC 7.2 Studies on Wireless Data -collecting System of Thermodynamic Properties of Steam Turbine, pp. 880-883. Ji Pengwei Changchun Inst. of Tech. Cai Changqing Changchun Inst. of Tech. ThC 7.12 Fault-tolerant Control with Finite-time Stability for Switched Linear Systems, pp. 923-927. Shu Gao Xiamen Univ. Xiaoli Zhang Xiamen Univ. ThC 7.3 Research on Technology for Quality Regulation and Control of Electrical Energy from Power Distribution Network, pp. 884-887. Zhang Zhuo Changchun Inst. of Tech. Cai Changqing Changchun Inst. of Tech. Ji Xiu Changchun Inst. of Tech. Ao Ming Electric Power Research Inst. of Jilin Electric Power Co., Ltd Liu Wenzhou Changchun Inst. of Tech. ThC 7.13 Robust Stablization for a Class of Large Envelope Flight Control Systems, pp. 928-932. Lixia Cheng Xiamen Univ. Yabin Yan Xiamen Univ. Jianping Zeng Xiamen Univ. ThC 7.14 Model Identification and Control of a Small-Scale Unmanned Helicopter, pp. 933-937. Guanlin Wang Tsinghua Univ. Jihong Zhu Tsinghua Univ. Hui Xia Nanjing Univ. of Sci. & Tech. ThC 7.4 The Research on Data Processing for Dynamic Batching-weighing System, pp. 888-890. Zhang Ying Shenzhen Entry-Exit Inspection & Quarantine Bureau Hou Yunbin Harbin Inst. of Tech. Shenzhen Graduate School Liu Min Shenzhen Entry-Exit Inspection & Quarantine Bureau ThC 8 Database Technology ThC 8.1 Research on the Visualization of Data Mining Results, pp. 938-941. Chen Chen Chinese People's Armed Police Force Academy ThC 7.5 28 Liang Zhisheng Ou Xu ThC 8.2 One-to-Many Data Conversions by Extending Relational Algebra, pp. 942-945. Wang Jianbo Hunan Inst. of Humanities, Sci. & Tech. Wu Jinqun Loudi Vocational & Technical College Chen Xinbo Loudi Vocational & Technical College Guangxi Medical Univ. Guangxi Medical Univ. ThC 9.5 Research on Student Support Model in M-Learning, pp. 991-994. Zhizhen Yang Shanghai Second Polytechnic Univ. Shiming Zhang Shanghai Second Polytechnic Univ. ThC 8.3 LDA-based Model for Topic Evolution Mining on Text, pp. 946-949. Qingqiang Wu Xiamen Univ. Caidong Zhang Xiamen Univ. Xiang Deng Xiamen Univ. Changlong Jiang Xiamen Univ. ThC 9.6 The Model of Networked Learning Environment for E-Learning Based on Groupware Technology, pp. 995-998. Yan Jun Xi'an Univ. of Tech. Li Suicheng Xi'an Univ. of Tech. Huang Rui Xi'an Univ. of Tech. ThC 9.7 Research on Computer Network Experiment Curricular System Based on Network Technologies, pp. 999-1002. Peng Hehuan Tianmu College of Zhejiang A & F Univ. Wang Huiting Tianmu College of Zhejiang A & F Univ. Ma Zeyun Tianmu College of Zhejiang A & F Univ. ThC 8.4 A Novel Lightweight Iteration Filtering Algorithm Research in Wireless Sensor Networks, pp. 950-954. Linghong Lv Ningbo Univ. Zhijun Xie Ningbo Univ. Jun Zheng Ningbo Digital Televition CO.LTD ThC 9.8 Oral Business English Network Course Design in Secondary Vocational School, pp. 1003-1005. Huang Xingyun Mech. & Elec. Industry School Ou Qizhong Guangxi Teachers Education Univ. ThC 8.5 Mining Group Correlations over Data Streams, pp. 955-959. Zhijie Wang Ningbo Univ. Jiangbo Qian Ningbo Univ. Maochun Zhou Ningbo Univ. Yihong Dong Ningbo Univ. Huahui Chen Ningbo Univ. ThC 9.9 A Formal Model of Personalized Recommendation Systems in Intelligent Tutoring Systems, pp. 1006-1009. Li Zhiping Yunnan Normal Univ. Sun Yu Yunnan Normal Univ. Xu Tianwei Yunnan Normal Univ. ThC 8.6 Statistical Method Based Computer Fault Prediction Model for Large Computer Centers, pp. 960-964. Zhixin Tie Zhejiang Sci-Tech Univ. Hong Zhuang Zhejiang Sci-Tech Univ. Qiang Luo Zhejiang Sci-Tech Univ. Lingbing Tao Zhejiang Sci-Tech Univ. ThC 9.10 Survey Research on College Students’ English Learning Anxiety in the Computer Network Environment, pp. 1010-1012. Shen Lixia Zhejiang A & F Univeristy ThC 8.7 Wavelet Decomposition Algorithm for Uncertain Data Streams, pp. 965-970. Liao Kangli Ningbo Univ. Chen Huahui Ningbo Univ. Qian Jiangbo Ningbo Univ. Dong Yihong Ningbo Univ. ThC 9.11 Bulid A Laboratory Cloud for Computer Network Education, pp. 1013-1018. Chenyang Yan Ningbo City College of Vocational Tech. ThC 9.12 Development Network Teaching Platform of Digital Image Processing Course Based On J2EE, pp. 1019-1022. Liu Qun Shaoguan Univ. ThC 8.8 The Research on Building a Global Customer Centered Data Warehouse System, pp. 971-973. Wei Xu China Industrial Bank Li Maoqing Xiamen Univ. ThC 9.13 Emprical Study on Online Interaction Based on Learning Style Differences, pp. 1023-1026. Zhou Jingwei Taishan College ThC 9 E-Learning ThC 9.14 Incorporating Social Opinion in Content Selection for an E-Learning Course, pp. 1027-1032. Richa Sharma Univ. of Delhi Hema Banati Univ. of Delhi Punam Bedi Univ. of Delhi ThC 9.1 Online Experiment Mode of Computer Basic Courses Based on ISM Method, pp. 974-977. Ying Liang Southwest Univ. ThC 9.2 Learning on the Move----A Case Study of Mobile Learning Assisted English Reading Instruction in Chinese Tertiary Education, pp. 978-983. Yu Li Henan Univ. of Finance & Law Ji Li Zhengzhou Normal Univ. ThC 9.15 Application of Innovative Technologies on the E-learning System, pp. 1033-1036. Jianxia Chen Hubei Univ. of Tech. Qianqian Li Hubei Univ. of Tech. Cleve Yeo Keng Lin Temasek Polytechnic Singapore Huapeng Chang Temasek Polytechnic Singapore Chunzhi Wang Hubei Univ. of Tech. ThC 9.3 Design and Development Based on PBL Online Course, pp. 984-987. Zhao Yanyan Helongjiang Inst. of Sci. & Tech. ThC 9.16 The Research on the Applications of Information Technologies for Distance Education, pp. 1037-1040. Guangxi Economical Management Li Yumei College for Cadres ThC 9.4 Technical Analysis of Mobile Learning Application in High Education, pp. 988-990. Gao Kun Guangxi Medical Univ. ThC 9.17 29 Exploration of a New Approach for Designing Online English Language Learning Materials, pp. 1041-1046. Jie Hu Chongqing Univ. Shi Jianghong Zeng Zhihong Zhang Dezhong Zhou Liping Chen Huihuang ThC 10 Networking Technology Xiamen Univ. Xiamen Univ. Xiamen Univ. Xiamen Univ. Xiamen Univ. ThC 10.12 Transient Fingerprint Feature Extraction for WLAN Cards Based on Polynomial Fitting, pp. 1099-1102. Caidan Zhao Xiamen Univ. Lianfen Huang Xiamen Univ. Liting Hu Xiamen Univ. Yan Yao Xiamen Univ. ThC 10.1 A Dynamic Frame Partitioning Scheme for IEEE 802.16 Mesh Networks, pp. 1047-1050. Zhengbao Liu Xiamen Univ. Yi Jiang Xiamen Univ. Zhixiong Liu Xiamen Univ. Yuliang Tang Xiamen Univ. ThC 11 Software Engineering ThC 10.2 Study on Digital Campus IT Infrastructure Virtualization, pp. 1051-1053. Luo Guowei Guangxi Teachers Education Univ. ThC 11.1 Research on Growth Model Management System of Fruit Tree Based on Modern Information Technology, pp. 1103-1106. Song Jianwei Shijiazhuang Univ. Wu Shuomei Shijiazhuang Univ. Fan Yabin Shijiazhuang Univ. Du Xiaoning China Nuclear Power Engineering Corporation ThC 10.3 Reactive Power Optimization of Distribution Network Based on GA with Simulated Annealing Selection, pp. 1054-1057. Zhou Shan Changchun Inst. of Tech. Liu Wenzhou Changchun Inst. of Tech. Cai Changqing Changchun Inst. of Tech. Zhang Li Base of Chinese People's Laberation Army Air Force Aviation Univ. ThC 11.2 Program Slicing Research Based on MSV in Software Security Field, pp. 1107-1110. Zhonglin Zhang Lanzhoujiaotong Univ. Muyu Lin Lanzhoujiaotong Univ. ThC 10.4 Research on Multiple Coverage and Connectivity for Wireless Sensor Network, pp. 1058-1062. Wang Jianzhen Business College of Shanxi Univ. Guan Zhiyan Business College of Shanxi Univ. ThC 11.3 Semantic Web Service Framework Based on Agent and Its Logical Description, pp. 1111-1114. Zou Jinan Putian College Lin Jianbing Putian College ThC 10.5 Achieving Operational Efficiency with Cloud Based Services, pp. 1063-1068. Karthik V Bellur National Inst. of Tech. Karnataka Krupal M National Inst. of Tech. Karnataka Praveen Jain National Inst. of Tech. Karnataka Dr.Prakash Raghavendra National Inst. of Tech. Karnataka ThC 11.4 CiFeature: A Context-Independent Feature-Oriented Software Development Approach, pp. 1115-1122. Mehran Kavand Payam Noor Univ. Saeed Paarsa Iran Univ. of Sci. & Tech. Ahmad Faraahi Payam Noor Univ. ThC 10.6 A Beacon-based Handover Scanning Mechanism with QoS Support in WiMAX FemtoCell Architecture, pp. 1069-1074. Han-Jung Chueh National Chung-Hsing Univ. Fumin Chang Chaoyang Univ. of Tech. Shang-Juh Kao National Chung-Hsing Univ. ThC 11.5 Research on Anti-Interference Algorithm for Web Service Trust Evaluation, pp. 1123-1126. Jianbin Wu Zhejiang Normal Univ. ThC 10.7 An Anycast Routing Algorithm Based on Simplified Particle Swarm Optimization and Diversity Strategy, pp. 1075-1079. Taoshen Li Guangxi Univ. Zhigang Zhao Guangxi Univ. ThC 11.6 Verifying Web Services Composition Based on LTL and Colored Petri Net, pp. 1127-1130. Jihan Zhu Soochow Univ. Kan Zhang Soochow Univ. Guangquan Zhang Soochow Univ. ThC 10.8 Remote Monitoring of Indoor Environment Using Mobile Robot Based Wireless Sensor Network , pp. 1080-1084. Joshua D Freeman Amrita Univ. Simi S Amrita Univ. ThC 11.7 An Aspect-Oriented Extension to MiniJava and Its Implementation, pp. 1131-1135. Xuelian Hu Anhui Univ. Ying Zhang Hefei Univ. of Tech. ThC 10.9 A Research into The Latent Danger of WLAN, pp. 1085-1090. Dongsheng Yin Sun Yat-sen Univ. Kai Cui Sun Yat-sen Univ. ThC 11.8 Counterexample Generation and Representation in Model Checking for Probabilistic Timed Automata, pp. 1136-1141. Jianfeng Wu Soochow Univ. Jin Wang Soochow Univ. Mei Rong Jinan Univ. Guangquan Zhang Soochow Univ. Jihan Zhu Soochow Univ. ThC 10.10 Research on the IPv6 Performance Analysis Based on Dual-Protocol Stack and Tunnel Transition, pp. 1091-1093. Yingjiao Wu Women & Children's Central Hospital Xiaoqing Zhou Women & Children's Central Hospital ThC 11.9 The Research and Implementation Based on OpenOffice.org Uighur Office Suite Software, pp. 1142-1146. Baoshe Yuan Xinjiang Univ. Wu Shouer Xinjiang Univ. ThC 10.11 Performance Evaluation of the IEEE 802.11 MAC for Mobile Wireless Sensor Networks, pp. 1094-1098. Zhong Ping Xiamen Univ. 30 ThC 11.10 The Research on Collocation Networks of Relation Words In Modern Chinese Language, pp. 1147-1150. Hu Quan Hua Zhong Normal Univ. Jinzhu Hu Hua Zhong Normal Univ. Xie Fang Hubei Univ. of Tech. ThC 11.21 Supply Chains Longitudinal Competition-cooperation Games Analysis Based on Reference Chain, pp. 1198-1203. Hu Xianwu City College Wenzhou Univ. ThC 11.22 An Analysis and Simulation on Air Film of a Pneumatic Strip Shape Measuring Roll, pp. 1204-1207. Xiaoming Hu Huaiyin Inst. of Tech. ThC 11.11 A Library for Parallel Programming with Multi-core Computer, pp. 1151-1153. Qing Li Shanghai Univ. Wu Zhang Shanghai Univ. ThC 11.23 Study on the Engine Test and Fault Diagnosis System Based on the Information Fusion Technique, pp. 1208-1210. Cheng Wang Huaiyin Inst. of Tech. Shanzhen Xu Huaiyin Inst. of Tech. ThC 11.12 Demo System of Amplitude Modulation Based on Java, pp. 1154-1158. Zhang Shuiying Zhejiang Sci-Tech Univ. Du Jingjing Zhejiang Sci-Tech Univ. Jin Xuebo Zhejiang Sci-Tech Univ. Yang Runkai Zhejiang Sci-Tech Univ. ThC 11.24 An Empirical Study on Paying Rate of Basic Pension Insurance based on Probabilistic Voting Model, pp. 1211-1216. Rong Li Beihang Univ. Lin Jian Tsinghua Univ. ThC 11.13 Modeling Aspect-oriented Software Architecture Based on ACME, pp. 1159-1164. Mei Rong Shenzhen Tourism College Changlin Liu Soochow Univ. Guangquan Zhang Soochow Univ. ThC 11.25 Reliability Study of Complex Power Systems, pp. 1217-1222. Zhang Ning Xiamen Univ. Lu Yanan Southwest Univ. for Nationalities Ye Tengfei Xiamen Univ. Zheng Siting Xiamen Univ. ThC 11.14 A Method for Detecting Mismatch of Time-Aware Web Services Based on SMT, pp. 1165-1169. Xiyan Wang Soochow Univ. Shenbiao Chen Soochow Univ. Guangquan Zhang Soochow Univ. Zhu Jihan Soochow Univ. Jianfeng Wu Soochow Univ. ThC 12 Teaching Mode ThC 12.1 A Study on Profession Ability Structure and Teaching Mode Reform, pp. 1223-1226. Yadong Wang Tianjin Univ. of Tech. & Education Changzeng Wei Tianjin Univ. of Tech. & Education Zhixin Zhou Tianjin Univ. of Tech. & Education ThC 11.15 Modeling Equipment Campaign Based on MASON Platform , pp. 1170-1174. Yuefeng Chen 66393 Units 63963 Units Shunwang Xiao 63963 Units Yefu Wang 63963 Units Zhongyuan Zhang 63963 Units ThC 12.2 Constructing Informal Learning Mode Based on Social Software, pp. 1227-1230. Yuan Jiugen Jiangxi Sci. & Tech. Normal Univ. Xing Ruonan Jiangxi Normal Univ. Hu Xiaoqiang Jiangxi Sci. & Tech. Normal Univ. ThC 11.16 An ANN Verifying Approach to Equipment Compaign Model, pp. 1175-1179. Shunwang Xiao 63963 Units Yuefeng Chen 66393 Units 63963 Units Yuangsheng Dong 63963 Units Feng Liu 63963 Units ThC 12.3 The Practice of the Student-centered and Teacher-guided Data Structure Teaching Mode, pp. 1231-1234. Yue Chen Zhengzhou Inst. of Info. Sci. & Tech. Jing Cao Zhengzhou Inst. of Info. Sci. & Tech. Qing Dai Zhengzhou Inst. of Info. Sci. & Tech. Chengshi Gao Zhengzhou Inst. of Info. Sci. & Tech. ThC 11.17 Information Technologies, Organizational Cultures and Knowledge Management, pp. 1180-1185. Shumei Tseng I-Shou Univ. ThC 12.4 The Research and Reform Based on CDIO in Data Structure, pp. 1235-1238. Huijuan Qi Shiiazhuang Inst. of Railway Tech. Lina Liu Shiiazhuang Inst. of Railway Tech. Dexiong Li Shiiazhuang Inst. of Railway Tech. ThC 11.18 Liveness Rules from Fairness Based on TLA, pp. 1186-1188. Wan Liang Guizhou Univ. ThC 12.5 Concordance-based Learning and Teaching of Grammar, pp. 1239-1242. Tang Xuemei Anhui Polytechnic Univ. ThC 11.19 Geometric Identification of Search States on (F~,F)-information, pp. 1189-1193. Yuying Li Ningde Normal Univ. Li Zhang Shangdong Univ. Shiliang Zhang Ningde Normal Univ. Qunsheng Ruan Ningde Normal Univ. ThC 12.6 Teaching Explorations of Basics of Computer Applications, pp. 1243-1245. Zou Quan Xiamen Univ. Li Xubin Xiamen Univ. Lin Chen Xiamen Univ. ThC 11.20 The Construction and Development of School Practice Base, pp. 1194-1197. Yuan Hongyan Yantai Univ. Liu Jiangxia Yantai Univ. Yu Bo Yantai Univ. ThC 12.7 The Design and Application of Geography Experimental Simulation Platform, pp. 1246-1250. 31 Jiang Huixian Lin Guangfa Fujian Normal Univ. Fujian Normal Univ. ThC 12.19 A Qualitative Study in Middle School on Information Technology Teaching Model, pp. 1296-1300. Minhua Wu Capital Normal Univ. Weili Peng Capital Normal Univ. ThC 12.8 The Study of New Teaching Method in Dynamic Circuit Response Analysis, pp. 1251-1254. Sheng Guizhen Changchun Inst. of Technolog Cai Changqing Changchun Inst. of Tech. Zhao Yan Univ. of Sci. & Tech. of China ThC 12.20 Teaching Method Reform of the Drawing Course by Integrating CDIO Mode, pp. 1301-1302. Lina Yuan Wuyi Univ. Ling Wang Wuyi Univ. ThC 12.9 An Application-Driven Teaching Model for Series Curriculum, pp. 1255-1259. Min Cao Shanghai Univ. Haiqiang Li Shanghai Univ. ThC 13 Web Application ThC 13.1 A Novel Verification Code Technology to Make Your System More Secure, pp. 1303-1306. Dancheng Li Northeastern Univ. Qiang Wei Northeastern Univ. Liu Zhiliang Northeastern Univ. Binsheng Liu Northeastern Univ. ThC 12.10 Research of VB Programming Teaching Mode Based on the Core of Computational Thinking Ability Training, pp. 1260-1263. Chunying Zhang Hebei United Univ. Xiao Chen Hebei United Univ. Jianjing Li Hebei United Univ. ThC 12.11 CDIO in Websit Design Education, pp. 1264-1266. Liu Yang Shijiazhuang Inst. of Railway Tech. Li Xiaonan Shijiazhuang Inst. of Railway Tech. Zheng Hua Shijiazhuang Inst. of Railway Tech. Liu Jia Shijiazhuang Inst. of Railway Tech. ThC 13.2 Investigation and Analysis and Optimizing Countermeasures of Current Website Construction of Top Third-class Hospital in Shandong Province, pp. 1307-1310. Song Guojian Jining Medical College Wang Qianfei Jining Medical College Chu Hongrui Jining Medical College ThC 12.12 Reforming to Improve the Teaching Quality of Computer Programming Language, pp. 1267-1269. Rongfang Gao Xi'an Shiyou Univ. ThC 13.3 A Method of CAD/CAE Data Integration Based on XML, pp. 1311-1314. Yi Zhang Chongqing Univ. Li Hua Worcester Polytechnic Inst. ThC 12.13 A Teaching Model Based on Schema Theory in Computer Programming Curriculum, pp. 1270-1272. Tiezheng Sun Changchun Univ. of Sci. & Tech. Chunyang Qiu Jilin Univ. of Finance & Economics Jianhua Jiang Jilin Univ. of Finance & Economics ThC 13.4 Design of LAN-export Flow Control Strategy Based on Application Layer Channel, pp. 1315-1318. Ni Sheng Guangxi Medical Univ. Tang Zhong Guangxi Medical Univ. ThC 12.14 The Exploration on Task-driving Teaching Mode of Network Security Course Reformation and Construction, pp. 1273-1276. Yu Han Dalian Univ. of Tech. Naigao Jin Dalian Univ. of Tech. Hong Yu Dalian Univ. of Tech. Zhenquan Qin Dalian Univ. of Tech. ThC 13.5 A Web Service QoS Prediction Approach Based on Multi-Dimension QoS, pp. 1319-1322. Lu Li Suzhou Vocational Univ. Mei Rong Jinan Univ. Guangquan Zhang Soochow Univ. ThC 12.15 Study and Practice on CDIO Innovative Education, pp. 1277-1281. Jiang Fan Guangzhou Univ. Zhang Chunliang Guangzhou Univ. Wang Yijun Guangzhou Univ. Xiao Zhongmin Guangzhou Univ. ThC 13.6 On the Formalization of Aggregate Relation Based on Ontology and Its Implement of OWL, pp. 1323-1326. Zhao Bo Yunnan Normal Univ. Duan Chongjiang Yunnan Normal Univ. Zhang Jie Yunnan Normal Univ. ThC 13.7 Portal-based Design for SaaS System Presentation Layer Configurability, pp. 1327-1330. Dancheng Li Northeastern Univ. Wei Zhang Northeastern Univ. Shuangshuang Zhou Northeastern Univ. Cheng Liu Northeastern Univ. Weipeng Jin Northeastern Univ. ThC 12.16 The Construction of the Specialty of Information Management and Information System Based on CDIO Mode, pp. 1282-1285. Ying Hua Suzhou Vocational Univ. Min Xu Suzhou Vocational Univ. ThC 12.17 Computer Engineering Education Reform Based on CDIO, pp. 1286-1290. Sun Jingdong Southwest Jiaotong Univ. Wang Zhengbin Southwest Jiaotong Univ. Zhang Yan Southwest Jiaotong Univ. Wang Yao Southwest Jiaotong Univ. ThC 13.8 The Relationship of Motivation and Self-Regulation in Web- Based Autonomous English Learning, pp. 1331-1334. Haiyan Li North China Electric Power Univ. ThC 13.9 The Three-dimensional Way to Describe and Build the Complex Web Service Composition System, pp. 1335-1339. Li Dancheng Northeastern Univ. Zhang Ming Northeastern Univ. Liu Cheng Northeastern Univ. ThC 12.18 Learning Effect for Students with Game-based Learning on Meta-Analysis, pp. 1291-1295. Tsungli Wang Shu-Te Univ. Yafen Tseng Chung Hwa Univ. of Medical Tech. 32 Liu Binsheng Northeastern Univ. Chenghung Chuang ThC 13.10 Personalized Recommendation Using Implicit Interaction Information, pp. 1340-1345. Liu Nancheng Xianmen Univ. Qingshan Jiang Shenzhen Inst.s of Advanced Tech. Chinese Academy of Sci.s Haishan Chen Xiamen Univ. Beizhan Wang Xiamen Univ. Asia Univ. FrA 1.9 Design of Representaiton Scheme towards Better Image Search, pp. 1400-1403. Shikui Wei Beijing Jiaotong Univ. Yao Zhao Beijing Jiaotong Univ. Zhenfeng Zhu Beijing Jiaotong Univ. FrA 1.10 Robust LMI Based Control of Wheeled Mobile Robots, pp. 1404-1409. A.Dolly Mary National Inst. of Tech., India ThC 13.11 Optimization of Remote Monitoring of Cathodic Protection Power Supply System Base on Four-tier Structure and B/S Model, pp. 1346-1350. Liu Ting Wuhan Univ. of Tech. Zhao Xing Wuhan Univ. of Tech. FrA 1.11 An Efficient Uplink Scheduling Mechanism with enabling Multi-device Transmission and Maximum Latency Fulfillment in IEEE 802.16j Networks, pp. 1410-1415. Fumin Chang Chaoyang Univ. of Tech. I-Ping Hsieh National Chung-Hsing Univ. Shang-Juh Kao National Chung-Hsing Univ. ThC 13.12 A Mobile Learning System Based on WAP, pp. 1351-1354. Wei Ying Zhejiang Univ. FrA 1.12 Topic-special Information Extraction of Online Store, pp. 1416-1420. Zheng Siting Xiamen Univ. Zhang Ning Xiamen Univ. Yang Fan Xiamen Univ. FrA 1 Artificial Intelligence FrA 1.1 Multi-objective Optimization Using Genetic Algorithm:Applications to Imperfect Preventive Maintenance Model, pp. 1355-1360. Chung-Ho Wang National Defense Univ. Sheng-Wang Tsai National Defense Univ. FrA 2 Computer Education FrA 1.2 Margin Based Variable Importance for Random Forest, pp. 1361-1366. Yang Fan Xiamen Univ. Li Xuan Xiamen Univ. Zhou Qifeng Xiamen Univ. Luo Linkai Xiamen Univ. FrA 2.1 The Research of Construction of the Diversified Training Mode to Graduate Students, pp. 1421-1424. Wang Chunzhi Hubei Univ. of Tech. Hong Li Hubei Univ. of Tech. Jiang Wei Hubei Univ. of Tech. FrA 2.2 Computer-Assisted Formative Assessment in Language Classrooms: Focus and Forms, pp. 1425-1428. Cheng Ke Beijing Union Univ. Wang Yingwei Beijing Union Univ. Hou Xiaoli Beijing Union Univ. Yang Yajun Beijing Union Univ. FrA 1.3 System-level Modeling and Performance Analysis of IEEE802.11 Wireless Communication Protocol, pp. 1367-1372. Zhangqin Huang Beijing Univ. of Tech. Chunhua Xiao Beijing Univ. of Tech. Zhiqiang Wang Beijing Univ. of Tech. FrA 1.4 A Vertical Handover Scheme from WMAN to WLAN by Taking into Account the Maximum Available Resource, pp. 1373-1378. Hsiu-Lang Wang National Chung-Hsing Univ. Shang-Juh Kao National Chung-Hsing Univ. FrA 2.3 The Outline Plan of Beijing Open Learning System, pp. 1429-1432. Ma Rong Beijing open Univ. FrA 2.4 Teaching Data Structures and Software Architecture while Constructing Curriculum Platform, pp. 1433-1437. Min Cao Shanghai Univ. Zhen Cao Shanghai Univ. FrA 1.5 APlag: A Plagiarism Checker for Arabic Texts, pp. 1379-1383. Mohamed El Bachir Menai King Saud Univ. Manar Bagais King Saud Univ. FrA 1.6 A FPGA Based Digital Design Training Platform, pp. 1384-1389. M.Serdar BASCIL Sakarya Univ. Irfan YAZICI Sakarya Univ. Feyzullah TEMURTAS Bozok Univ. FrA 2.5 The Design and Implementation of Routing and Switching Platform and Applications in an Experiment Teaching, pp. 1438-1441. Deng Beixing Tsinghua Univ. Xu Shuzhen Tsinghua Univ. FrA 1.7 A Survey of Topology Denoise Technologies, pp. 1390-1395. Zhang Ning Xiamen Univ. Ye Tengfei Xiamen Univ. Wuyi Yu Xiamen Univ. Maoqing Li Xiamen Univ. Xin Li Louisiana State Univ. FrA 2.6 The Practice and Probe about Training Mode in Master of Engineering of Computer Science, pp. 1442-1444. Shiping Lin Fuzhou Univ. FrA 2.7 Higher Learning Institution - Industry Collaboration: A Necessity to Improve Teaching and Learning Process, pp. 1445-1449. Kalaimagal Ramakrishnan Univ. Malaya Norizan Mohd Yasin Univ. Malaya FrA 1.8 Detecting Frame Duplication Based on Spatial and Temporal Analyses, pp. 1396-1399. Guoshiang Lin Da-Yeh Univ. Jiefan Chang Da-Yeh Univ. FrA 2.8 33 Application of Mini Case Study in Computer Networks, pp. 1450-1453. Ganlin Wang Shanghai Ocean Univ. Runyuan Yin Shanghai Ocean Univ. Xiaohua Yuan Shanghai Ocean Univ. FrA 2.11 Research on Teaching Reform of Computer Science and Technology Speciality in General Education, pp. 1463-1467. Shen Yunfu Shanghai Univ. Dong Xiaowen Shanghai Univ. FrA 2.9 Screen Education: Contemporary University Students’ Contexts and Problems of Media Literacy, pp. 1454-1459. Wu Zhibin Nanjing Univ. of Aeronautics & Astronautics Jiang Zhaojun Nanjing Univ. of Aeronautics & Astronautics FrA 2.12 ABMT-An Automated Support Based Rule Mining Technique, pp. 1468-1473. Ashwin C S Information Technology, India Dinesh Kumar J Information Technology, India Gugan L Information Technology, India Harihar M V Information Technology, India Kousik M Information Technology, India Vijay Krishnan K Information Technology, India FrA 2.10 Teaching Reform and Practice of Database Principles, pp. 1460-1462. Yu Zheng Shanghai Univ. Jianquan Dong Shanghai Univ. 34 Book of Abstracts 35 This Page Intentionally Left Blank. 36 Zhejiang Inst. of Mechanical & Feng Hanrong Electrical Engineering As the teaching reform of basic computer science grows, the course requirements have become increasingly higher. This paper analyzes the necessity for implementing individualized teaching models and introduces the process of carrying out the individualized teaching of basic computer in the past two years. We have explored and experimented with a threescaled individualized teaching model from the respects of teaching syllabi, teaching methods, practical training and assessments. After doing so, we have achieved some desired results, and provided some references for the teaching reform of basic computer science in vocational colleges. MoA 1 Artificial Intelligence MoA 1.1 The Calculation Approach of the Nearest Neighbor Distance of Chaotic Time Series’s Reconstructed Space, pp. 1-5. Gong Zhuping South China Univ. of Tech. Zhao Kuiling South China Univ. of Tech. For the rapid develop of computer speed, the small calculating advantage of ∞-norm is gone when the nearest points of chaotic time series’s reconstructed space are found by 2-norm or ∞-norm. So the right method should be selected on the basis of reconsidered the two methods. By theories analysis, the ratio between ∞-norm distance and 2-norm distance is in an inherent interval. Huanan Zhixin and Lorenz data are used for verified the effect of finding the nearest points by the two norms. The nearest points is partly the same by the two norms and the found same point rate is different between two time series. And the nearest distance calculating by 2-norm between the point pair finding by ∞-norm is equal or great than the point pair finding by 2-norm. So the real nearest point is found by 2-norm. MoA 1.6 The Design and Research Based on the Intrusion Detection Model of Packet Filtering Technology, pp. 22-23. Li Cuizhi Business College of Shanxi Univ. Zhang Hui Business College of Shanxi Univ. Wu Liping Business College of Shanxi Univ. This paper presents an efficient intrusion detection model for packet processing. Packet capture device detect the network data packets directly after capture them, instead of detecting them after restructuring , thus the efficiency of detection can be improved. Current products of intrusion detection use the packet restructuring mechanism in order to reduce the false negative rate of the system. The model process the packet restructuring mechanism combined with the data packets .This model improve the efficiency of detection system on the basis of ensuring the detection to the integrity of the attacks. MoA 1.2 Delay-Dependent Robust Stability and Stabilization for Norm-Bounded Uncertain Systems with Time-Varying Delay, pp. 6-11. Li Lee National Sun Yat-Sen Univ. Junshen Chen National Sun Yat-Sen Univ. The paper addresses robust stability and stabilization for continuous time-delay systems with norm-bounded uncertainty. The delay is assumed time-varying with both its value and variation rate being bounded. Based on a new Lyapunov-Krasovskii functional and the application of delay partitioning and the free-weighting matrix techniques, a set of sufficient LMI conditions is obtained to ensure asymptotical stability of the nominal system. Since there is no product term of Lyapunov matrix with any system matrix, the robust stabilization problem of computing a state feedback gain to cope with the norm-bounded uncertainty can be solved with reduced conservativeness. Numerical examples are given to show the effectiveness and the improvement of the derived results. MoA 2 Computer Application MoA 2.1 The Apply of ID3 in Stock Analysis, pp. 24-27. Chen Chen Chinese People's Armed Police Force Academy For macroeconomic, the prosperity of the stock market has promoted the reasonable allocation of social resources and broaden the financing channels. For personal, the stock has provided investors with an excellent investment management approach. However, the investment of stock is the opportunity to achieve high returns with great investment risks. And how to avoid the disadvantages become the most concerned topics of broad investor. Based on company intrinsic value, the paper expounds the influence to share price according to company financial fundamentals. Using machine learning theory, this paper built a stock investment decision tree model through the ID3 algorithm. It can provide decision support for future investment through analysis current financial of the company and market situation. MoA 1.3 Study on Power E-Commerce Network Security Technique and Design Based on Firewall, pp. 12-15. Yang Liuqing Fuzhou Vocational & Technical Inst. Hu Yu Fuzhou Vocational & Technical Inst. Huang Weimin Fuzhou Vocational & Technical Inst. This paper summarized applications of Fire Wall in e-Commerce security system and have set forth choice principle on fire wall; have studied e-Commerce network security technique on Fire Wall; analysed constructing e-Commerce network security technology and applied to actual e-Commerce system design on power. MoA 2.2 A New Approach for Noisy Iris Database Indexing Based on Color Information, pp. 28-31. Qin Zhao Taiyuan Univ. Effective iris indexing method will both reduce the computational complexity and enhance the matching accuracy of iris recognition systems. In this paper, a new noisy iris indexing approach based on iris color information is proposed. After color correction, this method utilizes normalized color components to index the noisy iris images. Hit rate and penetration rate are used to measure the indexing performance of the proposed method. The effectiveness evaluation is performed based on the UBIRIS.v2 database, and the results are analyzed and discussed. MoA 1.4 The Research and Practice of Inquiry Learning Model Based on the Network Environment, pp. 16-18. Jihua Ye Jiangxi Normal Univ. Dengwen Gan Jiangxi Normal Univ. Pingliao Zhu Jiangxi Normal Univ. Chunlan Wang Jiangxi Vocational & Technical College of Electricity Discussed method and process about how to develop inquiry learning based on nerwork environment .Researched inquiry learning from the beginning,core,way,key point ,independent evaluation,and the resources construction.Constructed a inquiry learning website,and does the effective practise. The results are good. MoA 2.3 The Development and Designation of Visual Experiments on Demonstration and Assembly of Computers, pp. 32-34. Yu Hongtao Inner Mongolia Univ. for Nationalities Bo Jinli Inner Mongolia Univ. for Nationalities It is imperative to demonstrate to students the peripheral equipments of computers and how to connect them appropriately in the rudimental courses on computer application. However, MoA 1.5 Application of Individualized Teaching Model for Basic Computer Science at Vocational Colleges, pp. 19-21. Zhou Zili Zhejiang Inst. of Mechanical & Electrical Engineering 37 because of the large number of students taking the courses, it is difficult for students to have a good observation of the experiments while visual experiments are vivid in manifestation and versatile to implement. Accordingly, in order to meet the needs of experimental education, we have designed the visual experiments on Demonstration and Assembly of Computers, whose implementation is conducted as per the Cult3D technique. MoA 3.1 Optimization Research of Building Exports Positions based on the Evacuating Movement, pp. 52-55. Song Bingxue Univ. of Sci. & Tech. Beijing Wang Ziyang Beijing Jiaotong Univ. To master group rules pedestrian movement emerged is prior to construct and plan the base of pedestrians design rightness. The existing research focuses on the research of pedestrian movement rules, especially for behavior in evacuation. But there is just lack of engineering practical calculation method with respect to infrastructure layout optimization according to the pedestrian movement characteristics. This paper puts forward a method based on the cellular automata method to simulate group behavior in the cases of evacuation. On this basis, this paper gives the optimization method of the building export position. Meanwhile, the method in the paper also considering the construction cost, showing a strong practicability. MoA 2.4 Based on Excel and Macro Designing Standardization Self-test System, pp. 35-37. Zhou Minghong Business College of Shanxi Univ. This paper focuses on the standardization self-test system design based on excel and macro. Because excel is a software of most people familiar and easy-to-use. And the function is very strong. The system can use function of function,cell cite,macros in excel to add amount of question database,modify score, arbitrary extraction test from question database, give a mark to result etc. This system can be as students learning self-test system arbitrary course. MoA 3.2 Parameters Optimization of Mechanical Arm PID Controllers Based on CLPSO Algorithm, pp. 56-60. Li Xiaolong Southwest Jiaotong Univ. Chen Yanjie Hunan Univ. Yu Xiao Xiamen Univ. This paper presents an improved algorithm named Comprehensive Learning Particle Swarm Optimization (CLPSO). CLPSO utilizes a novel learning strategy which has achieved the goal to accelerate the convergence of the classic PSO. And CLPSO algorithm is more effective to optimize PID controller`s parameters than empirical tuning methods and classic PSO. The simulation results show its better performance than traditional ways in the PID parameters optimization for PID controllers in mechanical arm system. MoA 2.5 Discrimination of Varieties of Rice Using Near Infrared Spectral by PCA and MDA Model, pp. 38-40. Zhou Zili Zhejiang Inst. of Mechanical & Electrical Engineering Jing Chunfeng Zhejiang Inst. of Mechanical & Electrical Engineering Wu Di Zhejiang Univ. Li Xiaoli Zhejiang Univ. Shao Yongni Zhejiang Univ. In this research, a new method for discrimination of varieties of rice by means of near infrared spectroscopy (NIRS) was developed. First, the characteristic spectrums of rice were got through principal component analysis (PCA). The result of the analysis suggests that the reliabilities of first 4 principal components are more than 99.338%. The 2-dimontional plot was drawn with first and second principal components, which indicates that it is a good clustering analysis for classification varieties of rice. The several variables compressed by PCA were used as inputs of multiple discriminant analysis (MDA).150 samples from three varieties were selected randomly, then they were used to build discriminated model, 30 unknown samples were predicted by this model, the recognition rate is 100%. MoA 3.3 The Robust H∞ Control for Discrete-time Switched Interval System, pp. 61-65. Zhang Damin Zhejiang Univ. Zhang Xiaoli Xiamen Univ. Lu Zhengyu Zhejiang Univ. This paper discusses the robust H∞ control problem for discrete-time switched interval system. The multiple Lyapunov function method is combined with the Finsler’s Lemma to generate several new results which provide extra degree of freedom for stability analysis and control synthesis. A new sufficient condition is obtained for the unforced discrete-time switched interval system. then, based on the above discussion, the robust H∞ control synthesis via state feedback is studied for the closed-loop switched interval system. Finally, two simulation examples are given to illustrate the validity of the results. MoA 2.6 Design of Transcutaneous Coupling Wireless Charger, pp. 41-46. Li Ning Xiamen Univ. Yu Xiao Xiamen Univ. Zhang Ning Xiamen Univ. The design of the transcutaneous coupling wireless energy transmission system to drive the medical equipment lithium batteries within the human body is introduced in this paper. This work is based on Micro Control Unit. Compared with the traditional charger, this kind of transcutaneous coupling wireless charger need not to penetrate human skin and meanwhile the battery can be filled soon, which makes the patients avoid being taken an operation to change the new battery. This design will have much application value when applied to medical field. MoA 3.4 Simulation of the Intelligent Control Circuit based on Petri Net, pp. 66-69. Jihua Ye Jiangxi Normal Univ. Jianlian Li Jiangxi Normal Univ. Fangqi Deng Jiangxi Normal Univ. Chunlan Wang Jiangxi Vocational & Technical College of Electricity Established a model of intelligent elevator group control based on the timed-colored Petri nets (TCPN); Used simulation tools CPN Tools to simulate intelligent control of elevator group; defined various data collectors (monitor) to monitor the elevator running states; analyzed the efficiency of the elevators with the data collected by the monitors. The simulation results showed that the improved strategy has improved the operating efficiency of the elevators. MoA 2.7 The Application of Pipeline Technology: An Overview, pp. 47-51. Li Yizhen Xiamen Univ. Ling Lin Xiamen Univ. Wu Jun Xiamen Univ. Recently, pipeline technology has been widely used in various fields of computer. After describing the principles and classification of Pipeline technology, this paper introduces the history of its development, and analyzes its application in both aspects of hardware and software of computer, such as CPU, FPGA, DSP calculation and parallel database query optimization. At last predication is made on its prospects and future development trends. MoA 3.5 Design of Vertical Parking Monitor System, pp. 70-73. Changqing Cai Changchun Inst. of Tech. Lixin Wang Shenyang Univ. of Tech. Yan Zhao Univ. of Sci. & Tech. of China In order to ease the issue of parking which is caused by the city's rapid development, the text has adopted the programmable controller of OMRON CQM1H, making use of the vehicle detector, sense coil and camera to collect various messages, which are MoA 3 Control Technology 38 related to the inner parking and the vehicle, designing a type of eight layers vertical parking monitor system. On the basis of functions and safety request, we need to complete the hardware circuit design of the vertical parking monitor system, management system design, PC software design and lower computer software design. And adopting ladder to compile the PLC controlling procedure, which will achieve the automatic control of vehicle access. In the end, utilizing configuration software “Force Control” to monitor the parking. decision support. This paper analyzes the main problems, then from the perspective of MDA creates a multidimensional data model and builds a multidimensional data analysis system for educational data warehousing and data mining. This system is implemented by using J2EE architecture, and flash RIA technology, which provides users with good visual modeling and data display interfaces. MoA 4.4 A Comparison of Multi-Tenant Data Storage Solutions for Software-as-a-Service, pp. 95-98. Shaoquan Fang Tsinghua Univ. Qiuli Tong Tsinghua Univ. Software-as-a-Service (SaaS) is now a hot issue in both academia and business. Multi-tenant data storage as a fundamental component of a SaaS system draws much attention.The need of scalability and multi-tenant support in SaaS makes traditional RDBMS unappealing and calls for a better data storage solution. In this paper, we categorize some proposed solutions and evaluate the performance of a Native XML Database (NXD) solution implemented on Berkeley DB XML. Experimental results show that the the opportunity of applying NXD in SaaS has not yet arrived. MoA 3.6 The Control Algorithm for a Photovoltaic Inverter to be Applied in Weak Power Grid, pp. 74-77. Shi Zhenyin Gansu Electric Power Design Inst. Zheng Xin Gansu Electric Power Design Inst. Wang Liping Gansu Electric Power Design Inst. The paper analyzes the power-grid connection for a large and medium photovoltaic (PV) plant in details, and it creates a mathematic model for PV inverter and a parameter model for power distribution. The paper also does some research on the grid-connected character between large PV generation system and weak grid, and it focuses on output voltage and current harmonic while connected. Depending on the simulation result and real operating data of three-phase PV inverter, which founded on the traditional controlling algorithm, the paper proposes a brand new way. The method bases on the space-vector theory, and it can validly decrease the PV grid-connected output voltage and current harmonic, and improve the reliability. The theoretical analysis and partial operation results have proved the correctness of grid-connected features; also, it will provide the theory and grid-connected instruction for Chinese new energy strategy as well as the world. MoA 4.5 A Design of Distributed Collaborative Intrusion Detection Model, pp. 99-101. Zhang Hui Business College of Shanxi Univ. The paper analyzes the current principle, classification and the technology of Intrusion Detection in common use. Then, the paper puts forward a kind of distributed and coordinated Intrusion Detection System model. It can detect the security leak of network in time and response rapidly and enhance the security of network. MoA 4 Artificial Intelligence MoA 4.6 Research on M-learning supported by 3G/4G, pp. 102-106. Zhizhen Yang Shanghai Second Polytechnic Univ. Zhihui Yang North China Univ. of Tech. With explosive immersion of mobile technology supported by 3G/4G, its characteristic of being portable and online have injected new vitality to M-learning, people become to explore its potential under the surrounding of M-learning. Based on the technology predominance of 3G/4G, this paper first analyses current situation of M-learning. Then it discusses the teaching relations and learning surrounding of M-learning with support of 3G/4G technology. Then it expounds on the challenges which 3G/4G brings to M-learning. Wish this paper could play an active role in actual research of M-learning. MoA 4.1 Multi-objective Optimization in Dynamic Environment:A Review, pp. 78-82. Rui Chen Xiamen Univ. Wenhua Zeng Xiamen Univ. Dynamic multi-objective evolutionary algorithms (Dynamic MOEAs) use the evolutionary algorithms to solve the dynamic multi-objective optimization problems (DMOPs). It has become one of the hot areas of research. The challenge of DMOPs is that the objective functions, the constraints or the parameters may change over time. This paper tries to provide a comprehensive overview of the related work, which is organized by the common process of Dynamic MOEAs, such as, the detection of change, the maintenance of diversity, the prediction of change, the test problems and the performance metrics. Finally, topics for further research are suggested. MoA 4.7 Implementation of Software Testing Course Based on CDIO, pp. 107-110. Zhang Yinnan Zhejiang Univ. of Sci. & Tech. Wang Xiaochi Zhejiang Univ. City College The current state of Software Testing Course is first analyzed. With the guidance of CDIO educational theory, it provides concrete methods to reform the course, especially regarding the existing issues. It applies various teaching methods, such as case teaching, project-based learning, and inspired learning, to the reform of undergraduate level Software Testing. It focuses on four different aspects of the reform: teaching of the fundamentals, training of professional attitude and capability, team collaboration and communication, and implementation ability. It has been proved that the reform produced positive results. MoA 4.2 Design and Realization of SPI Interface in Lithium-ion Battery Voltage Measuring System, pp. 83-87. An Shiqi Qingdao Univ. of Sci. & Tech. Qi Anning Qingdao Univ. of Sci. & Tech. Zhu Yuwei Qingdao Inst. of Bioenergy & Bioprocess Tech. This paper presents a voltage measuring system, which based on the AVR microcontroller AT90CAN32 and one or more multicell battery monitoring integrate circuits LTC6802 used in BMS(battery management system). Gives the hardware design and the software design for serial peripheral interface(SPI) communication. The use of iCoupler technology realizes the high-speed SPI communication and its reliable isolation. The off-line test shows that the system is compact in structure, ease to expand and meet the requirements of stabilization and reliability. MoA 5 Software Engineering MoA 4.3 A Multidimensional Data Analysis System Based on MDA for Educational Data Warehousing, pp. 88-94. Xuejian Yan Shandong Univ. Xueqing Li Shandong Univ. The existing management information systems in universities are often designed for specific management applications, and there are still many problems and shortcomings on data analysis and MoA 5.1 A Study on the Methods of Software Testing Based on the Design Models, pp. 111-113. Tangtang Xie Southwest China Univ. Jun Li Southwest China Univ. Hanrong Chen Southwest China Univ. Hailing Xiong Southwest China Univ. With the expanding range of computer applications, computer 39 applications is used more and more in key areas, so it requires higher quality and reliability for software. As the most important techniques for software quality and reliability, software testing becomes more and more important in software development. Though software engineering technology development continuously put forward new requirements for software test technique, software test model and test case generation have always been the core of the software testing, and it is important to choose the better test models and test methods to improve the efficiency of test cases. Considering that most of software errors can be attributed to the difference between design and implementation, this paper presents a software testing method based on the design model by analyzing the design model and the implement model extracted from design process and converting to formal test models, and finally compare the design model and the implement model to find out the difference between requirement and implement. This paper analyses the existing problems of computer Chinese chess game, the structure and performance of computer Chinese chess game platform and the latest progress in the field of computer Chinese chess game. Additionally, it introduces the superior self-made teaching experience instruments with high practical value to combine education with recreation and improve university innovative research atmosphere. MoA 5.5 Research and Design of Network Behavior Management System Based on B/S Architecture, pp. 129-132. Deng Xinxin Xiamen Univ. Qiu Zhongpan Xiamen Univ. Yang Xiaofang Xiamen Univ. With the rapid development of Internet and information technology, network office, network education, paperless office has become increasingly popular. Computers and network have become the effective and essential tools of schools, families and enterprises. However, with the popularity of Internet behavior in a work or study environment, the problem that students and employees use the computer and network to do something unrelated with study and work become more and more serious, what’s more, children may be misled to visit junk websites. The abuse of computers and network is widespread in enterprises as well. Hence, it is important to build an effective network behavior management system to monitor and manage the internal network hosts behavior. We put forward a network behavior management system based on B/S architecture. Our research facets are as follows: According to the function of the system and architecture, the system is divided into three layers: Client Management UI layer, Sever layer, Data Memory layer. We have integrated a variety of Monitoring and Management technology and Protocol Analysis technology into the system. The paper first introduce the B/S architecture and compare with the C/S architecture, then detail the system construction, design of three modules, the work flow of the system, and the main functions of the network behavior management. At last, we conclude the prospect of the network behavior management system based on B/S architecture with HTML5 [1]. MoA 5.2 Design of Database Architecture in the SaaS-based Multi-tenant Educational Information System, pp. 114-119. Jiangman Xu Shandong Univ. Xueqing Li Shandong Univ. Xinxiao Zhao Shandong Univ. In traditional delivery mode of educational information systems, applications and databases are established for each college in universities independently. It not only causes resources to be wasted, but also brings about a series of problems such as data inconsistency, data redundancy, etc. In order to solve the problems mentioned above perfectly, educational information system begins to be constructed based on SaaS (Software as a service). In this paper, a schema of distributed database architecture in the SaaS-based multi-tenant educational information systems is proposed and a distributed database access process module is implemented based on J2EE technology. Through parsing and adjusting database access language semantics in the system architecture layer, the process module redirects the database access target of every tenant. In this way, the process module parses the query statement and processes the query results with the whole process being transparent to tenants. In addition, framework of application system with process module integrated into is also given in this paper. MoA 5.6 Application of Lightweight Software Framework Based on SSH, pp. 133-135. Weixing Wang Chongqing Univ. The application system features in small or medium-sized enterprise lie in the greater flexbility and speed,safety,high performance-price ratio.Traditional J2EE framework can not adapt to these needs,but the system applacation based on SSH(Struts,Spring,Hibernate) technology can better satisfy such needs.This papei analyses some intergration theroy and key technologies about SSH,and according to the intergration constructs a lightweight WEB framework, which has integrated the three kinds of technology , forming the lightweight WEB framework based on SSH and gaining good effects in practical applications. MoA 5.3 Design of a Multiple Modeling Language Supported Workflow Architecture in Educational Information System, pp. 120-125. Xinxiao Zhao Shandong Univ. Xueqing Li Shandong Univ. Jiangman Xu Shandong Univ. Using workflow system to manage some business processes is an essential work to do in educational information system. In this paper, the author bring forward a solution for building a lightweight workflow component in some educational information systems based on J2EE technology. This workflow component has general function modules of workflow system such as workflow engine, process manager, and application extensible interface. The process modeling mechanism of this workflow component can help us extend different process description languages to model business processes in different domain. So, we can build some specific modeling languages suitable for modeling business processes in educational information system. All business process models described by different modeling languages can be translated into execution models owning a kind of unified structure to be executed. Rollback operation of the business process also can be supported by the way of backward resuming the execution track of process. MoA 6 Computer Education MoA 6.1 S-T Analysis of Classroom Teaching, pp. 136-140. Yuan Jun Guangxi Teachers Education Univ. Ou Huanghai Guangxi Teachers Education Univ. Teaching is a complicated social system with human’s actions and thinking actions. To have specific cognition, understanding and evaluation to teaching system, we must record, analyze, study the teaching process efficiently to make the evaluation of teaching process perfect. Based on some concrete cases, this paper discusses the theory and methods on how to use S-T analyzing methods of education information processing to collect, deal with and analyze the teaching information in class. MoA 5.4 The Construction of Chinese Chess Computer Game Platform, pp. 126-128. Wei Zhou Northeastern Univ. Jianchang Liu Northeastern Univ. Yuanhe Zhao Northeastern Univ. The construction of computer Chinese chess game platform creates favorable conditions for the development of discrete event dynamic system theory and provides a good research platform for solving dynamic countermeasure problems in discrete system. MoA 6.2 Research and Practice on Higher Vacational “Photogrammetry and Remote Sensing” Course Construction, pp. 141-144. Tong Biao Liaoning Provincial College of Communication Wu Wenbo Liaoning Provincial College of Communication 40 This paper introduces the basement of the course construction, curriculum positioning and teaching content selection, and teaching practice and summury. The overall ideology of this reform is to change the traditional mode of Photogrammetry and Remote Sensing education, and combined the entire contents of the course into five projects, around which the knowledge points was selected. All the projects are from actual production. Students’ grades is based mainly on regular performance, and supplemented by a final exam. Through the practice of this reform, students’ enthusiasm in learning has been markedly improved. The main features of this course Construction is the "four combination", namely, teaching projects combined with production projects, classroom teaching combined with surveying and mapping standards, teaching practice combined with research, teaching methods combined with Google Earth. important sections to be focused on, i.e., needs analysis, teaching and summary. Firstly, real projects should be chosen adapted to students, matching related course and covering all knowledge points of syllabus. At the section of teaching, it includes single-item training, integrated-project training and innovated-project training, and the result of experiment shows that students’ competence of career is increased spirally after the training. During the final period, not only conclusions should be made, but also be feedback to needs analysis for next better teaching plan. It is proved that the ability-targeted mode works well. MoA 6.6 Improving Computing Undergraduates’ Entrepreneurial Abilities, pp. 158-161. Huang Lingli China Jiliang Univ. Huang Jun China Jiliang Univ. Integrating entrepreneurship education and activities in computing curricula can have a significant effect on the creativity, innovativeness, leadership and entrepreneurial intentions of computing undergraduates. The paper examines the current status of professional computing education for undergraduate majors in regional universities of China. We describe our modus operandi in integrating entrepreneurial education in our discipline-related education by carrying out "entrepreneurship education" program and the teaching effect on our students, and we also discuss some exiting problems in developing computing entrepreneurship education at China’s universities. Results from our first 3 years indicate the program is effective for increasing students’ interest in entrepreneurial intentions, which enable students to be more proactive in improving their overall quality and tapping their entrepreneurial potential. MoA 6.3 Exploration of Visual Teaching for Digital Filter Design, pp. 145-148. Yang Fulong Lanzhou Univ. of Tech. Zhang Aihua Lanzhou Univ. of Tech. Lin Dongmei Lanzhou Univ. of Tech. This paper presents a dynamic demonstration system based on pulse and sound signal, which is to be used in the teaching of digital filter design. What we can observe in the system are as follows: the change of filtering performance as pole-zeros changing; the frequency domain characteristics of filter and the effects of amplitude frequency characteristics; phase frequency characteristics effects on filtering performance; the effects of filter’s order on the filtering performance. Stduents can feel the effects of filter by observing the visual teaching system and hearing the filtered sound signal, which can enhance students’ interest. MoA 6.7 The Educational Modeling Languages in Instructional Design: Towards a UML Applications, pp. 162-165. Zhi Jiang Jimei Univ. Educational Modelling Languages (EMLs) are semantic information model and design languages to create models of educational units. EMLs and the some specification bring an important innovation to the Instructional Design(ID). This paper is introduces some basic concepts about of EMLs, namely classifying existing major design Languages and presenting their potential applications, The authors demonstrate how an object-oriented approach in combination with UML can be used to develop Instructional Design. MoA 6.4 Base on Human-Computer Interaction Perspective to Analyze the Factors of Technology Acceptance Model on IRSSP for Taiwan Recommendatory Admission, pp. 149-153. Chien-Yun Dai National Taiwan Normal Univ. Jin-Jung Jang National Taiwan Normal Univ. Tzu-Hao Lee National Taiwan Normal Univ. Yu-Tsang Chen Chung Shan Industrial Commercial High School Yu-Hsi Yuan National Taiwan Normal Univ. The study purpose is aimed to explore the impact factors of Perceived Ease of Use, Perceived Usefulness, and Attitude toward Using in Technology Acceptance Model on internal rating system for star plan in Taiwan based on the perspective of Human-Computer Interaction. A twenty-six-item questionnaire was developed according to literature review. Path analysis approach was employed for data analysis. Total 235 valid samples were selected from senior high school student at three grades. The convenience sampling strategy was implemented. The result support our hypothesis that Human-Computer Interaction can predict Perceived Usefulness (β=0.253; p<0.01), Perceived Ease of Use (β=0.160; p<0.01), and Attitude Toward Using (β=0.258; p<0.01) positively, meanwhile, Perceived Ease of Use can predict Perceived Usefulness (β=0.220; p<0.05) and Perceived Usefulness can predict Perceived Ease of Use (β=0.112; p<0.05), moreover, Perceived Ease of Use (β=0.254; p<0.05) and Perceived Usefulness (β=0.716; p=0.000) can predict Attitude Toward Using. Conclusions and suggestions were made dependent on our research findings. ThA 1 Computer Application ThA 1.1 An Empirical Study of Consumer’s Repurchase Intention of Tablet PC, pp. 166-171. Yin-Tsuo Huang Toko Univ. Kuowei Lee National Taichung Inst. of Tech. Wenyuan Chan Yunnan Univ. Mobile technological products have now become part of people's lives. As such, the tablet computer is really a new-generation PC that is very popular among business people as well as students, due to its comfort and mobility, and because it functions well. The purpose of this explanatory and exploratory research survey was to test a hypothesized model regarding customers’ perceptions of brand image, the sacrifices involved in the purchase, value, satisfaction, brand loyalty, and repurchase intention. Data was collected from 818 responses via questionnaire survey, and all scales were examined for reliability and construct validity. The findings indicated that (a) customers’ positive perceptions of brand image have a significant positive effect on brand loyalty; and (b) customers’ perceived level of sacrifice has a significant negative effect on customer satisfaction. The limitations and recommendations for future research are also included in this study. MoA 6.5 A Mode of Ability-targeted Computer Curriculum Reform Based on Projects in Engineering Education, pp. 154-157. Yifang Zhang Zhejiang Inst. of Mechanical & Electrical Engineering Binwei Yang Zhejiang Inst. of Mechanical & Electrical Engineering Practical ability is always mentioned which is the most important in higher vocational education. This paper discusses a kind of ability-targeted mode based on projects in computer courses teaching in China, such as Office Automation and Web Design. When traditional teaching mode being reformed into ability-targeted and project-based mode, there are three ThA 1.2 Application of ICT in Human Machine Interface Design Course, pp. 172-175. Liu Wenjie Northwestern Polytechnical Univ. 41 Zhou Yuntao Northwestern Polytechnical Univ. Traditional educational methods often focus on the teacher’s role and teaching form in the class is vary monotonous. This paper proposed a method to apply ICT into the human machine interface course, which can provoke the interests of students to this course. ICT makes the educational method become variable and colorful therefore promotes the quality of education. In addition, ICT is applied into the practice section. Students were asked to choose a new IT technology they are interested in and to form a developing team, to use the theory they studied in the class to design a software interface. By this way, they master the theory of this course on the basis of practice and their developing abilities are also enhanced. diagnosis function of the experts, greatly improving the efficiency of diagnosis. ThC 1.2 Research on UAV Health Evaluation Based on PNN, pp. 189-190. Northwestern Polytechnical Kun Zhang Univ. Northwestern Polytechnical Deyun Zhou Univ. In view of UAV system development and the need of the UAV avionics system health evaluation, this paper establishes UAV state evaluate model of avionics system based on PNN(Probabilistic Neural Networks), designs and realizes UAV avionics system evaluation software. Finally, the simulation result indicates that this algorithm is reasonable and effective. This method can help people to design the avionics system, evaluate the UAV avionics system online, locate avionics system fault. ThA 1.3 Improving University e-Learning with Exploratory Data Analysis and Web Log Mining, pp. 176-179. Chakarida Nukoolkit King Mongkut's Univ. of Tech. Thonburi Praewphan Chansripiboon King Mongkut's Univ. of Tech. Thonburi Satita Sopitsirikul King Mongkut's Univ. of Tech. Thonburi The success of an e-Learning system depends on several factors: a supportive infrastructure, high-quality content, effective format, and high availability to satisfy ongoing user needs. In this paper, we perform exploratory data analysis and data mining on an e-Learning web log, which spans one academic year. The study uncovers the e-Learning users’ usage behavior in accessing the content. The study discovers e-Learning media popularity and usage patterns, and helps the institution fine tune future courseware, from strategic changes to the fine-grain of lesson content improvement. ThC 1.3 An Iterative Algorithm for Solving Complementarity Problems and its Convergence, pp. 191-194. Yalu Liu Beijing Inst. of Petro-Chemical Tech. Dandan Yang Inner Mongolia Normal Univ. In present paper, a novel smoothing function method for nonlinear complementarity problems is proposed. Then the property of the function is discussed. And the conditions of convergences of this iteration algorithm are given, so that the reference conclusions are extended. Theory analysis and primary numerical results illustrate that this method is feasible and effective. ThC 1.4 Research on CPS Spatio-Temporal Event Model Based on the State, pp. 195-198. Chen Lina National Univ. of Defense Tech. Huang Hongbin National Univ. of Defense Tech. Deng Su National Univ. of Defense Tech. Cyber-Physical System (CPS) reflects the dynamic changes of physical environment through the event, closely interacts with the physical environment. CPS often involves a wide spectrum of events, and CPS events reflect the environment changes in a time-sensitive and/or spatial-sensitive manner. The event is an effective way of mapping physical environment to cyber domain. We analyzed the concept and features of CPS events, proposed the spatio-temporal event model framework based on the physical states. We proposed the compositive operation between the different types of events, and then the environment state can be distilled from the combined event. Finally, a smart house is developed based on the event model, results show that the event model can reflect the spatiotemporal features of CPS and the dynamic changes of environment, is propitious to the decision making of CPS. ThA 1.4 Research on Distance Collaborative Activities for Teacher Education based on Online Video and Cloud Computing Environment, pp. 180-185. Baocong Jiao Capital Normal Univ. Sufang An Capital Normal Univ. Hongyun Wang Capital Normal Univ. Haiguang Fang Capital Normal Univ. Socialization and virtualization of network, which provides favorable context for distance teaching and research, promotes the professional development of teachers. However, due to the lack of systematic and successful pattern to extend, the utilization rate of resources in distance education is very low, and the advantages of context for network resources in teaching and research are not fully played in China. The research is based on the development of cloud computing technology and the application of online video resources, analyzes the pattern of distance collaborative activities for teacher education and the application case, and elaborates the distance collaborative mechanism, in order to provide a perspective and practical references for the distance collaborative teaching and research in cloud computing environment. ThC 1.5 Development of Particle Swarm Optimization Algorithm, pp. 199-204. Yu Chen Xiamen Univ. Fan Yang Xiamen Univ. Quan Zou Xiamen Univ. Chen Lin Xiamen Univ. Particle swarm optimization (PSO) is a new stochastic optimization technique based on swarm intelligence. In this paper, we introduce the basic principles of PSO firstly. Then, the research progress on PSO algorithm is summarized in several fields, such as parameter selection and design, population topology, hybrid PSO algorithm etc. Finally, some vital applications and aspects that may be conducted in the future investigations are discussed. ThC 1 Artificial Intelligence ThC 1.1 Research on Expert System of Diseases and Insects of Jujube Based on Neural Networks, pp. 186-188. Song Jianwei Shijiazhuang Univ. Wu Shuomei Shijiazhuang Univ. Ren Ji Shijiazhuang Television College Yu Xiaohong Hebei Taihang Machinery Industries Corporation The traditional expert system has shortcomings of poor self-learning ability, then expert system of diagnosis of jujube diseases and insects which is based on neural networks is designed. The related symptoms of jujube diseases and insect are collected and diagnosed by expert, the conclusion of the diagnostic process is regarded as the input neurons and output neurons of neural networks. After the learning of neural network, the results are as the part of knowledge base, and an improved neural network is designed, implementing the function of system diagnosis. The field test has shown that the system fully mimic the ThC 1.6 Text Cohesion Visualizer, pp. 205-209. Chakarida Nukoolkit Praewphan Chansripiboon Pornchai Mongkolnam Richard Watson Todd 42 King Mongkut's Univ. of Tech. Thonburi King Mongkut's Univ. of Tech. Thonburi King Mongkut's Univ. of Tech. Thonburi King Mongkut's Univ. of Tech. Thonburi In this paper, we describe the concept and design of a novel visualization tool to aid in academic writing of English as a Second Language students. The tool makes use of theory in classroom discourse, WordNet API, and linguistics rules given by a linguistics expert, by analyzing English language essays for their linguistic bond counts and links within and between paragraphs. These linguistic indicators reveal the structure and flow of essays, clusters of main ideas, as well as incoherent sentences, which obstruct essay unity. The lack of essay unity is one of the most common writing errors of English as a Second Language learners. The output of the system is shown as several kinds of visualizations that provide writing feedback to users, as well as an autocorrect functionality to improve essay unity. Novice English learners may benefit greatly from this system. class information words (SCIW). First, selecting five kinds of Chinese Framenet features, and using SCIW to select features. According to each category’s classification precision of features, sorts them. Through the experiment of the combination of the features, we select the combination of features. It improved the accuracy of classification, reaching the feature reduction. ThC 1.11 User Alias Authority Ranking Based on Email Communication Relation Analysis, pp. 226-231. Meijuan Yin Zhengzhou Info. Sci. & Tech. Inst. Junyong Luo Zhengzhou Info. Sci. & Tech. Inst. Xiaonan Liu Zhengzhou Info. Sci. & Tech. Inst. Xiao Li Zhengzhou Info. Sci. & Tech. Inst. Finding information about real identity of email users from Email is one of the important topics in email mining. Existing methods focus extracting name information of users from email datasets, but not pay much attention to the research about aliases that belong to the same user. That extracting user’s aliases and ranking authority of the aliases is very significant to some network researches and applications such as identity identifying, important people finding and so on. This paper focuses on ranking the authority of user’s aliases having been extracted from emails and gives the most authoritative aliases of users. Based on the facts that different aliases of a user take different positions in the user’s email communicating relationship, we propose a novel method to rank the authority of an alias for the email user by analyzing email communication relationship. Results on the public subset of the Enron corpus indicate that the approaches presented in this paper can efficiently rank the authority of user’s aliases and find the authoritative aliases of a user and the average precision of the methods is more than 90%. ThC 1.7 Improve VSM Text Classification by Title Vector Based Document Representation Method, pp. 210-213. Tian Xia Shanghai Second Polytechnic Univ. Yi Du Shanghai Second Polytechnic Univ. Text Classification is a daunting task because it is difficult to extract the semantics of natural language texts. Many problems must be resolved before natural-language processing techniques can be effectively applied to a large collection of texts. A significant one is to extract semantic information from corpus in plan text. In Vector Space Model, a document is conceptually represented by a vector of terms extracted from each document, with associated weights representing the importance of each term in the document and within the whole document collection. Likewise, an unclassified document is also modeled as a list of terms with associated weights representing the importance of the terms in it. Many techniques introduces much statistical information of terms to represent their semantic information. However, as always, document title is not taken into special consideration, while it obviously contains much semantic information. This paper proposes Title Vector to address this issue. ThC 1.12 DNA Computing Research Progress and Application, pp. 232-235. Yanyan Huang Xiamen Univ. Ling He Xiamen Univ. In computer’s word, the basic idea of DNA computing is using processing power of organic molecular information instead of digital switch components. In recent years, DNA computing has become one of the important researches which solve complex problems. In this paper, in comparison with the analysis of the development of DNA computing, we introduce the working principle and mathematical model, and three branches of the calculation model. At last, we discuss travel salesman problem for example ,and put forward coding method of DNA sequence. ThC 1.8 Formal Contexts in Ontologies, pp. 214-217. Sun Yu Yunnan Normal Univ. Xia Youming Yunnan Normal Univ. Li Zhiping Yunnan Normal Univ. In this paper, an ontology is regarded as an information system in formal concept analysis. Then, based on theories of concepts, a formal context in ontologies defined by a set of properties is conceptualized as a concept with the extent and the intent. There are two kinds of properties implied by a formal context: one is the set of properties in its intent and another is the set of default properties. Then the features of formal contexts in ontologies are discussed in detail. ThC 1.13 P2P Caching Sequences Based on Partial Trust Negotiation Game, pp. 236-239. Chunzhi Wang Hubei Univ. of Tech. Ruoxi Wang Huazhong Normal Univ. Hong Li Hubei Univ. of Tech. Chen Hongwei Hubei Univ. of Tech. Trust negotiation is the process of revealing the certificates and the strategy set of the resource requester and the resource provider with each other, while after negotiation succeeding cache selectively the sequence of revealing the certificates according to the their use ratio and showing directly at the next time, which can save plenty of time costing. This paper makes a split of the negotiation process to many steps and cache part in order to improve the whole performance. Via the mixed static game theory to construct the model of the caching sequence, using the ratio as a label, simulate the situation of part of caching sequence, and then analyze to obtain the measure of optimal performance of the system via adjust the use ratio of certificates. At last, the simulation software, Gambit, checks the correctness of the model of the game theory. ThC 1.9 A New Method for Classification in DNA Sequence, pp. 218-221. Qingda Zhou Xiamen Univ. Qingshan Jiang Shenzhen Inst.s of Advanced Tech., Chinese Academy of Sci.s Dan Wei Xiamen Univ. As an important part of biological sequence data, DNA sequence determines the type and function of the DNA. Wiping off the independent random background in the process of DNA sequence feature extraction to solve the repeated computation in information extraction, then using the k-means method to cluster the dataset, and SVM algorithm in classification respectively, the method in this paper finally determines the final result according to voting, and experiment results show that the algorithm has better search efficiency, and can get better research results. ThC 1.10 Question Classification Oriented Chinese Framenet Feature Selection, pp. 222-225. Geng Yan Business College of Shanxi Univ. Wang Wenjing Business College of Shanxi Univ. For feature selection of the classification in Restricted-domain Question Answering System, Chinese Net framework full advantage of this Chinese characteristics in terms of semantic expression, this paper presents feature selection called strong ThC 1.14 The Automatic Detection Algorithm of Tongue Cancer Stem Cells Based on Fuzzy Pattern Recognition, pp. 240-244. Kehe Cai Wuhan Univ. Mengyi Liu Wuhan Univ. Yuyu Zhang Wuhan Univ. In this paper, we present a novel recognition algorithm for detecting tongue cancer stem cells with respect to appropriate 43 scaling factors. Our method can be achieved by computer image processing in the condition that the cancer cells are undifferentiated or slightly differentiated, which is of important research significance in the realm of oral medicine. According to the biological natures of tongue cancer stem cells, we select the curvature variance of cell contour, the nuclear-cytoplasmic area ratio, and the average optical density of cytoplasm as the measurement parameters. Using these three biological parameters, the characteristics of cancerous tumor cells can be described and thus classified. Therefore, those cells can be categorized under the principle of maximum degree of membership in fuzzy pattern recognition algorithms. In this way, the tongue cancer stem cells can be automatically detected. Desirable recognition results given by our experiments have substantiated the efficiency of our algorithm. Luo Delin Xiamen Univ. Zhao Lixiao Xiamen Univ. Xu Zhihui 95168 Military Unit Traveling Salesman Problem (TSP) is a kind of hard problem in the mathematic field. It is very hard to solve using deterministic algorithms. So it often resorts to heuristic stochastic search algorithms. In this paper, a Heuristic Simulated Genetic Algorithm (HSGA) is presented to solve TSP problem, in which Genetic Algorithm (GA) functions as global search strategy while the designed Heuristic Simulated Annealing (HSA) algorithm acts as local search strategy applied on partial optimal solutions at each iteration. The function of HSA is to enhance the search effectiveness over the solution space and to avoid getting stuck into local optimal trap. Simulation results demonstrate that the effectiveness of the presented algorithm. ThC 1.15 A Novel Circle Covering Algorithm Based on Coulomb Force Model for the Problem of Locating Repeaters, pp. 245-249. Yuyu Zhang Wuhan Univ. Jiquan Yin Wuhan Univ. Peng Zhang Wuhan Univ. In this paper, we present a novel circle covering algorithm for the problem of locating repeaters when users in a certain area need to be covered. A fundamental issue is the circle covering problem, where “single-layer covering” equals “covered”. However, single-layer is not applicable anymore for the covering of repeaters, because the service capacity of a single repeater is so limited that it cannot accommodate all the users inside its service area. Therefore, “multi-layer covering” should be taken into consideration. To solve this multi-layer problem, we propose a physical model - the Coulomb Force Model. In our method, repeater node is regarded as positively charged particle; Areas with insufficient and surplus covering of repeaters are respectively regarded as negative electric particles and positive ones. We simulate the movement of repeater nodes in this electric field according to Coulomb’s Law, and finally they will reach a dynamic balanced state. In this way, an optimal solution can be obtained for the problem of locating repeaters. ThC 1.19 Iterative Learning Control for Uncertain Time-delay Linear System, pp. 265-268. Jie Wu Hubei Normal Univ. Xisheng Zhan Hubei Normal Univ. In this note, a repetitive learning control (RLC) approach is proposed to deal with periodic tracking tasks for uncertain time-varying delay systems. The design of an open-close loop P type iterative learning controller is studied for uncertain time-varying delay systems. The design procedure is based upon obtaining the sufficient condition of convergence by Lyapunov theory, an iterative learning law is obtained by resolving linear matrix inequalities (LMI) ThC 1.20 Research on Intelligent Test Paper Generation Base on Improved Genetic Algorithm, pp. 269-272. Chen Xiumin Hebei Normal Univ. of Sci. & Tech. Wang Dengcai Hebei Normal Univ. of Sci. & Tech. Zhu Meining Hebei Normal Univ. of Sci. & Tech. Yang Yanping Hebei Normal Univ. of Sci. & Tech. In order to solve the problems such as blindfold search, slower convergence, and sometimes unsuccessfully search in the present genetic algorithms used for intelligent test paper generation, this paper introduces an improved genetic algorithm for intelligent test paper generation. This algorithm generate optimized initial chromosome group and controlling crossing and variation recurring to test paper parameters and randomization. Consequently, it can avoid the problems of blind search and slower convergence resulted by complete randomization controlling adopted by the present genetic algorithms. At last, this paper proves the improved genetic algorithm can better solve the intelligent test paper generation problem compared to present genetic algorithms mentioned in algorithm analysis section of this paper. ThC 1.16 Constructing the Representation Model of Arithmetic Word Problems for Intelligent Tutoring System, pp. 250-255. Yuhui Ma Bohai Univ. Kai Tan Bohai Univ. Limin Shao Bohai Univ. Xiaojing Shang Bohai Univ. The research of representation model has been concentrated on by psychologists and education researchers for several decades. It is also important for ITS in which the problem described by natural language is solved and the level of comprehending is diagnosed. We propose that problem solving and diagnosing will be performed well depending on the representation. In this paper, we first discuss the role of representation model in ITS. And then how to construct the representation model of arithmetic word problem is described. Some examples are given, too. We conclude that the problem will be solved and diagnosis be performed upon the representation model. ThC 1.21 An Improved System Dynamics Model for China’s Ration Demand System, pp. 273-277. Yanhua Li Henan Agricultural Univ. Xiuxia Lu Henan Agricultural Univ. Bingjun Li Henan Agricultural Univ. Based on the System Dynamics approach, a forecasting model for China's ration demand, named SDCRD, is developed. To further improve the fitness for historical data of traditional System Dynamics model, Support Vector Machine (SVM) technique is also applied, which has the ability to increase the efficiency and accuracy of SDCRD. Considering the ration demand system and other influential factors, such as the urbanization rate, residents' consumption habits, per capita income, and scientific-technical progress, etc. as a holistic system, SDCRD makes a more objective and accurate forecast for China’s future ration demand. The prediction results indicate that the amount of overall ration demand in China has a moderate increase from 228.935 million tons in 2011 up to 230.65 million tons in 2020, with an average annual growth rate of 0.075%. Furthermore, the proportion of urban ration demand to total consumption steadily increases by years, from 36.77% in 2011 to 43.02% in 2020, whereas the rural ration demand descends gently from 144.754 million tons in 2011 to 134.062 million tons in 2020, which reflects the trend of structural changes of China's ration demand in coming decade. ThC 1.17 Design of Automated Course Scheduling System Based on Hybrid Genetic Algorithm, pp. 256-259. Yong Ouyang Hubei Univ. of Tech. Yi Chen Hubei Univ. of Tech. Course Scheduling problem is a constrained, multi-objective optimization problem, and has proven to be a NP complete problem, usually resolved by genetic algorithm, but the effect is not satisfactory, the paper presents a genetic algorithm-based , combined with tabu search and the coloring principle to automatically arrange more complete global search using genetic algorithms, tabu search using local optimization, convergence speed and avoid local optimization, the better solution for all hard soft conditions constraints and satisfactory solution by the users. ThC 1.18 Heuristic Simulated Annealing Genetic Algorithm for Traveling Salesman Problem, pp. 260-264. 44 instruments to input information into brain, convert or control the thinking patterns of brain. Current and future development of such technology will make a great influence on law philosophy or cause a range of positive or negative issues in legislation area or the research of legal rationality or discipline and reform, or event cause our anxiety, thought and response to relevant negative legal issues or crisis. ThC 1.22 A New Approach to Stability Analysis of Systems with State Delay, pp. 278-280. Jie Wu Hubei Normal Univ. The close loop P type iterative learning control is proposed for systems with state delay in this paper. The design procedure is based upon obtaining the sufficient condition of convergence by Lyapunov theory, an iterative learning law is obtained by resolving linear matrix inequalities (LMI). The proposed method is more easily realized and strong practical. The scheme proposed guarantees that the tracking error converges to a pre-specified error bound after finite iterations. Finally the simulation results show the effectiveness and feasibility of the proposed algorithm. ThC 1.27 A Fast Adaptive Stream Cipher Algorithm and Expanded Search, pp. 297-304. Xiaojing Hu Xiamen Univ. Lizhao Liu Xiamen Univ. Ying Wang Xiamen Univ. Maoqing Li Xiamen Univ. Tianhua Zhang Louisiana Tech Univ. To solve the problem of traditional stream ciphers can not transmit through the public channel and the construction of high-strength cipher key generator, the paper presents the minimum power clock function driven by a parallel clock-control sequence and chaotic cascade function made of multiple Logistic function, which are used to built the self-reference model and chaotic module; it designs an adapt controller independent of the key generator and encrypt module, achieve controlling encryption and transmission process by multi-threaded code; it makes a high-strength key generator with sure differential transformation and pseudo-random horizontal level disturbance wheel key method of AES and S-box of Camellia, which makes the sub-key and uncertain within controlled area that does not depend on the secret channel, the model achieves an exponential growth in the key space and the same application scope of traditional stream cipher model. The new protocol model features can be seen under the actual operation of modifying RC4 and real-time RC5 algorithm. ThC 1.23 Research of Optimal Placement of Active Reference Tags Based on LANDMARC Algorithm, pp. 281-285. Weiguang Shi Tianjin Univ. Kaihua Liu Tianjin Univ. Chunya Ni Tianjin Univ. Ge Yan Tianjin Univ. LANDMARC algorithm achieves satisfactory location accuracy with less reader by introducing active reference tags, usually placed in the form of regular grid and served as neighbors for the tracking tags. However, the uniform arrangement of the reference tags is not applicable in the case that the probability occurrence of each area differs greatly, or obstacles like wall and partition exist. The paper firstly establishes the objective function according to an event-based occurrence probability model, and then proposes a PSO-based optimizing mechanism. Comparing with an earlier solution and the uniform arrangement, we come to the conclusion that the proposed algorithm provides a better design with higher accuracy and stability. ThC 1.24 Diagonal Recurrent Neural Network with Output Feedback and its Application, pp. 286-288. Lisang Liu Xiamen Univ. Xiafu Peng Xiamen Univ. In this paper, a new diagonal recurrent neural network with output feedback model was proposed and applied to ship rolling time series prediction. On the basis of diagonal recurrent neural network, the output was feedback to hidden layer to form a new neural network structure. The new neural network and its mathematical model were given at first. Second, the learning algorithm and the update rule were presented in detail. Because of internal self-feedback, the diagonal recurrent neural network with output feedback can learn nonlinear dynamic system without knowing system order. Finally, the simulation results proved that the proposed model has good online prediction capability. ThC 1.28 An Indoor Positioning Technology Based on GA-BP Neural Network, pp. 305-309. Miao Kehua Xiamen Univ. Chen Yaodong Xiamen Univ. Miao Xiao Xiamen Univ. With the development of wireless positioning technologies, indoor positioning technologies are getting more and more noticeable. RFID positioning technology reaches the goal of recognizing and positioning by using radio frequency to transmit data through non-contact two-way communication. This technology has the advantages of long transmission effective range, low-cost, non-contact, non-line-of-sight and so on. Using the technology, a GA-BP Neural Network based indoor positioning algorithm is proposed in this thesis, series of tests to it in practical setting are also carried out. The result shows that the algorithm can solve the problems caused by the complication and variation of indoor environment at a certain degree. ThC 1.25 Jurisprudence on New Developments of Brain Science, pp. 289-292. Wu Xuyang Xiamen Univ. Zou Yuzhuo Xiamen Univ. In recent years, western countries have made great progresses in the area of brain science, which provides advanced scientific and technological supports to the physiological study of behavioral decision. These progresses are not only of significance in natural sciences, but also demonstrate strong basic significance in humanities and social sciences. Meantime, they expanded the new vision of legal studies and brought about new waves of problems and thinking, and indicated an alternative approach of development for the research methods and research areas of legal studies. ThC 2 Communication Technology ThC 2.1 A Transient Signal Detection Technique Based on Flatness Measure, pp. 310-312. Xuemin Zhang Changchun Inst. of Tech. Changqing Cai Changchun Inst. of Tech. Jianhong Zhang Changchun Inst. of Tech. In perceptual audio coding, it is necessary to deal with the transient signals in a frame. A reasonable transient detection is a premise of the treatment. According to the characteristics of transient signals in time domain and frequency domain, a time-frequency transient detection method which uses flatness measure is proposed in this paper. Comparing with existing transient detection methods, transient signal detection technique based on flatness measure not only has advantages to reduce missed and misused detection, but also hardly produce redundant detection in low-energy transient segment. Simultaneously, the complexity of the algorithm adaptively changes with the apparent extent of the transient signal. Simulation results show that this method is high in detection accurancy and simple in algorithm realization ThC 1.26 Law Philosophy Analysis: Application of Medical Instruments for Direct Reading and Influence of the Activities of Cranial Nerve, pp. 293-296. Wu Xuyang Xiamen Univ. Zou Yuzhuo Xiamen Univ. Application of medical instruments for direct reading and influence of the activities of cranial nerve is a great breakthrough to medical research; its development direction may be use of 45 It is significant of applying error concealment in video transmission in wireless network. This report compares the new FMO (Flexible Macroblock Ordering) model based on H.264 to the traditional FMO model in error concealment. The author test different FMO model and make the contrast of results through selection of different standard test video sequences. And the testing result indicates that different FMO model selection for different transmission environment can reach the best error concealment effect, which provided a new concept of adaptive error concealment. ThC 2.2 An Improved Warped DFT Algorithm Based on Signal Sparse Representation, pp. 313-315. Jian Zhou Anhui Univ. Chenyang Cui Anhui Univ. Guofeng Zhu Anhui Univ. Yaguang Ding Anhui Univ. Liang Tao Anhui Univ. Warped Discrete Fourier Transform(WDFT) offers an alternative to increase frequency resolution at any selected parts of spectral axis without extending the number of sampling points. In order to have a stable and robust spectrum, the warp coefficient must be selected carefully, and this is not allowd in many applications,such as speech processing,since the warp coefficient is computed by human auditory principle. Inspired by sparse signal representation theory, we propose a WDFT algorithm based on matching pursuit methodology. The experimental results show that a better warp spectrum representation and a better signal reconstruction performance are got when the number of basic signal is more than the length of signal. It is more suitable for perceptual speech processing than ordinary WDFT. ThC 2.7 Study on Digital Measurement Methods of Engine Transient Speed and Corresponding Error, pp. 333-336. Cheng Wang Huaiyin Inst. of Tech. Shanzhen Xu Huaiyin Inst. of Tech. It discussed the basic methods of measuring speed and corresponding error. And it analyzed the relationship between signal pulses per revolution and measurement accuracy, and it analyzed the error of measuring frequency and measuring period with a certain signal pulses per revolution. It presented the corresponding relation curves and proposed a sub-optimal solution of speed measurement. ThC 2.3 Finite Element Analysis of Composite Leaf Spring, pp. 316-319. Zheng Yinhuan Wuhan Univ. of Tech. Xue Ka Wuhan Univ. of Tech. Huang Zhigao Wuhan Railway Vocational College of Tech. This paper analyses the mechanics characteristic of a composite leaf spring made from glass fiber reinforced plastics using the ANSYS software. Considering interleaf contact, the stress distribution and deformation are obtained. Taking the single spring as an example, comparison between the performance of the GFRP and the steel spring is presented. The comparison results show that the composite spring has lower stresses and much lower weight. Then the automotive dead weight is reduced observably. ThC 2.8 Power Design of 3G Wireless Data Terminal Based on USB Bus, pp. 337-339. Liu Xiaochun Chang-an Univ. Hu Dongping ZTE Corporation This paper analyzes the design feature of USB-based wireless 3G data terminal power supply and points out the defects of traditional design methods. Focusing on the problems existing in the traditional design, this paper proposes a new design plan of the power supply for wireless 3G data terminal based on USB. The practices have proved the feasibility of this plan, which well meets the needs of miniaturization and low cost of wireless 3G data terminal in the market. ThC 2.4 Measurements and Analysis of Internet Physical Properties Based on ICMP, pp. 320-323. Jinjun Hu Southwest Univ. of Sci. & Tech. Ling Xing Southwest Univ. of Sci. & Tech. Jianguo Ma Southwest Univ. of Sci. & Tech. Qiang Ma Southwest Univ. of Sci. & Tech. As the Internet consists of a large number of nodes, measuring the whole Chinese Mainland is a timeconsuming and demanding task. This paper addresses this issue by tactically choosing small-scale test sources and target IP address set and making a survey of Internet physical properties in central cities and second-tier cities. The research is focused on Internet diameter, degree distribution and clustering coefficient. Results show that the Internet is a complex network with “small world” phenomenon and “scale-free” feature. ThC 2.9 Spatial Sampling Criteria for Recognition of Structures, pp. 340-343. Han Yueping North Univ. of China Li Ruihong North Univ. of China Han Yan North Univ. of China Spatial sampling criteria based on a single view X-ray imaging system are proposed for recognition of the interior assembly structures of complex products. There must be a maximal rotary step for an object within which the least structural size to be tested is ascertained in advance. Rotating the object by the step and imaging it and so on until a turn is completed, an image sequence is obtained that includes the full structural information for recognition. The maximal rotary step is restricted by the least structural size and the resolution of the imaging system. Based on the criteria, the first domestic X-ray digital test system has been developed and applied to the online inspection of objects containing complicated assembly structures. ThC 2.5 Improvement on Decoding of the (71, 36, 11) Quadratic Residue Code, pp. 324-329. Hungpeng Lee Fortune Inst. of Tech. Hsinchiu Chang Fortune Inst. of Tech. In this paper, a fast algebraic decoding algorithm (ADA) is proposed to correct all patterns of five errors or less in the binary systematic (71, 36, 11) quadratic residue (QR) code. The method is based on the modification of the ADAs developed by Reed et al and Lin et al. The new conditions and the errorlocator polynomials for decoding this code will be derived. Besides, a computer search shows that the minimum degree of the unknown syndrome polynomial f(S7) in the five-error case is 2. Hence, the computational complexity can be reduced in finite field. Simulation result shows that the average decoding time of the proposed ADA is superior to the ADA given by Chang et al. ThC 2.10 Face Recognition Based on Singular Value and Feature-matrix, pp. 344-347. Hu Hongping North Univ. of China Li Ruihong North Univ. of China Zhou Hanchang North Univ. of China The face recognition algorithms based on singular value decomposition (SVD) have low recognition accuracy due to the common essential defect which singular value vector of arbitrary two face images have the different basis spaces in genera1. According to this, a weighted adaptive algorithm based on some important partial features is proposed. It normalizes different faces and then locates the features of eyes, nose and mouth with horizontal and vertical projections. Subsequently, local features of the key parts of face are extracted and weighted respectively by singular value to get the feature-matrix. Dynamic method of how to choose the weights of local features and formula of how to obtain the feature-matrix is given. Finally, the developed support vector machine is utilized to recognize faces. Experiments show that the proposed algorithm can not only calculate efficiently and ThC 2.6 The Test and Analysis of FMO Model in Error Concealment Based on H.264, pp. 330-332. Du Li Jiangxi Univ. of Sci. & Tech. Junqin Wu Jiangxi Univ. of Sci. & Tech. 46 work easily, but also deal with low recognition rate issues in SVD, which shows a good potential of application. ThC 3.5 Application Research of Fuzzy Clustering Approach in the New Rural Cooperative Medical Insurance System Module, pp. 361-364. Tang Zhong Guangxi Medical Univ. Yang Gefeng Guangxi Medical Univ. Ou Xu Guangxi Medical Univ. Liang Zhisheng Guangxi Medical Univ. Based on the analysis the advantages and disadvantages of hierarchical clustering and fuzzy clustering methods, make sample points within each subspace as similar as possible, differences between sample points within different subspace as large as possible, The essence is to find different data models which hidden in different data. It is an unsupervised learning process that enables the blind classification in the sample spaces. Currently clustering data mining research is a very active field.t. ThC 3 Computer Application ThC 3.1 A New Study on the Integrating of Random Walk Process and Multiple Point Geostatistics to Model the Fluvial Reservoir, pp. 348-350. Yin Yanshu Yangtze Univ. Ding Hui Yangtze Univ. Shi Shuyuan Yangtze Univ. The multiple point geostatistics can not reproduce the continuous shape of the channel due to the limitation of the algorithm with random draw of the simulated value. A new method is proposed which integrates the random walk process with multiple point geostatistics. First the random walk process produces the channel main streamline, then the draw of simulated value in multiple point geostatistics is conducted by the streamline. The method solves the continuities problem in channel. The real model is constructed with both the new method and only the multiple point geostatistics and the results show the new method can reproduce the continuous sinuous channel. A cross-validation is implemented and the result is also well, which proves the new method is robust and can be put into real reservoir modeling. ThC 3.6 Information Technology in Teacher's Professional Skill Training Application, pp. 365-369. Xilong Tan Hubei Univ. of Education Huiling Wang Hubei Univ. of Education Information society requires training school of the information literacy of citizens. Teachers to be skilled in information technology and information society of teachers ' professional skills. In order to develop professional skills, able to adapt to the education information needs of teachers, our school in the teacher's training mode reform and practice conform to the trend of teacher professionalization, teachers ' professional skills in information technology education and training as the key point, increase the proportion of information technology skills training courses and professional courses, give full play to role of information technology in the teachers ' professional skills, improve the effectiveness of professional skills. To meet students expertise learning and professional skills training of need, we focus on information professional skills training laboratory construction, strengthening information technology and teachers professional skills training courses of integration, promote quality teaching resources shared, application information technology and modern management concept construction information online teaching and management platform, for students of independent learning and independent practice service, construction online Exchange platform improve education practice effect, measures, great to improve has students of information technology level, professional skills training effectiveness is significantly. ThC 3.2 Integrating Data from Multiple Disciplines for Reservoir Microfacies Forecasting, pp. 351-353. Yin Yanshu Yangtze Univ. Feng Shu Yangtze Univ. A new method has been proposed for forecasting the distribution of the microfacies, integrating the core data, logging data, seismic data and testing data of multiple disciplines. The flowchart of this method follows the basic idea of from points (well) to surfaces (the 2-D maps) to zones (the 3-D maps). The recognition and core-log response model has first been constructed by the analysis of sedimentary environments of the region and core data; then, the microfacies of non-core wells have been identified according to the core-log response model; thirdly, the 2-D map of microfacies is forecasted by the 2-D map of sandstone thickness and the information from the analysis of seismic data. The shape parameters of microfacies have been achieved by dissecting the microfacies using the testing data. Finally, the 3-D distribution of microfacies has been reproduced by reservoir stochastic modeling methods. The 3-D microfacies distribution of the fluvial environments has been accomplished in Gangdong exploitation district of Dagang Oilfield. This high precise reservoir model can give more information to the oil engineerings, and is a basis of petrophysical properties forecasting and the reservoir numerical simulating. ThC 3.7 Scheduling Model of Access Requests in Open Storage Architectures, pp. 370-374. Xian Wu Soochow Univ. Jianxi Fan Soochow Univ. Jiwen Yang Soochow Univ. In cloud computing era, datacenter can be organized by resources distributed geographically on demand into a dynamic logical entity. All these virtualized datacenters (VDCs) migrate transparently to another resources set for the best cost-effectiveness. Open storage architecture is one of the basic infrastructures in Cloud. This paper introduces a scheduling model of access request in open storage architectures. This scheduler runs during the migration of VDCs. We discuss the environment model and scheduling criteria in detail. And then we propose the objective functions and the scheduling function Ω. In this model, all components including users, VDCs, and scheduler cooperates with each other via associative broadcast. We expect that this proposed scheduler will be used in nowadays cloud computing environment and provide the ability of multiobjective optimization scheduling in the future. ThC 3.3 Research of Spatial Index & Caching for Power GIS, pp. 354-357. Wang Xiaohui North China Electric Power Univ. Wu Kehe North China Electric Power Univ. Xu Xuerong North China Electric Power Univ. This paper researches the application status of the GIS platform in power industry, against existing problems, proposes a spatial data model of power facilities suitable for the power industry, the method of Semantic-based clustering index and the multi-level caching mechanism to speed up the response speed. And possible problems and future prospects of the development of power GIS platformin are broung forward in the article concludes. ThC 3.4 A Research of Online Exam System Based on SSH Architecture, pp. 358-360. Li Gengming Xiamen Univ. This paper describes a research of online exam system based on the SSH (Struts+Spring+Hibernate)architecture. With the goal of meeting the market’s needs of small-group tasks and high reliable, suitable and extendable applications, we try in the research to present a procedure of developing network system and give a layout of a developing team. We illustrate the whole process and key steps of system development with the real example. ThC 3.8 High-cost-performance and Simple Moving Sticks Length Measurement Device, pp. 375-379. Du Bo Changchun Inst. of Tech. Cai Changqing Changchun Inst. of Tech. High-cost-performance and simple moving sticks length measurement device uses AT89S51 as core, by means of the infrared double diodes to measure the movement of the stick, 47 using the internal timer functions of Single Chip Microcontroller calculate the moving speed of the stick. By the Single Chip Microcontroller operation, obtain a single stick length, the number and the cumulative length of the forward direction moving sticks. The device has the functions of the opposite direction moving measurement and data auto-playback, and voice broadcast and display. The device structure is simple with low price. Measurement error is less than or equal to 0.1 centimeter, which has high cost performance and a wide range of practical value. Make comparison and analysis for the stick moving speed and measurement error, and provide measurement data. C4.5 Algorithm, taking the library of Changchun Institute of Technology as an example, by structuring decision tree and mining the factors which restrain users from using the library digital resource, the author gets some potential links among the factors affacting the using of library digital resource, the needs of university library users can be analyzed effectively with this algorithm. ThC 3.13 Analysis of Properties on Cargo Constrained System of Truck Rollover Based on MATLAB/simulink, pp. 395-397. Zhao Yan Wuhan Univ. of Tech. Wang Jun Wuhan Univ. of Tech. This paper set up a system which was made of truck, cargo and constraint device. To model this system, the paper selected EQ_1156W_3 truck as the research object, and used two TD_50B as the cargo constraint device according to the mass of the cargo and the American standard. Used lateral acceleration as rollover index of vehicle-cargo-constraint system, and calculated the rollover threshold in order to evaluate the anti-rollover performance of the truck by fewer parameters, then got the relationship between the mass of cargo and rollover threshold. On the basis of analysis of rigid body vehicles, the influence of the tyre and suspension to truck rollover was considered, and the mathematical model of vehicle-cargoconstraint system was established. The analysis on cargo constrained system of truck rollover based on MATLAB/simulink was used. ThC 3.9 Research Based on Real Time Monitoring System of Digitized Agricultural Water Supply, pp. 380-383. Yunchen Liu Shandong Univ. Yu Chen Shandong Univ. Yunpeng Zhang Shandong Univ. Jun Tong Shandong Univ. Real time monitoring system of digitized agricultural water supply is a complex engineering. In this paper, the software and hardware design principal of real time monitoring and management system in water resources and the integrated characteristics of structure are introduced. The general planning of real time monitoring system in integrated system in agriculture water supply is proposed. This system, which is based on info technology and relies on computer technology, remote controlling and automatic technology, collects, transports and processes the water resource and its related info in the managed area in real time. The water resources are dispatched and distributed using scientific decisive mathematical model. The whole structure of the system can be divided into three parts: central management system, wireless communication net and enterprise subnet system. ThC 3.14 Analysis of Swinging Angle Hydraulic Detection System of Constant Velocity Universal Joints Based on MATLAB, pp. 398-401. Wang Jun Wuhan Univ. of Tech. Zhao Yan Wuhan Univ. of Tech. The life-cycle test-bed of automotive constant velocity universal joints is the major equipment that can realize assembly of automotive constant velocity universal joints, the relevant performance test of constant velocity universal joints and other components like automotive semiaxle and so on. This paper analyzed the problems of hysteresis quality and stuck caused by rapid reversal brake exist in the original swinging angular hydraulic detection system, and revised the design of swinging angular hydraulic detection system based on the technology of electro-hydraulic proportional control. Established the mathematical model of hydraulic system based on MATLAB/Simulink, simulated the dynamic properties of the system, then proved that the dynamic characteristics of the hydraulic system based on the electro-hydraulic proportional control technology has improved insignificantly. ThC 3.10 How to Regulate Computer Crime in Germany Criminal Law, pp. 384-385. Chunlin Wang Jiangsu Univ. Germany is one of the developed capitalist countries. Computers per capita rate is very high, while computer crime is also very serious in Germany. German computer crime laws are perfect as a representative of the national civil law, which involves number of crimes, protect a wide range of interests. All these have some inspiration and reference to our country. ThC 3.11 A Parameter Selection of Support Vector Machine with Genetic Algorithm for Citrus Quality Classification, pp. 386-390. Tang Guoxiang Southwest Univ. Qu Ming Southwest Univ. Wang Xuan Southwest Univ. Lv Jiake Southwest Univ. Citrus quality classification is an important and widely studied topic since it has significant role in its market price determination. Due to citrus quality indicators series nonlinearity and no-stationary, the accuracy of conventional mostly used methods including linear discriminant analysis, K-means clustering and neural network has been limited. The use of support vector machine (SVM) has been shown to be an effective technology to solve classification problem of nonlinearity and small sample. However, the practicability of SVM is effected due to the difficulty of selecting appropriate SVM parameters. This paper presents a hybrid approach of support vector machine with genetic algorithm (GA) optimization to determine SVM free parameters for developing the accuracy of classification. The approach is applied to classify citrus quality of three gorges reservoir, China. The results indicate that the approach can give a better quality comprehensive evaluation, and has a high potential to become a useful tool in agriculture. ThC 3.15 Combined Water Seam Crystallizer’s Thermal Field Analysis and Simulation , pp. 402-405. Dachao Hu Shanghai Inst. of Tech. Junling Hu Univ. of Bridgeport According to the complexity of Crystallizer’s heat-transferring in continuous casting engineering, it is very difficult to identify and analyze the Crystallizer’s temperature field. Based on classical theory, this paper’s aim is to seized the conditions which can portrait the major factor in the problem, then, to establish mathematical and physical models to explore and analysis the mold’s heat transferring phenomenon. According to the actual conditions, we can determine the relevant parameters, and give two different models element simulation analysis. The results can be used by the heat-transferring structure designer and can provide some theoretical basis and reference materials for Crystallizer’s monitoring. ThC 3.16 The Inquiry in Hospital Beds Arrangement Based on Queuing Theory, pp. 406-410. Ou Yang Guangxi Teachers Education Univ. This paper, through examples, applied RSR method to analyze one hospital beds arrangement ,then used queuing theory establishing mathematical model have the right of priority service, then worked out the sickbed distribution solutions about the shortest average stay time using linear programming. The scheme maked simulated analysis by M/M/N sorting method, then feasible, and ThC 3.12 Application of Data Mining in the Analysis of Needs of University Library Users, pp. 391-394. Tingting Zhu Changchun Inst. of Tech. Lili Zhang Changchun Inst. of Tech. In order to provide decision and guidance for the future development of libraries, based on the Data Mining Decision Tree 48 had been spread and applied in hospitals. Yingying Liu Northwest Normal Univ. Peiji Shi Northwest Normal Univ. Chunyu Liu Northwest Normal Univ. Jinghu Pan Northwest Normal Univ. Starting from the improvement of the Holistic Land Use Planning in Longnan City, Gansu Province, in this paper the objectives of land use planning are researched, and the present situation of land use in Longnan City is analyzed. An index system is developed for the environmental impact assessment according to the environmental impact identification and the present situation in Longnan City. The index system is divided into three hierarchies, i.e. the chief target hierarchy A, standard hierarchy B and indicator hierarchy C. There are 20 assessment factors in the indicator hierarchy. In the light of which, it is attempted to calculate the weights of the indexes and provide a method for the further research work of environmental impact assessment. The result shows that there is a positive effect of the Holistic Land Use Planning on the holistic ecological environment in Longnan City, which is helpful for the holistic objectives of sustainable land use and environmental protection in Longnan City. ThC 3.17 Service Delivery Using Social Network Analysis in P2P Supportive E-Learning Environment, pp. 411-415. Ye Conghuan Xiaogan Univ. Along with the education informatization thorough development there is no more difficulty to manage most of learning contents and deliver learning service to learners in elearning system. Nowadays, learners desire to receive his/her own learning services and interact with ones who have same learning interest. However, the current e-learning system couldn’t solve elearning resource sharing among learners who have the same learning interest. In this paper, we propose a learning service delivery model in P2P supportive e-learning system with social network analysis. The new framework has a growing interest in raise the utilization rate of those learning resources in university, at the same time, learners who have common learning interest could ubiquitously access the learning service delivered and interact with each other via P2P communication technology. In contrast to the existing traditional solutions for e-learning service delivery, our approach is interest-centric and can be used by the provider to quickly deliver services with decrease of delivery costs. ThC 3.22 Data Decoding of Flight Recorder Tape Based on Image Recognition, pp. 433-436. Yang Quanfa Beihang Univ. Ren Zhang Beihang Univ. Hu Shuzheng Beijing Aeronautical Tech. Research Center Wang Zheng Beijing Aeronautical Tech. Research Center Considering the difficult issues of data decoding of flight data recorders using the metal magnetic tape as recording medium which are easily damaged in the flight accident, a novel method for data decoding of magnetic tape based on image recognition is proposed. On the basis of analyzing the statistical characteristic of track images, the coordinates of tracks are identified by using the gray projection and image segmentation algorithm, and the automatic recognition and data decoding of the information on magnetic tape are realized. Application of the proposed method for the data decoding of the track images produced in several flight accident investigations, and achieved good results. ThC 3.18 A Service Computing Model Based on Interaction Among Local Campus Clouds, pp. 416-419. Ye Conghuan Xiaogan Univ. With the increasing number of computers and experimental apparatus, there is a growing interest in harnessing the unused and inexpensive computational resources, educational resources and teaching devices in universities. The quality of services of resource sharing in university should be improved in order to meet all kinds of service request of users. In this paper, we design a service computing model based on interaction among local Campus Cloud. In this model cloud service providers cloud improve the performance of service delivery and increase level of resources utilization. The service computing model could utilize the interaction among local Campus Clouds to augment the capacity of the local resources. In the end, users in universities could request any cloud service from the local Campus Cloud. ThC 3.23 Simulation and Experimental Study on Electromagnetic Field in Magnetic Particle Clutch, pp. 437-440. Shanzhen Xu Huaiyin Inst. of Tech. Cheng Wang Huaiyin Inst. of Tech. The working principle of magnetic particle clutch was deeply analyzed and an analysis model electromagnetic field of magnetic clutch was established. The finite element Method calculation of electromagnetic field in magnetic particle clutch and experimental verification was completed. Theoretical analysis anatomies with test results, which shows that simulation method and theory is reasonable and it can be used as the foundation of clutch optimization. ThC 3.19 The Forecasting of Shanghai Index Trend Based on Genetic Algorithm and Back Propagation Artificial Neural Network Algorithm, pp. 420-424. Li Yizhen Xiamen Univ. Zeng Wenhua Xiamen Univ. Lin Ling Xiamen Univ. Wu Jun Xiamen Univ. Lu Gang Xiamen Univ. This thesis presents a BP Artificial neural network prediction modeling method for forecasting the trend of Shanghai index, and then uses the genetic algorithm to optimize the BP network parameters, weight and structure. The forecasting results show that the optimization algorithm not only avoids BP algorithm into a local minimum point and the problems of slow convergence, but also overcome the GA Shortcomings such as the search time too long and search speed too slow caused by in a similar form of exhaustive search for optimal solution. In the stock market of such a complicated nonlinear stochastic system modeling, this modeling method has high application value. ThC 3.24 A Novel Method Based on Lines Clustering for Extracting Multi-ROI in Images with Simple Background, pp. 441-444. He Jun Beijing Normal Univ. Sun Bo Beijing Normal Univ. Yu Lejun Beijing Normal Univ. Since application of target recognition is mostly used in multi-object images, extracting interested objects efficiently is much necessary. Taking account of non-curve but regular-shaped objects on simple background, the authors have proposed a novel method based on lines clustering for extracting multi-ROI. Steps of the method have been demonstrated in the article. Experimental data have also given and proved the method effective and practical. ThC 3.20 Constructions on Disaster Tolerant Backup System of Management Information System, pp. 425-427. Liangping Zhang Chongqing Tech. & Business Univ. Weixing Wang Beihai Vocational College The Disaster Tolerant backup System is an important aspect of constructing management information system security. In terms of the analysis on management information system data, this paper offer principles, steps and strategies to construct the backup system. ThC 3.25 Multi-objective Optimization Design of Multi-piece Leaf Springs Based on Pareto, pp. 445-448. Wu Yonghai Huaiyin Inst. of Tech. Fan Qinman Huaiyin Inst. of Tech. In allusion to the multi-piece leaf springs of a truck, its standard multi-objective optimization model was established. Taking multidisciplinary optimization software iSIGHT as a platform, ThC 3.21 The Land Use Planning Environmental Impact Assessment in Longnan City, pp. 428-432. 49 using the non-dominated Sorting Genetic Algorithm (NSGA-II) based on Pareto optimal concepts, seek for the optimal structural design scheme for multi-piece leaf springs of the minimum total quality and minimum relative stiffness is found, and the Pareto Optimal Solution set is obtained. The analysis method in the paper can effectively solve the problems of multiparameter and multi-objective optimization for complex structures. automobile air flow in the rear and its turbulence on car aerodynamics characteristics with or without a spoiler is achieved.The simulation results are consistent with the test ones. It is proved that the numerical simulation of automobile air flow with dynamic grid in CFD software is feasible, and which provides the references for the development of automotive products with spoiler. ThC 3.26 A New Improved Algorithm Applicated in NCO Based on Specific Angle, pp. 449-451. Liu Bin Taiyuan Inst. of Tech. He Qiusheng Taiyuan Univ. of Sci. & Tech. Considered the characteristic of the angles, used in the new improved algorithm puts forward the formula of sine and cosine values which compose of the discrete- sine and cosine wave. In this algorithm, the theory of setting Renminbi notes which used to selecting the basic angle sequence and the symmetry of trigonometric function is used to calculate the sine and cosine values of the basic angle and it is expressed as 2kπ/2N. Simulation proves that the precision can reach 10^-6 under 5 iterations. Compared with other algorithms, the computational complexity of the algorithm is simple, and the precision is higher. Therefore, the algorithm is feasible for the NCO. ThC 3.30 Research of Ant Colony Algorithm and the Application of 0-1 Knapsack, pp. 464-467. Ling He Xiamen Univ. Yanyan Huang Xiamen Univ. Among the different works inspired by ant colonies, the ant colony algorithm (ACA) is probably the most successful and popular one. ACA is a novel bio-inspired optimization algorithm, which simulates the foraging behavior of ants for solving various complex combinatorial optimization problems. In this paper, a well-structured definition of basic ACA, detailed implementation process and complexity analyses of basic ACA are presented. It is also devoted to the explanation of improvement strategies of ACA in discrete space optimization and in continuous space optimization. In order to handle the 0/1 knapsack problem, it revises the model of ant algorithm and use the computer to test the modified algorithm. Finally, outlines some ongoing and most promising research trends in ACA. ThC 3.27 Modeling and Simulation of Truck with Random Vibration Response, pp. 452-455. Wu Yonghai Huaiyin Inst. of Tech. Fan Qinman Huaiyin Inst. of Tech. Taking a two-axle truck for research object, a mathematic model and FEA model of 10 degrees of freedom finished automobile are established to describe the vibration of the truck. Virtual excitation of road is constructed through the basic theory of virtual excitation method and its statistical properties of the actual response are obtained. FEM theory is used in discrete the truck vibration structure model and stiffness matrix and damping matrix of each element are assembled in accordance with the node degree of freedom. Taking forced displacement constraint handling methods, truck vibration differential equations are obtained. The research methods and results used in this paper will provide a useful reference for vibration and ride comfort design of trucks. ThC 3.31 Research on the Strategy of Power Management for Submersible Temperature Logger, pp. 468-471. Dalei Song Ocean Univ. of China Bin Liu Ocean Univ. of China Fangjie Yu Ocean Univ. of China Bing Xue Ocean Univ. of China This paper introduces the basic components of submersible temperature logger system and the relationships between the various modules. According to the principle of low power, a Single Chip Microcomputer with idle mode and stop mode is necessary. Through the analysis of the temperature measurement and the data storage, the optimal strategy for power management can be found. For the purpose of energy-saving, specific measures on hardware and software are proposed. Then the power consumption of the system can be quantified by analyzing the different working conditions of each module. ThC 3.28 Numerical Analysis on the Pressure Waves in Tunnels, pp. 456-459. Bao Haitao Huaiyin Inst. of Tech. Computational Fluid Dynamics (CFD) is used for the investigation of the pressure wave. This paper analyzes the formation of pressure wave . The simulation model of pressure wave is established based on three-dimensional, unsteady, viscous Reynolds averaged equations and the k-ε two-equation turbulence model, by using dynamic grid finite volume method, the pressure wave produced when train with different sizes and speed go through the tunnel were simulated numerically. And the simulation results were compared with similar experimental data. The results showed that the conclusion and trends of the variation is consistent with the experimental results , which verified the reliability of the numerical simulation, so it can be used to predict the fluctuation law of pressure waves when the train goes through the tunnel, studying the factors that affect the pressure to optimize the design parameters of the tunnel. ThC 3.32 Community Mining in Dynamic Social Networks—Clustering Based Improved Ant Colony Algorithm, pp. 472-476. Zhang Nan Jilin Univ. Wang Zhe Jilin Univ. Community mining has been the focus of many recent researches on dynamic social networks. In this paper, we propose a clustering based improved ant colony algorithm (CIACA) for community mining in social networks. The CIACA combines the local pheromone update rule with the global update rule and utilizes heuristic function to adjust the clustering solution dynamically, assisted by decay coefficient of dynamic network model. In order to improve clustering accuracy and convergence rate in the process of ant migration, a structure tightness between nodes based clustering centers initializing method is proposed, which can provide us initial clustering centers with certain clustering precision and high diversity. In addition, random number and specific parameter are used in the ant transition probability, which strengthens the search stochastic properties of CIACA effectively. The proposed CIACA is tested on some benchmark social networks, and is compared with current representative algorithms in community mining. Experimental results show the feasibility and validity of CIACA. ThC 3.29 Study the Effect of Rear Spoiler on Car Aerodynamics Characteristics, pp. 460-463. Bao Haitao Huaiyin Inst. of Tech. Taking CFD software as the platform and the car as the research object, the air,s resistance coefficients and speed are solved by using RNG equations and dynamic mesh method. The finite volume method is used to discrete the governing equations, the second-order up wind difference scheme is adopted for the convection term and the centric difference scheme for the dissipation term. The discretion of time is carried out by a full-implicit time integral scheme. PISO algorithm is adopted to the transient numerical simulation. The influence law of ThC 3.33 Cluster, Grid and Cloud Computing: A Detailed Comparison, pp. 477-482. Naidila Sadashiv Acharya Inst. of Tech. S.M Dilip Kumar Univ. Visvesvaraya College of Engineering Cloud computing is rapidly growing as an alternative to conventional computing. However, it is based on models like cluster computing, distributed computing, utility computing and 50 grid computing in general. This paper presents an end-to-end comparison between Cluster Computing, Grid Computing and Cloud Computing, along with the challenges they face. This could help in better understanding these models and to know how they differ from its related concepts, all in one go. It also discusses the ongoing projects and different applications that use these computing models as a platform for execution. An insight into some of the tools which can be used in the three computing models to design and develop applications is given. This could help in bringing out the innovative ideas in the field and can be explored to the needs in the computing world. To this end, we first compare different virtualization techniques and analyze their performance and limitations in terms of reliability, applicability, flexibility and cost. Then we design a suitable virtualization scheme and develop a virtualized management system by virtualizing the physical servers within the environment. In this paper, the detailed design of the virtualized management system is presented, and some salient features of this system are carefully analyzed. ThC 3.38 Health Care Fraud Detection Using Nonnegative Matrix Factorization, pp. 499-503. Shunzhi Zhu Xiamen Univ. of Tech. Yan Wang Xiamen Univ. of Tech. Yun Wu Xiamen Univ. of Tech. In a practical health care dataset, there are many patients with different prescriptions. A methodology for automatically identifying and clustering patients with similar symptoms is needed for health care management department to judge whether there are frauds in a large-scale clinic dataset. In this paper, we encode the clinic data with a low rank nonnegative matrix factorization algorithm to retain natural data non-negativity, thereby eliminating the need to use subtractive basis vector and encoding calculations presented in other techniques such as principal component analysis for similar feature abstraction. Result evaluations of the proposed method are conducted on a practical dataset supplied by Health Insurance Management Center of Xiamen. In our experiments, we have shown that this method is useful for health care fraud detection. ThC 3.34 Design and Optimization of Drip Irrigation Emitters Using Directly of Sewage, pp. 483-488. Jiang Fan Guangzhou Univ. Huang Chunman Guangdong Baiyun Univ. Xiang Jianghua Guangzhou Univ. Wang Yijun Guangzhou Univ. Based on the analysis the clogging mechanism of existing emitter, pre-impact energy dissipation, pre-precipitation, maze energy dissipation are used to overcome clogging of emitters, a new emitters is designed by use of computer aided design technology and is optimization analyzed by use of computer aided engineering technology, reasonable structure and flow parameters are obtained to provide the reference data for the design of anti-clogging emitter. ThC 3.35 Design of the USB Download Interface Based on Embedded POS, pp. 489-491. Zhu Zhengwei Changzhou Univ. Gu Hao Changzhou Univ. The embedded POS machine was widely applied by people for its advantages like low power consumption, compact construction and easy to maintenance. The internal date of previous POS machine was generally transmission through the network to the PC storage. This paper puts forward a kind of method that take LPC1766 as the micro-controller to build a USB download interface circuit. Through loading firmware procedures, drivers and applications, when in the conditions that network was interrupted or breakdown, users could download the data of POS machine to the external storage through this interface for preservation and management. ThC 4 Computer Architecture ThC 4.1 Voice for the Voiceless, pp. 504-507. K.Rajeswari Sri Sai Ram Engineering College E.Jeevitha Sri Sai Ram Engineering College MR.Meenakshi Sri Sai Ram Engineering College V.K.G. Kalaiselvi Sri Sai Ram Engineering College Speech and spoken words have always played a big role in the individual and collective lives of the people.Autistic is a possible term for a person who can not speak or communicate. Autism is when the person finds it hard to communicate and express themselves. ‘Voice For The Voice less’ is a technology which aims to track every movement of the lips and transform them into voice , which could help communicationally challenged people to speak, and allows them to communicate as the normal human being. This technology makes use of six AG-500 Articulograph sensors which is fixed over the lips of the user. When the user moves his tongue to speak, the distance between the various reference points assigned on the mouth is calculated using those six sensors and feeds it to the software part of the device. The distance is mapped with its equivalent SAMPA code. The SAMPA code is fed as input to a voice generating software which produces the final voice of the ‘communicationally challenged’ person. This technology helps the dumb persons in overcoming their disability. ThC 3.36 Practice and Application of Multisim in Digital Electronic Experiment Teaching, pp. 492-494. Yan Guohong Zhejiang Sci-Tech Univ. Zhang Shuiying Zhejiang Sci-Tech Univ. Du Jingjing Zhejiang Sci-Tech Univ. This paper introduces the functions and characteristics of Multisim software, and describes the new methods of using the software in digital circuit experiment teaching. Examples about the experiment using Multisim are given in detail from three aspects which are the basic experiment, the advanced experiment and the integrated experiment.It believes that using Multisim in experiment teaching makes effective complementarities to the traditional experiment.This new method plays an important role in improving experiment teaching effection, exploding student's interest and cultivating innovative ability . ThC 4.2 Research for Rotor Monitoring System Based on Virtual Instrument Technology, pp. 508-511. Huang Zhigao Wuhan Railway Vocational College of Tech. Xu Mingbao The Maintenance Section of North Xiangfan Zhou Xiaojun The Maintenance Section of Jianan This paper designs the rotor monitoring system based on LabVIEW using virtual instrument technology with taking multi-function rotor test-bed as monitoring object. The monitoring system accomplishes the multi-channel data acquisition of the rotor using sensors, which includes motor speed, vibration and noise data. The results show that the monitoring system realizes lots of functions, such as data acquisition, signal analysis and processing, measurement result display, data storage, auto-alarm. It provides the basis research for the on-line monitoring system of large revolving machines. ThC 3.37 Virtualization in Railway Datacenter Management Environment, pp. 495-498. Wei Wang Beijing Jiaotong Univ. Yu Zhao Beijing Jiaotong Univ. Virtualization is a common technology for improving the utilization of existing physical computing resources, which provides great opportunity for industry growth and research due to its high flexibility and simplification. While various software products are available for providing the infrastructure of virtualization, the deploy for a specific industry area is still challenging. We attempt to apply virtualization technique to the railway datacenter environment so as to simplify the system configuration and improve the utilization of computing resources. ThC 4.3 A Hybird Hierarchical Architecture for 3D Multi-Cluster NoC, pp. 512-516. 51 Wang Jiawen Nanjing Univ. Li Li Nanjing Univ. Zhang Yuang Nanjing Univ. Pan Hongbing Nanjing Univ. He Shuzhuan Nanjing Univ. Zhang Rong Nanjing Univ. The pursuit of higher performance has driven the bus based architecture toward network-on-chip (NoC). Meanwhile the three dimensional (3D) IC technology was suggested as a promising approach to reduce the wire length since the chip size became larger and larger. Because of the trend of hundreds or even thousands of processor cores integrated on one chip, it trigged a quest for the amalgamation of these two technologies above. As a result, 3D NoC emerged as a potent solution. In this paper, a hybrid hierarchical architecture for 3D multi-cluster NoC is proposed with the goal of optimizing the whole system performance. Each cluster is built based on hierarchical buses while global connections among clusters are formed with mesh topologies. The memory system is also divided into several layers and managed hierarchically. Both architectures and memory systems are discussed in detail and an analytical comparison of the average distance decreasing in the proposed architecture versus a standard NoC is presented. Experimental results indicate that the proposed architecture can improve the performance sharply. For writing operations, it can save 54.7% execution time in the best condition. While for reading operations, this value can reach 63.6%. And in a real communication-intensive application, 42.7% time savings have been observed compared to the conventional NoC. feature extraction of mobile targets. On the basis of that above, a mobile RFID localization algorithm based on instantaneous frequency estimation is presented. By mining the function relationship among Doppler frequency shift, speed and position of reader, the evaluation of position and speed of mobile target has been solved. The experiment results show that the location algorithm is able to meet the requirement of low complexity, less computation and real-time processing features required by mobile RFID systems. ThC 4.7 Flash Aging Prevention Technique (FAP) for Flash Based Solid State Disks, pp. 531-536. Anam Zaman National Univ. of Sci. & Tech., Pakistan Sumayya Shiraz National Univ. of Sci. & Tech., Pakistan Saba Zia National Univ. of Sci. & Tech., Pakistan Abdullah Mansoor National Univ. of Sci. & Tech., Pakistan Farooq Ahmed National Univ. of Sci. & Tech., Pakistan Solid State Disks (SSDs) are replacing hard disks due to enhancement in speed and reduction in size, power and cost. It is an obvious choice for many applications including personal computers, embedded systems, medical and healthcare devices etc. However, a lot of enhancement and research is required in order to make it reliable. SSD uses Flash technology which is a fast, efficient nonvolatile storage chip and offers costeffective solution for SSDs. However, the feature of erase before write leads flash towards wearing out therefore affecting the life of flash. Many wearleveling policies were proposed in past to extend SSD life time by ensuring even wearleveling of the blocks in a flash memory. Several algorithms have been proposed to improve wearleveling of SSD including Hot-Cold Swapping, Dual pool Algorithm (DP), Kim and Lee algorithm (KL), Block aging prevention technique (BAP) and Cost Age and Times Algorithm (CAT) but these policies were for single flash memory. This paper disuses a multiple flash wear leveling policy known as flash aging prevention technique for flash memory array(FMA). This policy reduces the variance in erasure count of multiple flash memories by 24 % compared to DP, CAT and BAP. ThC 4.4 Implementation Scheme for Capacitive Touch Sliding, pp. 517-520. Bo Jiang Wuhan Polytechnic Univ. Long Zhou Wuhan Polytechnic Univ. The capacitive touch sensor measure the value changes of capacitance. The changes were sent to MCU after they were sensed by the analog hardware. Add periodic charging voltage to RC network. The terminal voltage of capacitance in the RC network will fall off in the settled charging time because of the change of permittivity in the network caused by finger touching activity. We can judge whether the finger touch the sensor by measure the change of the terminal voltage value of capacitance in the RC network. We can apply this theory to judge whether the finger touch the slider to change the volume of the sound box. ThC 4.8 Room Temperature and Humidity Monitoring and Energy-saving System, pp. 537-540. Xianzhe Hua Guizhou Univ. Using microcontroller C8051F020 as the core, based on fuzzy control theory, this paper proposes a set of accurate and efficient, energy-saving solutions to control the internal temperature and humidity of the engine room. By acquiring the parameters of the inside and outside temperature and humidity sensors and using fuzzy control algorithm to analyze them, we can get series of appropriate control signals to control air conditioning and fan working, and ensure machines’ normal working environment. This system can greatly reduce energy consumption and ensure real-time monitoring of the room, having high commercial value and research significance. ThC 4.5 Performance Comparison of Single Board Computer: A Case Study of Kernel on ARM Architecture, pp. 521-524. Naufal Alee Univ. Malaysia Perlis Mostafijur Rahman Univ. Malaysia Perlis R. B Ahmad Univ. Malaysia Perlis Due to increase computer hardware technologies, software developer are more focusing on to developing embedded operating system. GNU/Linux becomes a common operating system widely of embedded technologies. In this paper, we report performance results on a TS-7800 Single Board Computer with different version of kernel that has been released by hardware provider. We compare the performance between operating system with the latest kernel given by hardware provider, Linux kernel (2.6.34), and the previous kernel (2.6.21) Our results indicate that the new kernel has better performance in kernel benchmark, more bandwidth and less latency. In other experiments we found that the results are almost the same and in some cases the kernel (2.6.21) has better performance than the kernel (2.6.34). ThC 4.9 Optical Burst Switching for Many-Core Processor-to-Memory Photonic Networks, pp. 541-546. Quanyou Feng National Univ. of Defense & Tech. Dongsong Ban National Univ. of Defense & Tech. Huanzhong Li National Univ. of Defense & Tech. Wenhua Dou National Univ. of Defense & Tech. Existing electrical DRAM technologies are not expected to supply sufficient bandwidth for many-core architecture as hundreds of cores are integrated on a single chip in the near future. The discrepancy of many-core processor-to-memory bandwidth will continue to enlarge. In this paper, we introduced optical burst switching to meet the many-core bandwidth challenge. Our optical technology is enabled by the prosperity of silicon photonic devices. Optical burst switching is a natural paradigm for bursty traffic which is common found in on-chip slef-similar flows. Memory access overhead is amortized by big burst length. Results of performance simulation and analysis reveal its outstanding advantages over electronic I/O signaling in terms of throughput, latency and energy consumption. ThC 4.6 A Mobile RFID Localization Algorithm Based on Instantaneous Frequency Estimation, pp. 525-530. Jiexiao Yu Tianjin Univ. Kaihua Liu Tianjin Univ. Peng Luo Tianjin Univ. In recent years, the application demand for mobile location techniques have kept rising and the potential market is enormous. In this paper, analysis on the characteristic of receiving signal of mobile reader and time-frequency change caused by relative movement between reader and tags are performed. Then, the Doppler shift estimation method is introduced in RFID system for ThC 4.10 52 A Research on Storage Performance Optimization of Virtual Machine, pp. 547-551. Dongsheng Yin Sun Yat-sen Univ. Jianan Liang Sun Yat-sen Univ. Nowadays, virtualization technology, which is one of the key technology of cloud computing, is facing new challenges and development opportunities with the rise of cloud computing. As a typical application of virtualization, virtual machine can play the role of the segmentation and reintegration of underlying physical resources, improving the utilization of server hardware resources and reducing energy consumption. However, the virtual machine system using the traditional storage scheme leads to poor virtual machine storage performance. It needs to pay more attention to the poor virtual machine storage performance and optimize the storage performance of it. In this paper, a deep research of how traditional storage scheme leads to poor virtual machine storage performance is done by an experiment, then a series of optimizing solution based on SSD (Solid State Drive) and RAID technology is proposed with related test. Engineering R & D Center for Modern Info. Tech. Application in Enterprise Zhao Hongyi Xi'an Univ. of Tech. In this paper, firstly ,the network engineering(NE) training goal are determined based on engineering capability, it is constructed that the professional competence curriculum system based on the “3DCC”. Then, the practices system of network systems engineering based on the engineering capabilities are implemented. Lastly, the “4331” innovative practice teaching platform are constructed, and the basic idea and pattern for cultivating Vocational NE‘s skilled professionals are probed into. ThC 5.4 The Research of College Computer Courses Teaching Quality Improvement, pp. 572-576. Qing Ye Jiangxi Univ. of Traditional Chinese Medicine Minghai Jiao Northeastern Univ. This paper researches into Quality Function Deployment (QFD) method based on fuzzy evaluation of teaching quality. The student's demand for computer courses is transferred into the importance weights of teaching element, combined with evaluation of teaching, including teacher self-evaluation, peer evaluation, peer assessment and supervision for computer integrated assessment of teaching quality. An effective quality method is proposed to determine the weight of evaluation elements of teaching process in the paper. The comprehensive score of the teaching elements is determined according to the fuzzy evaluation method, which is used for the assessment of teaching quality management. The course of computer hardware technology is cited as a case for analyzing the weak link in teaching content and improving the teaching quality of computer courses. ThC 4.11 The System MP3 on the Basis f SD Card Applied to the Elevator Multimedia, pp. 552-556. Zheng Xiaoyi Xiamen Univ. Li Suxun Xiamen Univ. Zhang Ning Xiamen Univ. Yan Lingjie Xiamen Univ. This paper taking development of the system of the elevator music play and VONIC as the background, introduced the system MP3 which is based on ATmega8, FAT32 file system of SD card, and decoding of VS1003b. With a small cost perfect realization of elevator music voice stops and multimedia playback function. ThC 5.5 Core Basic Course Group Construction in Computer Major, pp. 577-579. Wang Zhixiao China Univ. of Mining & Tech. Meng Fanrong China Univ. of Mining & Tech. In order to change talent training situation in computer major, and to meet the talent training goal, i.e. solid foundation, broad knowledge, strong ability and high quality, a core basic course group of computer major was established. The course group includes advanced language programming, database principle, operation system and related integrative practice as well. We carried out comprehensive teaching reform within the course group. After teaching reform, we established three platforms for talent training: knowledge learning, engineering practice, and research innovation. Also, a perfect talent training system gradually formed which contains four levels: design-oriented, application-oriented, integration-oriented, and innovation-oriented. ThC 5 Computer Education ThC 5.1 The Study of Higher Education of the Disabled from the Perspective of Human Capital Theory, pp. 557-561. Xiaoyan Liu Tianjin Univ. of Tech. Han Tan Tianjin Univ. of Tech. Chengyin Zhang Tianjin Univ. of Tech. Xiaoqian Guo Tianjin Univ. of Tech. The present-day theorists study higher education of the disabled particularly from the perspective of social welfare and social justice. It is a new subject to carry out the study from the perspective of human capital theory. The disabled who accept higher education is an important part of the human resources, and they can create more social value to society far beyond the investment to them. That education policy-makers and society think about higher education of the disabled from the perspective of human capital has an important theoretical and practical significance. ThC 5.6 Analysis of Computer Teaching Reform from the Perspective of Learning Psychology at Univeristy of Chinese Medicine, pp. 580-583. Xiuju Zhan Guangzhou Univ. of Chinese Medicine Xiufeng Liu Guangzhou Univ. of Chinese Medicine This paper studies the computer teaching reform at Guangzhou University of Chinese medicine and proposes the perspective of the reforming influenced by the learning psychology at the new information ear.In addition,some typical adverse attitudes of student's computer learning are also investgatigated and analyazed.Several recommendations given to encourage the teaching reform in the computer science. ThC 5.2 China-U.S. Educational Exchange in the History, pp. 562-567. Yanxiang He Wuhan Univ. Ye Tian Wuhan Univ. Jie Deng State Univ. of New York at Binghamton As the educational exchange between the China and U.S. has become more extensive, examining the history of this educational exchange may provide us a better understanding of where we are today and what we might do to make the exchange more mutually beneficial. The author divides the exchange into three periods: the 19th century, the first half of the 20th century, and the second half of the 20th century. Also examined are several challenges that the China-U.S. educational exchange is facing now. In the conclusion part, the author points out several aspects of the exchange that might be improved. ThC 5.7 Research on Web-based Teaching and Learning Self-directed Platform, pp. 584-587. Ping Yan Shenyang Aerospace Univ. Minghai Jiao Northeastern Univ. This paper researches into web-based teaching and learning self-directed platform. It can be described as three aspects: strategy analysis, infrastructural framework, and design method and visualization technology. Firstly, the three kinds of strategy relationship among different elements of web-based teaching and learning self-directed platform is discussed for strategy analysis, ThC 5.3 Teaching Pattern of Network Engineering Specialty Based on Capability, pp. 568-571. Liu Wenzhi Jiangsu Province Support Software Engineering R & D Center for Modern Info. Tech. Application in Enterprise Liu Zhaobin Jiangsu Province Support Software 53 secondly, the infrastructural framework of curriculum internet platform is provided according to the strategy model, thirdly, the design visualization model of web-based platform is presented for improving learning navigation. The curriculum platform of supply chain management is cited as a case study for introducing the platform website details of fifteen convenient functions. Finally, the feature and evaluation of teaching and learning self-directed platform are empirically given for the reference of application in the paper. The Computer Basic Education for Postgraduates in Colleges under Network Teaching Auxiliary Platform Reform and Exploration, pp. 602-604. Boqin Liu Southwest Univ. Junmei He Southwest Univ. This article describes under Network teaching auxiliary platform, The computer basic education for postgraduates in colleges reform and exploration, Since 2007, our school developed under different professional needs of the teaching aim and content, and in the ongoing process of teaching of teaching methods, teaching means of the reform exploration, and achieved some success. Put forward case teaching and practice of task-driving teaching combining new teaching model, and be applied in the actual teaching, to improve the quality of teaching and teaching effect. ThC 5.8 Analysis of Knowledge Based Graphical Password Authentication, pp. 588-591. Gaurav Agarwal Invertis Univ. Saurabh Singh Invertis Univ. Ajay Indian Invertis Univ. Security itself has unique usability challenges because the requirements of security often standard human-computer-interaction approaches cannot be directly applied. An important usability goal for authentication systems is to support users in selecting better passwords, thus increasing security by expanding the effective password space. We examine the security of knowledge based graphical passwords and their techniques. In our analysis we present the results of an initial users study which present the statically analysis of knowledge technique. ThC 5.13 Research and Practice on Teaching Computer Science Undergraduates Based on Educational Games, pp. 605-608. Feng Yang Heilongjiang Univ. Guangtian Zhou Heilongjiang Univ. With the development of computer technology and network invasively and continuously, computer has already become a part of our life. Computer could supply new teaching mode combined education with game. Now college should be education between oriented-student and oriented-society which cannot stick into textbook, but can blend theory and practice. Therefore, animate and visualized education mode is a necessary path to motive students seeking knowledge continuously. This paper focuses on computer science curriculum to discuss how to combine course content with educational games. It suggests a novel heuristic teaching mode of education with games melted into course to train student search much more knowledge. And it describes the basic theory, characteristics and process by showing a case named GameAI course. Thus it would be an example to guide other courses to change teaching mode. ThC 5.9 Network Course Design for Secondary Vocational Education, pp. 592-594. Huang Xingyun Wuhan Univ. of Tech. Guangxi Mech.& Elec. Industry School Ou Qizhong Guangxi Teachers Education Univ. This paper describes the design of network course for secondary vocational education on the aspects of the general design concept, basic structure, modules design and technology application, to explore the efficient use of the various teaching resources based on websites, the implementation of the network learning, and promote the comprehensive quality-oriented education in secondary vocational school. ThC 5.14 Surveying and Analyzing Graduate Students' Studying Satisfaction Degree, pp. 609-613. Qiaoyun Chen Nanjing Normal Univ. Yi Li Nanjing Normal Univ. With the large enrollment of postgraduate students, many questions related with the students’ education has appeared. This research takes X university as a case for the graduate satisfaction survey. During the case study, we detect that graduate students have low satisfaction in “tutor system”, “curriculum system”, “teaching situation” and “academic environment”. Therefore, we propose that instruction of postgraduate students should in accordance with the rules and characteristics of them while expanding the enrollment scale. ThC 5.10 Exploration of Education Reform Based on 32-bit Assembly Language Programming, pp. 595-599. Lin Shan Hubei Univ. of Tech. Assembly language programming is a fundamental and required course for students majoring in computer science. The teaching content and practice training based on 16-bit have seriously fallen behind the current computer technology. This paper makes an intensive research on the classroom teaching, practice teaching and teaching methods of assembly language programming. Moreover, it proposes an effective reform scheme based on 32-bit assembly language including the improvement of course content, the incremental of comprehensive experiment, and the development of curriculum group. Experimental results reveal that the education reform can bring a positive effect on enhancing students' learning interests, improving teaching quality, training student's research ability, and augmenting teachers’ professional qualities. ThC 5.15 Analysis on the Difference between Public Education and Social Security in Regulating Income Distribution, pp. 614-618. Zeng Yi Wuhan Univ. This paper has adopted an OLG Model to study the regulatory mechanism of public education and social security on income distribution. According to the research, public education can effectively narrow the gap in educational investment among families, and thereby reduce income disparity. Social security can bring down income disparity by reducing the labor supply and increasing effective family instructional time of low-income families. According to numerical simulation, at the same expenditure level, the capability of public education in regulating income disparity is much stronger than social security. When budget scale is relatively small, the priority shall be given to public education expenditure to reduce income disparity; when the budget scale is relatively large, the balance shall be established between expenditure on public education and social security. ThC 5.11 Exploration of Ternary Training Mode on Continuing Education, pp. 600-601. Liu Baobin Jiangsu Economic & Trade Tech. Inst. Zhou Wei Zhejiang Univ. In today's society, science and technology develop rapidly. Technology professionals need to constantly improve their knowledge and skills structure. It is imperative to explore the new mode of continuing education, and the purpose of continuing education reform is to implement theory and practice integration and develop technology professionals’ innovation. At present, the ternary system that is put into practice in our institute of continuing education includes theory study, practicein-school and comprehensiveness. Feasibility of ternary system has been proved by theory and practice. ThC 5.16 Research and Implement of the Virtual Laboratory of Power Electronics Based on LabVIEW, pp. 619-622. Qiong Cheng Hubei Univ. of Tech. Bo Fu Hubei Univ. of Tech. Now using virtual laboratories in experimental teaching in higher school has become a tendency. Combined with the teaching ThC 5.12 54 practice of higher school, we use LabVIEW software of NI Company with MATLAB to construct the virtual laboratory of power electronics. For the current situation of virtual laboratory, we described in detail the construction process and method of the virtual laboratory of power electronics, and further stated that the virtual laboratory of power electronics will become an important way and method to future experiment teaching. Maria Banari Mazandaran Univ. of Sci. & Tech. Narges Yousefnezhad Mazandaran Univ. of Sci. & Tech. The current undergraduate software engineering curriculum in Iran was approved by MSRT in October 1998. However, software industry faces the fastest growth rate among science and technology areas. Considering that, this article aims at revising this curriculum from the viewpoint of users of its output, the managers of software industry. To achieve this goal, the courses of MSRT's and high-ranked universities' curricula plus nontechnical skills and potential future needed knowledge, collected from literature, were presented to the software managers, and they were asked to choose it as essential or elective course, or remove it from the curriculum. At the end, a list of essential and elective courses was presented, and it was compared with the literature. ThC 5.17 Research on Multi-purpose Training-based Curriculum System of Computer Concept, pp. 623-626. Wei Yuanyuan Wuhan Textile Univ. Wei Min Wuhan Univ. of Tech. This paper mainly analyzes the current situation of computer concept teaching, and proposes a multi-purpose training system for the diversified personnel training structure. In addition, the issues of construction of curriculum system of computer concept and the problems that are encountered during multi-purpose training for computer concept are tried to solve. Based on practical experiences of student teaching in Wuhan Textile University, a detailed graded-teaching and categorized-teaching method and related teaching mode are presented, and the potential difficulties or troubles that may be encountered in teaching are considered. Finally, the possible detailed solutions are given, which may provide certain references for similar teaching in relative universities. ThC 5.22 Kill Two Birds with One Stone: Boosting Graduate Students’ Abilities in Simulation by Realization Dynamic Demonstration Experiments, pp. 645-648. Wang Rui Beihang Univ. Liu Yuming Beihang Univ. Zhao Yan Beihang Univ. The question of how to promote the graduate student’s simulation ability and achieve the purposes of visualizing the principles in signal processing course is addressed in this paper; In pursuit of this objective the design and realization for several virtual instrument modules based on the platform LabWindows/CVI with graph user interfaces (GUI) which provides users the functions of flexible data acquisition, signal analysis and processing, signal output and display on the windows platform are presented. The project of the simulation not only realizes the idea ’The software is the instrument’ which achieves the Dynamic Demonstrating Experiment Teaching in the classroom, but also as a context of tacit knowledge utilization make the acquisition and sharing practical know-how take place between project team members. It is really to kill two birds with one stone. ThC 5.18 Study on the Coordinated Development between Higher Vocational & Technical Education, pp. 627-630. Wang Yudong Jiangmen Polytechnic Chen Yao Jiangmen Polytechnic T Vocational education is viewed as the foundation of industrialization and modern manufacturing development, thus higher vocational education plays a key role in improving advanced manufacturing and industrialization levels. As a combination ofindustry and education, vocational education originates from the need of industrial development, and functions in industrial progress in return. The two are intertwined by employment, manifested in the alternative and spiral development led mainly by industry. Trade and industrial development serveas the guide, basis and ground of higher vocational education construction and reformation. As a consequencethe variety of industrial development determines a diverse subject design of higher vocational education. meanwhile, the mature development of the industry extends the space for subject construction in higher vocarional education. An interactive system involving government, school and enterprise is the guarantee for coordinated development between higher vocational education and industry. ThC 5.23 Ideas Transforming in the Public Arts Education of Virtual Museum, pp. 649-653. Jiang Zhaojun Nanjing Univ. of Aeronautics & Astronautics Wu Zhibin Nanjing Univ. of Aeronautics & Astronautics The purpose of this study is to investigate how virtual museum efficiently utilize virtual platform to carry out public arts education. In order to give a full understanding of the issue of public arts education of virtual museum, three concepts need to be changed. The first concept is tansforming the purpose of public arts education for Virtual Museum: from training the masses’ artistic accomplishment to developing the masses’ creativity. Through comparing the difference between Westen and Chinese arts education concepts, it is found that in the context of post-industrial society, the domestic public arts education function should be turned. The second concept is tansforming the construction idea of public arts education for virtual museum: from focusing on virtual reality technology to creating virtual reality products. The problem of Chinese virtual museum is too much emphasis on virtual reality technology. I believe that virtual museum should utilize virtual reality technology to design logic architecture and navigation system. On this basis, taking advantage of virtual network platform to exhibit the richer information of collection, simutaneously designing the display mode of collection and exhibiton, virtual museum finally will show virtual reality products with good human-computer interaction. The third concept is tansforming the communication idea of public arts education for virtual museum: from emphasizing knowledge communication to establishing the experiential dissemination field. It firstly needs try to choose widly concerned and influential collection, secondly needs to construct open dissemination field which integrates the family, school, community and virtual museum. In summary, it is urgent to tansform the concept of public arts education for virtual museum. ThC 5.19 A Practical Teaching Approach to Management Information System Course, pp. 631-633. Haihe Shi Jiangxi Normal Univ. Management Information System (MIS) is a core course of business administration major. However it is hard for students to grasp and practice in real life. The existing problems of current teaching are analyzed in the paper, and a practical teaching approach is proposed to address the existing problems. The approach emphasizes active rational participation of all students and laying equal stress on the perceptual knowledge and rational knowledge. ThC 5.20 The Thinking of Computer Language Courses in China, pp. 634-637. Yu He Beijing Tech. & Business Univ. Computer Language Courses are one kind of computer course that is very important to foster Chinese computer talents. The paper discusses author’s some puzzle and thinking about courses offered, teaching and contents of textbooks in China. ThC 5.24 Research on Talent-training Mode of Modern Computer Hardware Design, pp. 654-656. Wei Yuanyuan Wuhan Textile Univ. Wei Min Wuhan Univ. of Tech. ThC 5.21 An Investigation of Undergraduate Software Engineering Curriculum: Iranian Universities Case Study, pp. 638-644. Amin Khodabandeh Amiri Mazandaran Univ. of Sci. & Tech. 55 This paper is mainly concerned with talent-training mode, method, together with the harmonization and combination of related curriculum teaching in modern computer hardware design. It is found that the innovations of teaching contents, teaching materials, experiment-based innovative curriculum are strongly required in practical teaching. Of course, the contents and forms of the teaching contents should be timely updated and diversely distributed to meet social need. Based on the innovation base of School of Computer Science and Technology, Wuhan Textile University, the talents are trained independently, which is implemented through practical projects, self-learning cultivation, innovative spirits and innovation ability to meet the needs of computer hardware design. video cases, and explores how to apply video cases into classroom teaching. ThC 5.29 The Research of Teaching Methodology on Operating System Process Control, pp. 671-674. Zhengde Zhao Shanghai Univ. Genchang Zhao Shanghai Univ. Process control is the important and difficult part of CPU management education in operating system. In this paper, we discuss a teaching methodology which is based on “theory and practice, basic and promotion” according to the characteristics of the teaching contents. The teaching contents can be transformed from abstraction and simplicity into concreteness and integration by this methodology. The practice proves this methodology is effective. ThC 5.25 Construction of Curriculum System on Webpage Design and Website Development in Higher Vocational Colleges, pp. 657-659. Guan Xiaohui Zhejiang Water Conservancy & Hydropower College Zhou Zhimin Zhejiang Water Conservancy & Hydropower College With the numerous applications based on web technique widely distributed over Internet, the current demands for webpage designer and website developer are increasing dramatically. In this paper we firstly discuss about the requirement of skills and knowledge needed by webpage designer and website developer. The construction of curriculum system is depicted in detail by several dimensions which include teaching content, teaching methods and evaluation methods basing on authors’ teaching practice and experience. The curriculum system is now being applied to current teaching process, and some perfect effects are achieved. ThC 5.30 Perspective: Employment Conditions for Computer Engineering Related College Graduates in China, pp. 675-680. Ken Chen Ningbo Univ. Qingnian Huang Ningbo Univ. Ming Hu Ningbo Univ. Robert M. Randoy O'Hare International Airport Engineering majored college graduates in China have been facing more and more challenges and competitions in the employment markets since the national higher education enrollment expansion was put in practice a decade ago. Generally, there are three factors contributing to today’s status in quo: ten year college enrollment expansion, degrading quality of college recruits, and staggering teaching quality of college faculties. In this paper, for engineering specialized college graduates, the overall employment concerns are addressed and status in quo is analyzed, and two case-studies are conducted investigating the employment conditions for the information engineering majored college graduates based on the first-hand dataset pooled from the author’s college. In the end, some suggestions are proposed for the undergraduates’ employmentoriented solutions. ThC 5.26 Practical Notes on Teaching Computer Basics in English to International College Students in China, pp. 660-664. Ken Chen Ningbo Univ. Rong Jiang Ningbo Univ. Qingnian Huang Ningbo Univ. Robert M. Randoy O'Hare International Airport With fast pace taken towards globalization in higher education in China, recent years have witnessed the steadily growing number of foreign students coming to China pursuing for their advanced academic degrees. Based on the firsthand teaching and administering experience, the authors deliver this paper aiming at sharing some points in teaching basic computer course including curriculum design and teaching methods, etc., and recognizing the characteristics of foreign students distinctive from that of their Chinese peers. It is expected that this work may render some practical notes for course construction of international students and facilitating the process of China’s ongoing higher education internationalization. ThC 5.31 ICT Education in Rual Areas of Southwest China: A Case Study of Zhongxian County, Chongqing, pp. 681-685. Lv Jiake Southwest Univ. Information and technologies are believed to be able to promote China’s rural education and bridge the digital divides between rural and urban areas. Although they have been utilized into china education for more than decade, However, little attention is given to examine the development situation of ICT education of southwest China rural areas where is one of the poorest parts in this nation. Taking the Zhongxian County of Chongqing as a case, this paper illustrates the current development of ICT education in rural area of southwest China and examines the major problems that rural ICT education is facing. After detailed discussion, this paper proposes optimal strategies for rural ICT development and holds that only the combination of equipments, instruction contents, teachers training and funds can provide a steady and sustainable solution for southwest China rural ICT education. ThC 5.27 Design and Exploration of the English Website of the Course Analog Electronic Technology, pp. 665-667. Liang Likai Shandong Univ. Zheng Yamin Shandong Univ. Tong Qiang Shandong Univ. This paper firstly indicates the designing aim and process of the English Internet Course of Analog Electronic Technology, based on which the author sets forth detailed the information of homepage, cyber education, experimental teaching, self-testing exercises and the distinguishing design of message board. The Web design has well navigating, communicating and independent property. ThC 5.32 Wiki-based Collaborative Learning For Colleges Specialty English Writing Education, pp. 686-690. Tang Guoxiang Southwest Univ. Xie Deti Southwest Univ. Wang Xuan Southwest Univ. Specialty English writing education, which aims to help students to train and develop students literacies and skills required for successful communication in English academic and professional contexts, is very important in china university students’ academic studies. As witnessed by the popularity of sociocultural and constructivist approaches in language teaching, collaboration can play a vital role in helping learners to build knowledge and acquire skills. Over past decades although a lot of advanced technologies and learning platforms have been introduced to this field, most of them however just focused on interactive, personalized instruction effectiveness and little attention has been given to examine how collaborative writing can be offered, coordinated and assessed. As one of the most popular web2.0 ThC 5.28 Research on the Application of Video Cases in Computer Education of College Students, pp. 668-670. Hanrong Chen Southwest Univ. Tangtang Xie Southwest Univ. The cultivation of computer capability plays a very important role in computer education of college students. The video case based instruction can promote the reformation of college students’ computer skill training. This paper mainly introduces the advantages of video case based instruction used in computer education of college students, illustrates the design methods of 56 technologies, wiki is believed to have large potential for fostering collaborative group work and creating learning resources. In this study, a Wiki-based collaborative writing environment for one college specialty English course entitled “E-Commerce Specialty English” was present and practiced. Three important learning strategies including collaboration and knowledge sharing, peer assessment and learning process monitoring were adopted to assist the development of a collaborative writing community. Evaluation results showed that Wiki-based collaborative writing can effectively contribute to students writing participants, facilitate group work and make students pay more attention to readers. collaborative work among students performing online activities. About one hundred students from three high schools, in the suburbs and outlying areas of Perugia, were involved in an experiment based on a software system that we have called Talenet. This tool was developed to test the effectiveness of an interactive environment that allows students and teachers to share the analysis of a collection of Romantic ballads. Twelve Italian Romantic ballads were chosen within four themes: patriotic, sentimental, social, and historical & legendary. The results of this experimental study are: an increase in learning literature in this particular case by building a bridge between the classroom experience and the informal network learning, an increase in the students’ motivation to study and to boost their creativity and their experience in network sharing with members of their and other classes. Opinions, emotions, and materials from other websites, basically any thoughts the students wished to share with their friends. were among the shared things. ThC 5.33 Teacher Robot, A New Concept of Modern Teaching, pp. 691-696. Aihua Zhang Bohai Univ. Zhongdang Yu Bohai Univ. Nowadays, facing massive amount of information from various sources, the traditional education concepts and architectures have reached their limits to meet people’s requirements for an intelligent education system. Based upon more than 10 years’ practice in university education, the authors developed a new concept of Teacher Robots by analyzing and refining the general definitions and capabilities of robots. In this paper, the authors also described the subject foundation, functions and absolute features of the Teacher Robots in details. Among all these optimal features of Teacher Robots, the independent operational capabilities were especially essential for the design of an intelligent teaching tool. This new concept of Teacher Robots suggested a potential approach to develop a systematic framework of modern educational system. ThC 5.37 Study on Teaching Strategies of “College Computer Foundation”, pp. 710-714. Yangmei Zheng Guangxi Youth Leaders College “College Computer Foundation” is an important public basic course in the university. It plays an important role in undergraduates’ computer education. In this paper, a brief description is made for “College Computer Foundation” from its development, its goal, its characteristics and its contents in the beginning. And then the facing problems in teaching are analyzed. To solve these problems, some strategies are proposed from the following aspects, teaching objects, teaching contents, teaching organization, extension after class and course assessment. ThC 5.34 An Intelligent Educational Software for Automatic Problem Solving in Linear Algebra, pp. 697-702. Nhon Do Van Ho Chi Minh City Univ. of Tech. Hung Chau Kim Ho Chi Minh City Univ. of Tech. Van Ho Long Ho Chi Minh City Univ. of Tech. Systems of automatic problem solving based on knowledge base play an important role in application of artificial intelligent; especially in education, those systems support effectively to students and teachers in learning and teaching mathematics. Linear algebra is an important basic knowledge for all students in most of disciplines, particularly in information technology. In this paper, a knowledge representation model and inference algorithm are presented; and they have been used to design and implement a system of automatic solving for Linear algebra, as a result that its solutions are suitable with thinking and writing of human. The system is implemented by the algebraic computation system of Maple and C# programming language through connecting technique between Maple and C#. This program has been tested and appreciated completely. ThC 5.38 Education Reform on Software Programming Courses for Non-IT-Majoring Undergraduates, pp. 715-719. Shaobing Song Hangzhou Normal Univ. Ge Yu Hangzhou Normal Univ. Software programming skills becomes more and more important in the information times for up-to date students. The article describes the essential thoughts and discusses the basic practices in education reform on software programming courses for non-IT-majoring undergraduates. Main concerns include project-driven thinking, textbook revising, teaching model reforming, student demand orientating, initiative arousing, interests compelling, knowledge transferring, project-driven case studying, adversity environment teaching, teaching procedure designing and team work conducting. And also analyzes the effects of the reform practices. ThC 5.39 Network Education Platform Design of Space for Future Teacher, pp. 720-722. Ou Qizhong Guangxi Teachers Education Univ. Zhang Lanfang Guangxi Normal Univ. Space for Future Teacher integrates IT with teacher education, creates 4 innovative teachers' education labs including a teacher professional development lab, an interactive lab of learning community, a remote teachers’ lab of rural primary and secondary schools, and a development lab of education network resources, and offers a new network education platform for training qualified teachers of primary and secondary schools and outstanding serving teachers. ThC 5.35 Exploration and Practice of Software Engineering Core Curriculum Construction, pp. 703-705. Guangquan Zhang Soochow Univ. Mei Rong Jinan Univ. "Software Architecture” and “Formal Methods” are two important core courses of Software Engineering. Their teaching quality and effectiveness will have an important influence on cultivating Software Engineering talents with high quality and innovation. At present, the teaching quality and effectiveness of these two undergraduate courses are unsatisfactory and have more problems in the domestic universities. Against these problems, this paper explores in the aspects of teaching content, teaching models, teaching methods and means, teacher resources and so on, in order to improve teaching quality, strive high-level elaborate courses and train qualified software engineering high level talents. ThC 5.40 Mathematical Education (Computer Application) Professional Facing Difficulties and Countermeasures, pp. 723-725. Qiang Yi Jiujiang Univ. Li Xingnan Jiujiang Univ. Zhou Jingui Jiujiang Univ. In the background of the new curriculum reform how to cultivate the mathematical education(computer application) professional students is our main issues now. Through the investigation , we specific analysis the mathematical education (computer application)professional facing the general difficulties. Determinate the local colleges education of mathematics professional own unique difficulties, and gives the solution difficult key initial assumption. ThC 5.36 Collaboration of Online Educational Instruction: Analysis of the Use of Online Teaching Tools for High School Students, pp. 706-709. Floriana Falcinelli Univ. of Perugia Cristiana Brunelli Univ. of Perugia This paper presents the results of a research project on a 57 many teaching method reforms have also been stimulated. Drawing on the experience of German project instruction and combining years of teaching experiences, the authors introduced an open-ended project instruction mode based on network. This article demonstrates its contents, characteristics and practical results in detail. We pay particular attention to the sources, organization, and effectiveness of instruction. We come to the conclusion that the characteristics of projects lies in its openness which makes it be free to choose teachers, partners, projects and high quality learning environment. This instruction mode has achieved fruitful results and good social effects. ThC 5.41 A Study on the Models of Teaching Computer Basic Course in Social Computing Context, pp. 726-729. Chunying Zhang Hebei United Univ. Jianjing Li Hebei United Univ. Xiao Chen Hebei United Univ. Social computing, the direction of network development in the future, has exerted a profound influence on our life and work. This paper, based on the presentation of social computing and its impact on education, explores the models of teaching computer basic course at college in the social computing context, with its focus on teaching contents and activities, experimental teaching and network teaching. ThC 5.46 The Exploration of the Teaching System of Operation System, Enhancing the Comprehensive Quality of Students, pp. 748-750. Tangtang Xie Southwest China Univ. Zhilin Ren Southwest China Univ. Hanrong Chen Southwest China Univ. Jun Li Southwest China Univ. This paper analyzed the status and the characteristics of “Operating System”, the existing problems on the current teaching of “Operating System” for undergraduates majoring in computer sciences. According to the teaching requirements and objectives of the operating system, this paper put forward the “incremental” teaching system. The key links of the teaching system is formulated in four aspects as follows: optimizing the teaching content and refining the instructional structure, innovating teaching modes and carrying out the threedimensional instruction, setting up a “chain of practice teaching” and enhancing the innovative ability of students, constructing teaching aids resource library and promoting independent learning. This teaching system proves to be able to meet the teaching requirements of the “Operating System”, enriching the students' knowledge, and cultivating the comprehensive quality of the students. ThC 5.42 Knowledge Representation and Algorithms Automatic Solving Integral Problems, pp. 730-735. Nhon Do Ho Chi Minh City Univ. of Tech. Thu_Le Pham Ho Chi Minh City Univ. of Tech. Integral of single variable functions is an important issue in calculus. This problem is widely applied in many fields such as physics, economics, etc. Systems for automatic solving integral problems are necessary tools in education. They support students and teachers in learning and teaching mathematics. Current computer algebra systems such as Maple, Mathematica, etc can solve integral problems. However, they output the result only or are limited to give the complete solution. This paper presents a model for representing knowledge about single variable functions and proposes some algorithms for solving integral problem automatically. These algorithms mimic the human way of thinking and produce the solution that explains the calculus process. ThC 5.43 Design and Research of Multimedia Teaching in Sports Technique Class of University, pp. 736-739. Wu Yajuan Chang-an Univ. Multimedia in class of university has become much popular. But it is clearly not enough attention taken in the sports ,so that method of the teaching is backward ,the way is simplex and traditional ,the content is old and boring ,the approaches are all in the same key .But when we use multimedia teaching in sports technique class of university, we will find that it could improve the method, enhance the way, guide students' interest ,we would also find that multimedia teaching could not only make the process of teaching colorful, but also improve the effect of bilateral activities of teaching and learning. ThC 5.47 Learning Outcomes of Programming Language Courses Based on Peer Code Review Model, pp. 751-754. Yanqing Wang Harbin Inst. of Tech. Li Hang Harbin Inst. of Tech. Sun Yanan Harbin Inst. of Tech. Jiang Yu Harbin Inst. of Tech. Yu Jie Harbin Inst. of Tech. Software quality assurance at source code level has drawn pressing concerns because of the increasing complexity and size of software projects. Based on the updated peer code review process model, an information system was constructed. After several academic years’ implementation, questionnaire is made and data is analyzed. Some charming learning outcomes are recognized. Peer code review model is further proved vital in the pedagogy and evaluating of programming language although it can still be improved. ThC 5.44 Research on the Computer Teaching System for Talent Cultivation Based on Kano’s Model, pp. 740-743. Ping Yan Shenyang Aerospace Univ. Minghai Jiao Northeastern Univ. This paper aims to the talent cultivation problem in higher education, analyzes the five categories of customer satisfaction according to Kano’s model, assesses the student satisfactory computer curriculum according to Kano’s evaluation table, and then provides the computer teaching system model and computer courses setting. The model includes three dimensions: Subject program (x-axis), Teaching level (y-axis), and Experiment type (z-axis), which enhances student quality and satisfactory. The subject program includes Arts, and Science. The teaching level includes Introduction, Elementary, Professional, and Innovation. The experiment type includes Basic, Synthetic, Design, and Innovation. Computer courses are arranged in corresponding hierarchy for talent cultivation. Experiment type also is integrated into aforementioned layers. The presented model is effective for student quality cultivation. ThC 5.48 Exploration and Practice on Higher Mathematics Teaching Reform under the Condition of Modern Information Technology, pp. 755-757. Xiongwei Liu National Univ. of Defense Tech. Jianping Li National Univ. of Defense Tech. Under the condition of modern information tech-nology, various universities in China have been exploring how to reform the teaching content, teaching method, teaching means and teaching mode of higher mathematics. In recent years, according to the talent training goal of our university, we have carried out a series of beneficial exploration and practice such as updating the corresponding teaching content and curriculum system, reforming the teaching mode, perfecting the supporting course resources and expanding the interactive teaching mode. In this way, we have made some achievements in higher mathematics teaching efficiency and talent training quality. ThC 5.45 Open-ended Practical Project-based Instruction Mode Under Netwrok Environment, pp. 744-747. Gang Cen Zhejiang Univ. of Sci. & Tech. Xuefen Lin Zhejiang Univ. of Sci. & Tech. Junyan Luo Zhejiang Univ. of Sci. & Tech. With the improvement of network environment, learning concept under network environment becomes more and more popular and ThC 5.49 The Research on User Satisfaction of Easy Teaching Web of Taipei Assessed via Information Quality, System Quality, and Technology Acceptance Model, pp. 758-762. Chien-Yun Dai Taiwan Normal Univ. 58 Manting Kao Taiwan Normal Univ. Charng-Tzer Harn Taiwan Normal Univ. Yu-Hsi Yuan Taiwan Normal Univ. Wan-Fei Chen Taiwan Normal Univ. In the digital era, using information technology to search for valuable information has been one of the skills are important. Taipei City Government set up Easy Teaching Web of Taipei, integrate scattered knowledge in the field of education and human resources, and build a knowledge-sharing platform for teachers. However, it is still important to understand how to improve the usage of Easy Teaching Web of Taipei of teachers. This research applied the Technology Acceptance Model as research foundation, and the Information Systems Success Model was also considered as impact factor in this research, to understand the teachers to the satisfaction of the digital platform. There are 318 valid samples by random selected from members to fill out a developed pencil-paper questionnaire. The multiple-regression was used for data analysis, the empirical results lead to four conclusions. First, Information Quality (IQ) can predict Perceived Usefulness (PU) and Perceived Ease of Use (PEOU). Second, System Quality (SQ) can predict PU and PEOU. Third, PEOU can predict PU and Attitude toward using (ATU). Fourth, ATU can predict User Satisfaction (US). According to research finding that Easy Teaching Web can promote the user satisfaction by improve easy use of the system. Science, pp. 772-775. Liu Chengxia Beijing Info. & Tech. Univ. Cai Ying Beijing Info. & Tech. Univ. Shen Meie Beijing Info. & Tech. Univ. The competition at present is more and more intense, how to improve students' comprehensive competitiveness is one of the important targets of students cultivation. The importance and necessity of the cooperation between university and enterprise is discussed in this paper and how to make the student majored in computer science more professional is studied. Make reference to some universities’ successful experience the method of cooperation is listed and the University-Enterprise be united to develop combined cultivation program in practice part is given. From some examples we can obtain better application effect than before by the new cooperation method. The problems need to do a further study in cooperation are discussed in the end of the paper. ThC 5.54 How to Improving the Non-computer Science Students’ Computer Ability, pp. 776-778. Wang Zilan Southwest Jiaotong Univ. Xie Pan Southwest Jiaotong Univ. Lin Jing Southwest Jiaotong Univ. With the rapid development of the computer and applied technology, universities increasingly focus on cultivating non-computer science students’computer application skills. This paper analyzes the teaching status and problems of non-computer major in universities, then explore the way to improve the computer application skills of the non-computer science students from the improvement of teaching resources, teaching and learning methods, the mental attitude towards to the computer education respectively. Propose appropriate measures to improve students’ capacity of using computer to analyze and solve practical problems and to cultivate the compound talents with both computer skills and expertise. ThC 5.50 Study on Curriculum Design of System on Chip, pp. 763-765. Jianfeng An Northwestern Polytechnical Univ. Xiaoya Fan Northwestern Polytechnical Univ. Shengbing Zhang Northwestern Polytechnical Univ. Wengxing Li Northwestern Polytechnical Univ. Besides application opportunities due to billions of transistors and GHz frequencies, the last ten years witnessed a major shift in the traditional design of VLSI to a more modem approach which is SoC. Universities are recently updating their digital design education offerings to include the recent SoC design approaches. This paper discusses curriculum design of SoC in universities. We suggest SoC courses should place extra emphasis on experiments. We compare our FPGA based SoPC experimental method with IMEC. This analysis would be helpful to construct a more reasonable SoC course under current available conditions. ThC 5.55 Multidimensional Teaching Research on University Computer Foundation Course, pp. 779-782. Dan Guo Harbin Univ. of Commerce This paper studies the current teaching mode of university computer foundation course. and on this basis puts forward multidimensional teaching mode, which enriched the single traditional teaching mode. This research has important significance for similar course features teaching construction of all national universities. It can be extended to other same based on the characteristics of the course teaching, which helps to improve the teaching effect of various disciplines, to cultivate students the comprehensive utilization ability and the ability to adapt for employment. ThC 5.51 On the Necessity of Distance Learning Courseware Building for EFL Adult Learners, pp. 766-768. Bi Huiying Changchun Inst. of Tech. The author firstly analyzes the background and current situation of distance English learning for EFL adult students and points out the necessity of building distance learning courseware to update the teaching concepts and to improve teaching efficiency. The theoretical foundations for distance learning courseware construction are Independent Learning Theory and Interest Principle. In this paper, the author gives a perspective on the contents and the specific requirements of English courseware building. And then the author analyzes the advantages of building such a project to prove its necessity and significance. ThC 5.56 General Education Extra-curricular Training Program for Computer Major College Undergraduates: Practice and Exploration, pp. 783-787. Xin Mingjun Shanghai Univ. Wu Yue Shanghai Univ. On the basis of analyzing market demand of talent positioning for computer professionals, it proposes the reform of the general education for the freshman of computer professionals and the curricular and extra-curricular training program of professional education in the last three years. Furthermore, according to the general education curriculum system will be executed from this year in Shanghai University, it focuses on the key evaluation methods of extra-curricular training program with comprehensive cultivation of talents, which is named as a core approach both in learning outcomes based general education and in practice based professional teaching and learning. Thus, it provides a dependable practice and exploration platform and brings a new foundation for the creative talents’ training under the teaching and learning background for general education. ThC 5.52 Research on the Construction of Practical Teaching System for Computer Majors, pp. 769-771. Zhang Ping Zhengzhou Info. Tech. Univ. Han Lin Zhengzhou Info. Tech. Univ. Zeng Guangyu Zhengzhou Info. Tech. Univ. The purpose of practical teaching is to help students master basic experiment skills and methods, deepen the understanding of theoretical knowledge and develop their sense of innovation. To improve the practical ability of students is the mainline of the practical teaching. The construction of practical teaching system is beneficial to normalize the training process of practical teaching, and arrange the experiment courses scientifically and systematically. Based on the experience of practical teaching, this paper focuses on discussing thoughts and ideas on construction of teaching system for computer majors. ThC 5.57 ViSiMIPS: Visual Simulator of MIPS32 Pipelined Processor, pp. 788-793. Md Tahsin Kabir North South Univ. Mohammad Tahmid Bari North South Univ. ThC 5.53 Using Cooperation Between University and Enterprise to Improve the Comprehensive Competitiveness of Student in Computer 59 Abul L. Haque North South Univ. Pipelining is very important implemention technique in computer architecture which permits several instructions to be esecuted simultaneously ,each of them in a different stage of the datapath.Students of computer since need to aquire this fundamental concept clearly but most of them find it unfathomable.Moreover it is diffcute for an instructor to teach these concept on a paper and pencil basis.In this paper we present VISIMIPS,which simulates and dynamically visualizes the processing of instructions by MIPS32 pipelined processor to assist in teaching such concepts. In addition, it describes details of the basics of MIPS instruction set and pipelining, also designates ViSiMIPS, its main components and functionalities. Its graphical user interface (GUI) illustrates the register-transfer level and expedites students to comprehend the different stages of pipelining. Jiang Daiyou Chang'an Univ. Innovation is the soul of a nation's progress. How to train a large number of people with creative ability, has become a top priority to education, and classroom instruction in the students ability to innovate is particularly important. This article from the update teaching concepts, teaching content, innovative teaching methods to stimulate creative thinking and other aspects described. ThC 5.62 Research and Design CSCL Model Based on Ubiquitous Learning Environments, pp. 811-814. Qi Xinxing Southwest Univ. of Sci. & Tech. Liu Zhiqin Southwest Univ. of Sci. & Tech. Ubiquitous learning is a new educational model which is based on the development of Ubiquitous Computing applying in the field of education. According to the analysis of Ubiquitous learning’s connotation, features and technological support, combining the original common model of CSCL, this paper is trying to construct a brand-new model for computer-supported cooperative learning. The author analyses the elements of the model in detail, and then expounds the strategies of promoting CSCL and advantages of CSCL based on the ubiquitous learning environment. ThC 5.58 Information Capacity Training of College Students: Problems and Solutions, pp. 794-798. Bi Tingyan Weifang Univ. Xu Qiuhua Weifang Univ. Through the literature search, the paper summarizes the experience of information capacity training of European and other developed countries. Combining the fact that information awareness of college students in China is not strong and the actual information capacity is not high, the paper looks for the existing problems and shortcomings, and conducts in-depth analysis and discussion. On this basis, countermeasures and suggestions of the process of designing and building model are put forward to help train information capacity of college students. ThC 5.63 Teaching Discrete Mathematics with the Constructivism Learning Theory, pp. 815-816. Hu Yahong Zhejiang Univ. of Tech. Wang Weihong Zhejiang Univ. of Tech. Jiang Li Zhejiang Univ. of Tech. Constructivism theory reveals the regularity of human cognition. According to constructivism theory, students will learn best by trying to make sense of something on their own with the teacher as a guide to help them along the way. Discrete mathematics is a very important course for computer majors. As discrete mathematics has quite rich contents and it is very abstract, it is not easy for students to master its spirit. In this paper, we propose applying constructivism theory to the teaching of discrete mathematics. During all the teaching phases(including teachers’ preparation before class, teaching during class and students’ review after class), constructivism theory is used. Our practices show that constructivism theory based teaching method can raise students’learning interests, and also can help them to understand the course better. ThC 5.59 Research on Construction of Information Literacy Curriculum System in Colleges, pp. 799-803. Bi Tingyan Weifang Univ. Liu Li Weifang Univ. In modern society, to train students with higher information literacy is one of the important goals of higher education in the world. Compared with Europe and America and other developed countries, China started late in the education of college information literacy and the effect of information literacy education is not ideal. This study analyzes the content of information literacy education and development status and finds the relevant constraints. Based on the advanced experience from abroad, the paper proposes some suggestions on the system construction of information literacy curriculums in Chinese colleges. Namely, by rational design of curriculum system and training path, to enhance the students’ information, knowledge, ability, awareness and moral construction, and promote the comprehensive improvement of information literacy of college students. ThC 5.64 On Constructing Tridimensional Visual Teaching Resource System for Informational Discipline Platform Courses, pp. 817-820. Tongcheng Huang Shaoyang Univ. Liping Yin Shaoyang Univ. In this paper, the tridimensional visual teaching resource system for platform courses of informational discipline was described. It has promoted IT personnel training quality greatly by our real teaching application in Shaoyang University. ThC 5.60 Research on Software Undergraduates Training Countermeasures Based on the Competency Model, pp. 804-807. Shihai Zhu Zhejiang Water Conservancy & Hydropower College Li Wang Zhejiang Water Conservancy & Hydropower College Competency is able to drive a person to have good performance at work and is an objective measure of a person's collection of various personality traits. The key competency factors of software professionals can be divided into the following five groups: professional knowledge, application skills, initial capacity, quality characteristics and perception capability. On such basis we can construct the software professional competency model. After that we can take the following training countermeasures for software undergraduates: First we should pay more attention to the training of their professional knowledge and application skills; Second, college-enterprise cooperation should be strengthened to improve their initial capacity; Third, we should improve their quality characteristics and perception capability through the activities inside and outside class education. ThC 6 Computer Graphics ThC 6.1 Overview of Video-Based Vehicle Detection Technologies, pp. 821-825. Kun Wu Xiamen Univ. Haiyin Zhang Xiamen Univ. Tianmao Xu Xiamen Univ. Ju Song Xiamen Univ. In this paper, we first reviewed different kinds of vehicle detection methods and pointed out that the video based detection technique is the most advantageous method. Then we introduced several of video based vehicle detection algorithms in detail and compared their performance. Finally, the difficulties and development trends of the video based vehicle detection algorithm research were presented. ThC 6.2 Fuzzy Clustering Application in Medical Image Segmentation, pp. 826-829. Yang Gefeng Guangxi Medical Univ. Ou Xu Guangxi Medical Univ. ThC 5.61 Classroom Teaching Strategies Creative Abilities, pp. 808-810. 60 Liang Zhisheng Guangxi Medical Univ. The purpose of medical image segmentation is to divides the lesions image with a special meaning and background regional. The characteristics of medical images are generally more complex. There is often overlap between different regions, the edge of the area is vague. Research based on fuzzy clustering method for medical image segmentation, fuzzy C-means clustering and fuzzy kernel clustering methods were studied and discussed fully considered the spatial information, the single objective problem conversion into multi-objective problem. The experimental results show that the method use in medical image segmentation achieved good results. activities.However,the current videl coding standards remove the spatial-temporal redundency based on the signal satisetical correlation.Therefore to reach higher compression efficency without perceptually degrading of the reconstructed video signal, the properties of the human visual system need to be better exploited. Research effort has been dedicated to modeling the spatial saliency map based on the properties of HVS. The importance of video image varied with the regions, and human visual attention too varied with the importance of region of video image, so using the attention selectivity properties of the human visual system, the paper proposed video coding rate control method based human visual saliency map in H.264/AVC. For each frame, target bits are allocated through the correction of attention region size between the current frame and previous frame, and for each MB, MB’s complexity are modified through the saliency and MAD value of MB. At last, the algorithm was implemented in reference software JM12.2. Simulation results showed that, comparing with traditional algorithm, the proposed reduced the coding bit rate, at the same time, and it also improved the subjective quality of reconstructed video in visual attention region. ThC 6.3 A Spatio-temporal Filtering Method for Motion Estimation, pp. 830-834. Wang Rui Beihang Univ. Zhao Yan Beihang Univ. Tang Yujun Beihang Univ. Yuan Yan Beihang Univ. Motion estimation (ME) from image sequences is of primary importance for applications like target tracking, velocity measurement and vision guidance. By the fact that the wavelet transform has the ability to handle the signals with the nonstationary, time-varying properties, a novel spatio-temporal filtering approach based on the Continuous Wavelet Transform (CWT) to realize the motion selectivity is presented. The Fourier analysis of the signal in one dimension of space and time as well as the wavenumber-frequency domain coverage of the Morlet wavelet for different parameters are adopted to provide the strategy for motion estimation and tracking target which moves in a relatively simple mode. Experiments take place with real video sequences to demonstrate that our method has the advantage of being robust to illumination variations, noise, and being computationally efficient. ThC 6.7 A Video Coding Error Concealment Method for AVS-P2 Standard, pp. 847-851. Ruan Ruolin Wuhan Univ. Hu Ruimin Wuhan Univ. Chen Hao Wuhan Univ. Li Zhongming Xianning Univ. The error concealment is an important technique in the video transmission that can assure the reconstruction video quality and can efficiently recovery the data loss and the data errors in the transmission process caused by the transmission environment, thus improve the subjective quality of the video received in the end. In order to enhance the error resilience of AVS-P2, in this paper, we propose a novel adaptive temporal-spatial error concealment method based on the redundancy motion vectors. To conceal a lost block, we use the spatial error concealment for the I-frame macroblocks, and use the temporal error concealment for the non-I-frame macroblocks. At the same time, according to the motion intensity of the macroblocks, we use the default error concealment and based on redundancy motion vectors error concealment method, respectively. Lastly, we realize the algorithm on the platform of the AVS-P2 RM52; the simulations results show that the proposed method is significantly better than the existing techniques in terms of both objective and subjective quality of reconstruction video. ThC 6.4 Measuring Thickness from 3D Gray-scale Image by Fuzzy Distance Transform, pp. 835-838. Qi Zhong Xiamen Univ. Hong Duan Xiamen Univ. Jiangui Wu Xiamen Univ. Thickness is one of useful parameters in analyzing object morphology and shape. This paper is concerned with a method for quantifying thickness of a 3D fuzzy object using fuzzy distance transform (FDT). In this way, thickness is obtained by analyzing FDT values along the medial axis which was generated by a desirable skeleton algorithm described in [1]. ThC 6.8 Traffic Indication Symbols Recognition with Shape Context, pp. 852-855. Kai Li Xiamen Univ. Weiyao Lan Xiamen Univ. A novel traffic indication symbol detection and recognition method is introduced in this paper. We firstly apply color detection and shape detection on the real-time image to locate and extract the symbol region. Then the traffic indication sign is matched and recognized by using shape context. Experimental result demonstrates the proposed algorithm has good performance on recognition and more robustness to the disturbances. ThC 6.5 A Photo Based 3D Garment Making System for Educational Purpose in Style Reconstruction and Evaluation, pp. 839-842. Yueqi Zhong Donghua Univ. Both industrial and educational applications require fast prototyping of garment design. The traditional way of generating 3D garment model is to sew 2D patterns together. However, there is no feasible approach to generate the 3D garment without providing the 2D patterns for sewing, which is commonly encountered in aforementioned contexts. In this paper, we propose a novel approach in making 3D counterpart of the real garment via the photos of the front view and the back view of the target garment respectively. The original photos are triangulated for constructing a corresponding mass-spring system. The final 3D garment is made by virtual sewing and draping. The experimental results prove that our system is an effective approach in making 3D garment with satisfied visual effects. ThC 6.9 Analysis of Regional Comparative Advantage and Spatial Distribution of Jiaozuo Rehmannia, pp. 856-859. Zhang Shengwu Northwest Normal Univ. Li Kongwen West Anhui Univ. Zhang Xiaozhou Northwest Normal Univ. Using the method of aggregated advantage index, this paper analyzes the comparative advantage of Rehmannia areas in Jiaozuo, which are then expressed in the map by GIS software. The results show that there are significant regional differences of Rehmannia production, and the townships of production advantages are mainly located in the central and southern parts of Jiaozuo. According to the principle of comparative advantage, it is suggested that Rehmannia production areas be adjusted, and the rational distribution and specialized production for the ThC 6.6 A Novel Rate Control Algorithm of Video Coding Based on Visual Perceptual Characteristic, pp. 843-846. Ruan Ruolin Wuhan Univ. Hu Ruimin Wuhan Univ. Li Zhongming Xianning Univ. The rate control plays a very important role in video streaming applacations.The current rate control scheme in the advance video coding standard H.264/AVC still results in a relatively large quailty fluctuation for frame-level with higher motion 61 Rehmannia production be implemented. At last, reasonable measures and suggestions for the Rehmannia development are proposed. Wang Yi Chongqing Univ. of Tech. Liao Hao Chongqing Univ. of Sci. & Tech. The new system combined with mine and torpedo is an ideal new weapons system, which has a lot of advantages, including of good hidden characteristic, strong anti-sweep characteristic, high survival rate, big regional control, large dosage and good attack effect. It is a kind of good weapon in the water based on higher cost-effective and strategic value. The deep submarine of torpedoes and the scope of using mines are expanded. The power of the mines is expanded and the combat radius is increased. Times and number of mines can be significantly reduced, losses of ships and planes also be reduced. In modern high-tech part war with the conditions of the blockade and anti-blockade on the coastland, in particular the intervention of the enemy, an important role of the system would be played. A series functions as automatically activate, real-time hot tracking and targeting, automatically detonating of the new system combined with mine and torpedo were introduced in this paper. Two principles of ultrasonic distance measurement and “see back” effect based on hot tracking and targeting were adopted. The new system with the function of tracking and automatic offensive was researched and designed. The system was used in the underwater depths of 10 meters (good hidden capability, timely solar charge). It also can be considered as the ideal environment for the system, so it has corresponding practical value. However,the system is only applicable to lethal weapons for large area because of the difficulty in the use of precision on the lock attack mode. ThC 6.10 A New Scheme for 3D Face Recognition Based on 2D Gabor Wavelet Transform Plus LBP, pp. 860-865. Yi Jin Beijing Jiaotong Univ. Yizhi Wang Beijing Jiaotong Univ. Qiuqi Ruan Beijing Jiaotong Univ. Xueqiao Wang Beijing Jiaotong Univ. In this paper, a novel method based on Gabor Wavelet Transform plus Local Binary Pattern is proposed for feature representation in 3D face recognition. Firstly, to enable the application of the new feature representation of the framework, Iterative Closet Point (ICP) is utilized as preprocessing to detect the nose tip by aligning a pair of symmetrical 3D face models of the same person, crop the interest of region, and then generate the corresponding depth images. Secondly, multi-scales and multi-orientations Gabor Wavelet Transform is proposed for feature representation. Then, LBP operator is used to describe the local features future. For each face region, the statistical histogram is utilized to represent the 3D face accordingly. Finally, LSDA based strategy is presented to address the recognition task. The new algorithm benefits mostly from two aspects: One aspect is that Gabor wavelets are promoted for their useful properties, such as invariance to illumination, rotation, scale and translations, in feature extraction. The other is that the LBP operator not only describe the local features which have been demonstrated to be quite considerable in recognition task, but also reduces more coefficients for image representation. Experiments based on the FRGC 3D face database demonstrate the effectiveness and efficiency of the new method. Results show that our new algorithm outperforms the other popular approaches reported in the literature and achieves a much higher verification rate at 0.1 FAR. ThC 7.2 Studies on Wireless Data -collecting System of Thermodynamic Properties of Steam Turbine, pp. 880-883. Ji Pengwei Changchun Inst. of Tech. Cai Changqing Changchun Inst. of Tech. Tests of thermodynamic properties will be needed before and after overhaul of steam turbine units, in order to assess the economical conditions of the equipment, and to provide directions for operation of Electricity Plant and maintenance tasks in a power plant, to guarantee coal- and electricity-saving, more generation and supplies to offer indispensable preconditions under which an economic dispatching solution and operation of the plant and the system. The existing tests most adopt wired data collecting manner, require complicated testing means and longer cycles. This document raises a set of complete wireless data collecting system based on NRF9E5 Data-collecting Modules for measurements of thermodynamic properties of a steam turbine. This system possesses advantages such as multiple test points, ease of extension, perfect interference resistance. ThC 6.11 3D Surface Stagnography Using Geometry Images, pp. 866-870. Qing Huang Louisiana State Univ. S. S. Iyengar Louisiana State Univ. Xin Li Louisiana State Univ. This paper presents a new 3-d data hiding scheme. By using geometry images, we transform the 3-d data hiding problem into the 2-d image data hiding problem where efficient algorithms can be applied. A modified LSB embedding approach is proposed to embed payload in geometry images. Experimental results show that a large amount of payload can be embedded in the 3-d model without causing too much deformation of the 3-d model. In the end of the paper, we propose a completely new representation of 3-d model as an application of our data hiding method. ThC 7.3 Research on Technology for Quality Regulation and Control of Electrical Energy from Power Distribution Network, pp. 884-887. Zhang Zhuo Changchun Inst. of Tech. Cai Changqing Changchun Inst. of Tech. Ji Xiu Changchun Inst. of Tech. Ao Ming Electric Power Research Inst. of Jilin Electric Power Co., Ltd Liu Wenzhou Changchun Inst. of Tech. As China national economy and technology are under rapid development, all industries are requesting better and better quality of electrical energy. Therefore, research on technology for quality regulation and control of electrical energy of power distribution network becomes first priority. The optimized algorithm of controller as stated in this article for quality regulation and control of electrical energy is optimized double closed-loop control algorithm which enables system to have better stability and control accuracy while ensuring quick dynamic response. During test, an optimized d-p detection algorithm is adopted. Such new algorithm is also applied for detecting harmonic in power distribution network. Then general detection accuracy is efficiently improved. ThC 6.12 Dynamic Harmonic Texture Mapping using Methods of Fundamental Solutions, pp. 871-875. Huanhuan Xu Louisiana State Univ. Xin Li Louisiana State Univ. Feature-aligned surface mapping improves the effect of texture mapping by enforcing feature correspondence between 3D meshes and images. We present a novel constrained texture mapping computation framework based on the method of fundamental solution (MFS). We first flatten the surface onto planar domain, then compose a 2D harmonic map with user specified features aligned with corresponding texels in the texture image. We demonstrate that our framework can efficiently conduct feature-aligned texture mapping with dynamic deforming meshes or texture images. ThC 7 Control Technology ThC 7.1 Research and Design of the New System Combined with Mine and Torpedo, pp. 876-879. Ye Binqiang Chongqing Univ. of Tech. Zhao Mingfu Chongqing Univ. of Tech. Deng Yiyuan Chongqing Univ. of Tech. Xu Zhongyu Chongqing Univ. of Tech. ThC 7.4 The Research on Data Processing for Dynamic Batching-weighing System, pp. 888-890. Zhang Ying Shenzhen Entry-Exit Inspection & Quarantine Bureau 62 Hou Yunbin Harbin Inst. of Tech. Shenzhen Graduate School Liu Min Shenzhen Entry-Exit Inspection & Quarantine Bureau In the area of dynamic weighing system, the accuracy of measurement and speed of dynamic response are the key performance indexes. This paper made some research on the method of data processing, includes the design of FIR filter and IIR filter, then analyzed their characteristic and found shortages. Furthermore, according to the condition of batching-weighing system, realized the Kalman filter, the results showed that Kalman filter can provide accurate measurement and excellent dynamic response. makes it very difficult to apply ordinary controls to switched reluctance motor. However, direct torque control technology as stated in this article will directly consider the torque as controlled objective. It emphasizes the effects of direct control of torque. This will eliminate complex transformation of vector and simplifies the process of mathematic motor model so that control structure is simple and control procedure is direct. In this article, direct torque control technology is applied for the control of switched reluctance motor so that speed governing can take place quickly and steadily while the motor is suppressing torque ripple effectively. ThC 7.9 Research on Improved SIFT Feature Matching Arithmetic in the SAR Vision Matching Aided Navigation, pp. 909-914. Xiong Zhi Nanjing Univ. of Aeronautics & Astronautics Wang Dan Nanjing Univ. of Aeronautics & Astronautics Zhang Dan Nanjing Univ. of Aeronautics & Astronautics Liu Jianye Nanjing Univ. of Aeronautics & Astronautics The performance of the image matching arithmetic will affect the precision and dependability of the SAR vision matching aided navigation system. When the real-time SAR image is influenced by the noise badly, the image matching result will be affected greatly. In order to improve the performance of the image matching arithmetic, improved SIFT feature matching arithmetic based on the wavelet transform is researched in this paper. The improved arithmetic adopted wavelet transform to restrain the noise of the real-time SAR image. At the same time, the paper utilized the multi-resolution analysis of wavelet transform to minish the realtime image’s size. Consequently, it enhanced the precision and the rapidity of the matching arithmetic a lot. The simulation result and contrastive analysis conclusion made it clear that, compared to the basic SIFT matching arithmetic; the arithmetic proposed in this paper shows the better predominance in the matching positioning precision and speed. ThC 7.5 The Fuzzy Decision and Simulation of Washer Control, pp. 891-896. Yu Zhen Xiamen Univ. Xu Fang Xiamen Univ. The fuzzy control is an intelligent control method relying upon the fuzzy set theory, fuzzy variables, and logic deduction. It can imitate the process of human decision inference in behavior, so it is more consistent with the fuzziness and human awareness, understanding, decision of objective thing. This paper selects the washing machine as the control object, bases on the washer control principle, introduces the fuzzy decision process, especially studies the fuzzy control theory with three inputs and two outputs and sets up the fuzzy rules, at last, gives the fuzzy decision of the control and the results of simulation. ThC 7.6 Study on the Application of the Fuzzy RBF Neural Network in the MIMO Furnace Control System, pp. 897-900. Yun Zhang Changchun Inst. of Tech. Daofeng Zhou Jinlin Univ. Xuemei Chen Jinlin Univ. Mingshuang Bi Water Resources Department of the Jilin Province A multi-input/multi-output (MIMO) furnace control system based on the PID control and the fuzzy radical basis functions neural network(FRBFNN) control is presented, in this paper. In addition, the structure models and relative learning algorithms of the FRBFNN controller are gived. At last, simulation and experiment results based on an application of the MIMO furnace control system are provided to show that FRBFNN-control system has more robustness than the PIDcontrol system especially in reducing noise and overcoming non linearities. ThC 7.10 Design of a Large Scale Wind Turbine Generator Set Yaw System, pp. 915-918. Liu Wenzhou Changchun Inst. of Tech. Cai Changqing Changchun Inst. of Tech. Zhang Zhuo Changchun Inst. of Tech. PID-fuzzy adaptive yaw control algorithm is used and complete wind wheel position adjustment in 0rder to automatically track the changes of wind direction. Input to the change of wind direction and wind direction, the output is kp、ki and kd, its fuzzy adaptive controller are designed. The simulation software used in this paper is Matlab-Simulink 7.0. Wind turbine to follow changes in wind direction changes, improve wind energy efficiency, implementing agencies to avoid the frequent movement, optimize unit performance, verify the effectiveness of the yaw control algorithm. ThC 7.7 An Adaptive Neural PID Controller for Torque Control of Hybrid Electric Vehicle, pp. 901-903. Yun Zhang Changchun Inst. of Tech. Mingshuang Bi Water Resources Department of the Jilin Province Xiumin Yu Jinlin Univ. Sina Xu Jinlin Univ. An adaptive neural PID controller for torque control of hybrid electric vehicle is presented in this paper. In this controller the PID gains are tuned automatically by the neural network in an on-line way. In addition, the relative learning algorithms of the neural PID controller are gived. At last, simulation and experiment results based on an application of the torque control system are provided.The experimental results are compared to those of a conventional PID controller,it can be observed that the error has been reduced significantly using the neural PID controller. ThC 7.11 Study on Vehicle Magnetic Particle Clutch Control and Bench Test, pp. 919-922. Shanzhen Xu Huaiyin Inst. of Tech. Cheng Wang Huaiyin Inst. of Tech. Magnetic particle clutch is a new type car power transfer components. Based on the study of the magnetic particle clutch working characteristic, the mathematical model of clutch working characteristics was established. The Magnetic particle clutch driving controller was designed using pulse width modulation (PWM). Its control performance was analyzed and an experimental verification was completed. The experimental results showed that the controller designed for magnetic particle clutch meets the requirement for use. ThC 7.8 Study on Direct Torque Control System of Switched Reluctance Motor, pp. 904-908. Ji Keyan Changchun Inst. of Tech. Zhang Zhuo Changchun Inst. of Tech. Switched reluctance motor is featured with more advantages like reliable operation and simple construction. However, it demonstrates especially large torque ripple while running, which restricts its massive use. As drive system of switched reluctance motor is a complex time-varying and non-linear system, this ThC 7.12 Fault-tolerant Control with Finite-time Stability for Switched Linear Systems, pp. 923-927. Shu Gao Xiamen Univ. Xiaoli Zhang Xiamen Univ. For switched linear systems, the fault-tolerant control with finite-time stability is studied in this paper. Firstly, the satisfied conditions that actuators failed in actual operation are purposed within the permission of fault-tolerant control. Furthermore, by 63 the linear matrix inequality (LMI) approach, the stabilizing state feedback controllers and a class of switching signals are designed, which can guarantee the finite-time stable of the switched linear systems under arbitrary switching satisfying the average dwell-time condition. Finally, an example is employed to verify the efficiency of the proposed method in this paper. Caidong Zhang Xiamen Univ. Xiang Deng Xiamen Univ. Changlong Jiang Xiamen Univ. A text mining model for topical evolutionary analysis was proposed through a text latent semantic analysis process on textual data. Analyzing topic evolution through tracking the topic different trends over time. Using the LDA model for the corpus and text to get the topics, and then using Clarity algorithm to measure the similarity of topics in order to identify topic mutation and discover the topic hidden in the text. Experiments show that the proposed model can discover meaningful topical evolution. ThC 7.13 Robust Stablization for a Class of Large Envelope Flight Control Systems, pp. 928-932. Lixia Cheng Xiamen Univ. Yabin Yan Xiamen Univ. Jianping Zeng Xiamen Univ. This paper deals with robust control problems for large envelope flight control systems. Based on data fitting, a class of uncertainty model is improved to describe the flight control systems with wide operation range. The uncertainty model can reflect both the time-varying characteristic and the fitting error. Robust stability criterion and stabilizers design method via state feedback are proposed for flight control systems with the class of uncertainty. Moreover, a convex optimization method is provided to estimate the parameter perturbation range. Finally, a simulation example is given to illustrate that the method is feasible. ThC 8.4 A Novel Lightweight Iteration Filtering Algorithm Research in Wireless Sensor Networks, pp. 950-954. Linghong Lv Ningbo Univ. Zhijun Xie Ningbo Univ. Jun Zheng Ningbo Digital Televition CO.LTD In this paper, we propose a novel skyline query algorithm in wireless sensor networks, according to the data’s dominate ability progressively return the sensor data to construct the filter. At the same time, in order to reduce the overhead of the filter construction and broadcasting, we adopt mapping strategy to further eliminate the filtering cost. Theoretical analysis and experimental results all show that it can effectively reduce the communication cost, and eventually prolong the lifetime of the network. ThC 7.14 Model Identification and Control of a Small-Scale Unmanned Helicopter, pp. 933-937. Guanlin Wang Tsinghua Univ. Jihong Zhu Tsinghua Univ. Hui Xia Nanjing Univ. of Sci. & Tech. Modeling is the basis of flight control for unmanned helicopters. In this paper, modes partition method and structure traversal (MPM/ST) method is applied to derive the dynamic models of a small-scale unmanned helicopter, and thereby afford improved accuracy for flight controller design. Increment proportional integral derivative (IPID) controller is applied to each channel to compose the core-dynamic controller, which used to follow an outer-loop hover command. The simulation results showed significant benefits of the proposed approach in flight-control design for unmanned helicopters. ThC 8.5 Mining Group Correlations over Data Streams, pp. 955-959. Zhijie Wang Ningbo Univ. Jiangbo Qian Ningbo Univ. Maochun Zhou Ningbo Univ. Yihong Dong Ningbo Univ. Huahui Chen Ningbo Univ. Mining correlation over steams attracts a lot of attentions recently. However, group correlation analysis over data streams is relatively few. Moreover, existing literatures are mainly focused on a single time window, with large space and time complexity. This paper proposes an online canonical correlation analysis algorithm called MGDS (Mining Group Data Streams). Based on base-window, the MGDS algorithm dynamically maintains a few statistics from raw data to calculate correlation. The mining range is not limited in a single window, but can be changed according to queries. Theoretical analysis and experimental results show that the algorithm is accurate and efficient with space and time overhead reduced greatly. ThC 8 Database Technology ThC 8.1 Research on the Visualization of Data Mining Results, pp. 938-941. Chen Chen Chinese People's Armed Police Force Academy Since there aren’t successful Visualization of Data Mining cases in the Exit-Entry system, this paper proposes a new more perfect system. The paper establishes the system according to the characteristic of the data. The system mines the rules and visual results of the Exit-Entry data to realize the genuine Visualization of Data Mining. ThC 8.6 Statistical Method Based Computer Fault Prediction Model for Large Computer Centers, pp. 960-964. Zhixin Tie Zhejiang Sci-Tech Univ. Hong Zhuang Zhejiang Sci-Tech Univ. Qiang Luo Zhejiang Sci-Tech Univ. Lingbing Tao Zhejiang Sci-Tech Univ. Computer laboratories in large computer centers play an important role for the computing education in higher education institutions. Due to heavy usage, there are often hardware or software problems on these computers. Thus computer laboratories management and maintenance is a very important and long-term task. For a computer laboratory, the computers’ monthly used time follows the normal distribution, which is verified by the chi-square goodness-of-fit hypothesis test. According to probability distributions based on the normal distribution, a statistical method based computer fault prediction model for public computer laboratories is presented. Computers’ health state is divided into four classes: the Normal state, the Concerning state, the Warning state, and the Fault state. For different levels of computer fault, different methods are used to maintain it. The experiment and application was conducted in a university computer center with hundreds of computers in 9 computer laboratories. The experiment and application results show that it is an effective way for finding fault computers. It can be used to guide computer maintenance. Computers maintenance workload is greatly reduced by using this fault prediction model. ThC 8.2 One-to-Many Data Conversions by Extending Relational Algebra, pp. 942-945. Wang Jianbo Hunan Inst. of Humanities, Sci. & Tech. Wu Jinqun Loudi Vocational & Technical College Chen Xinbo Loudi Vocational & Technical College This paper expresses one-to-many transformations by extending relational algebra to resolve the problem that relational expressions are difficult to execute one-to-many data transformations, the recursive query and the table function should be employed to realize unbounded one-to-many transformations for producing one or several output tuples over every input tuples. Recursive queries create original results to obtain result sets by recursion and return final result sets. Table functions declare variable sets and employ a procedure body and cursor to access tables, iterative output tuples. Experimental analysis different bounded and unbounded data transformations under different reference influencing factor, results show that the extension method improves performance observably. ThC 8.3 LDA-based Model for Topic Evolution Mining on Text, pp. 946-949. Qingqiang Wu Xiamen Univ. ThC 8.7 64 Wavelet Decomposition Algorithm for Uncertain Data Streams, pp. 965-970. Liao Kangli Ningbo Univ. Chen Huahui Ningbo Univ. Qian Jiangbo Ningbo Univ. Dong Yihong Ningbo Univ. Recently,data mining over uncertain data streams has attracted a lot of attentions because of the widely existed imprecise data generated from a variety of streaming applications. Many applications have endless uncertain data streams which have a huge amount of data so that it is infeasible to reserve all data in memory to be visited. Therefore, we need a new technology to effectively compress uncertain data streams. Among different data compression technology, the Haar wavelet decomposition is the most popular one, but the traditional wavelet decomposition is no longer applicable on uncertain data streams. Although a significant amount of previous research explore various data reduction techniques on data streams, data reduction techniques on uncertain data streams have seldom been investigated. In this paper, we try to resolve the problem of the wavelet decomposition over uncertain data streams and propose U-HWT(Uncertain Haar Wavelet Transform),a new algorithm for compressing the uncertain data streams. U-HWT uses discrete Haar wavelet transform and emphasis on the impact of the tuple uncertainty on the decomposition. Experimental results show that U-HWT can effectively compress the uncertain data streams. By analyzing the many problems of today’s online courses, this paper introduces the concept and meaning of PBL (project management) online courses, the constitution of PBL and the characteristics of online courses. By making analysis of these concepts in simple terms, we conclude the methods and principles of online course teaching based on PBL study and make practical demonstration by applying the methods of design of PBL online courses and cases. ThC 8.8 The Research on Building a Global Customer Centered Data Warehouse System, pp. 971-973. Wei Xu China Industrial Bank Li Maoqing Xiamen Univ. Benefits abound for a company that builds and maintains a CRM based data warehouse system correctly. This article will introduce the technical architecture of an e-commerce company’s CRM/Data warehouses project which is able to increase revenue based on delivering the data reporting service to subscriber. These reports will cover a wide variety of individual sales metrics, marketplace comparables, popular searches, and hot categories. The experience in this article allows us to identify successful design practices and develop recommendations for organizations that are interested in deploying a similar system. ThC 9.5 Research on Student Support Model in M-Learning, pp. 991-994. Zhizhen Yang Shanghai Second Polytechnic Univ. Shiming Zhang Shanghai Second Polytechnic Univ. Flying developments of mobile technology bring new opportunities to teaching, people begin to exert themselves to integrate the predominance of mobile technology into curriculums. This paper first discusses the classification of mobile technology and its influences on education domain, then it analyses the learning surrounding of mobile device. Based on it, this paper expounds on the technology selection for mobile device applications. In the end, it explores the student support model in M-learning. ThC 9.4 Technical Analysis of Mobile Learning Application in High Education, pp. 988-990. Gao Kun Guangxi Medical Univ. Liang Zhisheng Guangxi Medical Univ. Ou Xu Guangxi Medical Univ. Under the opportunity of the government greatly promote Education information in China, guide the high education with modern educational philosophy and support it with modern information technology, Mobile learning would inevitably arouse the education sector’s Attention then mobile learning will be an importance complement way to traditional education. However, there are still many difficulties in application mobile learning to high education teaching, only to break through these difficulties can mobile learning integrated into the traditional education better, so that high education more conducive to fostering high-quality personnel. ThC 9.6 The Model of Networked Learning Environment for E-Learning Based on Groupware Technology, pp. 995-998. Yan Jun Xi'an Univ. of Tech. Li Suicheng Xi'an Univ. of Tech. Huang Rui Xi'an Univ. of Tech. E-learning is the model of learning which come along with the increasing popularity of the Internet and the continuous development of the communication technology. On the basis of the brief introduction to the groupware technology and the networked learning environment, this paper bring forward a model of networked learning environment for Elearning which based on groupware technology, and makes detail description to the system’s structure, mainly function module and its characteristic. ThC 9 E-Learning ThC 9.1 Online Experiment Mode of Computer Basic Courses Based on ISM Method, pp. 974-977. Ying Liang Southwest Univ. In this paper, I analyze the factor of Web-based computer basic courses experimental mode, and construct a corresponding online test model , provide the reformation of teaching basic computer experiments with reference of theoretical basis. ThC 9.2 Learning on the Move----A Case Study of Mobile Learning Assisted English Reading Instruction in Chinese Tertiary Education, pp. 978-983. Yu Li Henan Univ. of Finance & Law Ji Li Zhengzhou Normal Univ. The rapid development in information and communication technologies has enabled learners to learn flexibly both in place and time. This paper reports on a case study of mobile learning assisted English reading instruction in Chinese tertiary education, presents results of a questionnaire survey as well as answers of interviews, and discusses some key considerations in the development of mobile learning assisted instruction in China. Finally, some suggestions are proposed to promote mobile learning assisted English reading instruction in a better and faster way. ThC 9.7 Research on Computer Network Experiment Curricular System Based on Network Technologies, pp. 999-1002. Peng Hehuan Tianmu College of Zhejiang A & F Univ. Wang Huiting Tianmu College of Zhejiang A & F Univ. Ma Zeyun Tianmu College of Zhejiang A & F Univ. Application oriented and comprehensive experiment platform shall be established under the guidance of computer network technologies. The paper illustrates the establishment of the courses as well as contents of the computer experiment curricular based on such platform. With experiment courses system, the handson skills and innovation abilities of students will be improved, the quality of computer experiment education will be refined and talents for the development of the society will be cultivated. ThC 9.3 Design and Development Based on PBL Online Course, pp. 984-987. Zhao Yanyan Helongjiang Inst. of Sci. & Tech. ThC 9.8 Oral Business English Network Course Design in Secondary Vocational School, pp. 1003-1005. Huang Xingyun Mech. & Elec. Industry School 65 Ou Qizhong Guangxi Teachers Education Univ. Oral Business English is a required course for Ecommerce major students of secondary vocational school. This paper describes the design of Oral Business English network course of secondary vocational school on the aspects of the general design concept, basic structure, modules design and technology application, to explore the efficient use of the various teaching resources based on websites, the implementation of the network learning, and promote the English teaching in secondary vocational school. With the development of computer and network technology, in the E-learning environment, what efforts will learning styles bring to learing result , has raised concerns among researchers. By classifying the learners according to the Kolb’s learning style inventory, and then tracing their online realtime interaction, this article analyzed the degree of participation, the depth of interaction and the different learning reults of students who belongs to different learning styles. ThC 9.14 Incorporating Social Opinion in Content Selection for an E-Learning Course, pp. 1027-1032. Richa Sharma Univ. of Delhi Hema Banati Univ. of Delhi Punam Bedi Univ. of Delhi Acceptability of an e-learning course is influenced by various factors. Prominent amongst them is identification of appropriate learning content for the course. Such identification is benefited through the inputs from different strata of the society. Gathering and aggregating opinions from various representatives of the society is a complex task. This paper utilizes analytic hierarchy process (AHP) to design content for an online computing course by considering the opinion of various social clusters, viz. academicians, researchers, students, alumni and industry. The preferences of these clusters on various criteria and alternatives are elicited and priority weight vectors are calculated. Appropriate weights are assigned to each of the clusters depending on the target group for which the course is designed. The collective priority vector for the alternatives is obtained by aggregating individual weights using aggregation of individual priorities (AIP) method. The e-learning courses thus designed have higher prospects of receiving approval from the society. ThC 9.9 A Formal Model of Personalized Recommendation Systems in Intelligent Tutoring Systems, pp. 1006-1009. Li Zhiping Yunnan Normal Univ. Sun Yu Yunnan Normal Univ. Xu Tianwei Yunnan Normal Univ. A formal model of a personalized recommendation system in intelligent tutoring systems is presented in this paper. Users’ queries, domain knowledge, user models and teaching knowledge extraction processes are four key factors that support a personalized recommendation system. After introducing the construction of domain knowledge and user models, the formal model of our personalized recommendation system is presented and discussed in detail to show that it is practicable. ThC 9.10 Survey Research on College Students’ English Learning Anxiety in the Computer Network Environment, pp. 1010-1012. Shen Lixia Zhejiang A & F Univeristy Anxiety is one of the important factors that affect the effect in foreign language learning. This survey research on non-English major students has found that students’ anxiety directly affects their learning outcomes in the computer network environment, resolving anxiety is conducive to the improvement of English learning effect. Teachers should constantly perfect computer network environment of teaching mode, give full play to the advantage of the mode to reduce students’ anxiety of English learning and enhance their self-confidence, and help them improve English learning. ThC 9.15 Application of Innovative Technologies on the E-learning System, pp. 1033-1036. Jianxia Chen Hubei Univ. of Tech. Qianqian Li Hubei Univ. of Tech. Cleve Yeo Keng Lin Temasek Polytechnic Singapore Huapeng Chang Temasek Polytechnic Singapore Chunzhi Wang Hubei Univ. of Tech. Many e-learning systems are proposed and used practically due to the rich opportunities provided by the Internet. In particular, technology implementation in a positive learning experience can be one of the strongest influencing factors in stimulating learners’ motivation. From the perspective of positive learning, the paper designed and implemented a new e-learning system, which incorporated three innovative internet technologies into a well-known open e-learning system named Chamilo. The technologies were: easy knowledge search and classification, instant chat system and Ideone online compiler system. The new e-learning system offers richer learning resource and different forms of communication for learners, and particular various programming language practices online. Therefore, the results demonstrate the proposed system improves learning efficiencies in a flexible and advanced way. ThC 9.11 Bulid A Laboratory Cloud for Computer Network Education, pp. 1013-1018. Chenyang Yan Ningbo City College of Vocational Tech. Hands-on practical experience through lab work has long been recognized as an important part of the computer network education. Successful computer network hands-on activities require a full range of related devices with actively maintaining. This paper presents prototype architecture of a Xen-based Networks Laboratory Service Cloud (NLS-Cloud,original CLESP) that can provide an entire computer networks hands-on practical environment with uniformed deployment and management as an online service to learners and instructors. The prototype NLS-Cloud has been investigated by introducing a series of surveys. The instructor survey results showed that the prototype NLS-Cloud exerted a certain positive effect on the hands-on pedagogical activities while the learner survey results indicated that students had a favorable view of the NLS-Cloud and regarded it as a useful learning tool. ThC 9.16 The Research on the Applications of Information Technologies for Distance Education, pp. 1037-1040. Li Yumei Guangxi Economical Management College for Cadres With the development of information technology, distance education has became the trend of learning. How many kinds of broad information technologies can use for distance education? The answerer is three. The applications of information technologies today are so widely and frequently, as an example, here we consider the applications of information technology for Distance Education only. The appropriate applications of information technology can facilitate teaching and learning. And what are the advantage and the limitations of the applications of information technologies for distance education? What are the problems and pitfalls of the applications of information technology? We can find the answer about these questions in this article. ThC 9.12 Development Network Teaching Platform of Digital Image Processing Course Based On J2EE, pp. 1019-1022. Liu Qun Shaoguan Univ. Based on digital, interactive, multimedia computer network teaching platform, which has become an important application of contemporary education means. Digital image processing technology curriculum for teaching the practical requirements of the network was designed and developed based on J2EE architecture, digital image processing technology course online teaching platform, the overall structure and function of each subsystem. ThC 9.13 Emprical Study on Online Interaction Based on Learning Style Differences, pp. 1023-1026. Zhou Jingwei Taishan College ThC 9.17 66 Exploration of a New Approach for Designing Online English Language Learning Materials, pp. 1041-1046. Jie Hu Chongqing Univ. This paper presents the process of using a new approach to design online language learning materials in the context of small scale projects (n=45) within Higher Education in the UK. It starts with the motivation and research aims. Then three general and relevant software design approaches are explored. After it, my own design approach is stated which may be suitable to language learning. Finally, principles of my new approach are disucced. The case exemplifies the strength of producing courseware in a real context in depth. Guan Zhiyan Business College of Shanxi Univ. Coverage and connectivity are the key research questions in wireless sensor networks, the relationship of which is very closely. One of the traditional methods for solving Coverage and connectivity is integer programming algorithm, whose research background is homogeneous wireless sensor networks and single coverage. The method can not satisfy the requirements in actual high-precision target detection. This paper establishes one kind of network model randomly generated and abstract the mathematical structure the from the model. In addition, achieved a lot of simulation experiments, and obtained the relationship between sensor probability and the number of nodes and the probability curve of simply connectivity, reconnectivity. This paper can provide a reference value for the arrangement of the nodes. ThC 10 Networking Technology ThC 10.5 Achieving Operational Efficiency with Cloud Based Services, pp. 1063-1068. Karthik V Bellur National Inst. of Tech. Karnataka Krupal M National Inst. of Tech. Karnataka Praveen Jain National Inst. of Tech. Karnataka Dr.Prakash Raghavendra National Inst. of Tech. Karnataka Cloud Computing is the evolution of a variety of technologies that have come together to alter an organization's approach to building IT infrastructure. It borrows from several computing techniques grid computing, cluster computing, software-as-a-service, utility computing, autonomic computing and many more. It provides a whole new deployment model for enterprise web-applications. The cloud proposes significant cost cuts when compared to using an internal IT infrastructure. The "pay for what you use" model of cloud computing is significantly cheaper for a company than the "pay for everything up front" model of internal IT. Hardware Virtualization is the enabling technology behind many of the cloud infrastructure vendor offerings. Through virtualization, a physical server can be partitioned into any number of virtual servers running their own operating systems, in their allocated memory, CPU and disk footprints. From the perspective of the user or application on the virtual server, no indication exists to suggest that the server is not a real, physical server. In this paper, we make an attempt to enhance dynamic cloud based services using efficient load balancing techniques. We describe various steps involved in developing and utilizing cloud based infrastructure in such a way that cloud based services can be offered to users in an efficient manner. In the design of load balancing algorithms for an application offering cloud based services, the various details described in this paper offer useful insight, while the actual implementation may be based on the exact requirements at hand. ThC 10.1 A Dynamic Frame Partitioning Scheme for IEEE 802.16 Mesh Networks, pp. 1047-1050. Zhengbao Liu Xiamen Univ. Yi Jiang Xiamen Univ. Zhixiong Liu Xiamen Univ. Yuliang Tang Xiamen Univ. The IEEE 802.16 mesh network is a promising next generation wireless backbone network. In the mesh mode, the allocation of minislots is handled by centralized scheduling and distributed scheduling, which are independently exercised. However, the standard does not specify how the frame can be dynamically partitioned among its centralized and distributed schedulers. Through efficient frame partitioning that dynamically adapts the user demand, network can support more user applications. This paper proposes a novel and general dynamic frame partitioning scheme for IEEE 802.16 mesh so that the minislot allocation can be more flexible and the minislot utilization is increased. The scheme predicts efficient partitioning for future frames based on the minislot utilization on current frames by Grey-Markov model. Our study indicates that the dynamic frame partitioning scheme outperform the scheme proposed in the IEEE standard. ThC 10.2 Study on Digital Campus IT Infrastructure Virtualization, pp. 1051-1053. Luo Guowei Guangxi Teachers Education Univ. As Digital Campus applications gaining momentum, the complexity of IT infrastructure on campus network, resource utilization efficiency, security control and data backup impose increased difficulties. In this paper, an analysis is conducted on applications of virtualization technology including virtual server, virtual storage, and network virtualization technology for IT infrastructure to cast down maintenance costs, improve equipment efficiency, simplify IT infrastructure management, and ultimately realize the construction of a digital campus network. ThC 10.6 A Beacon-based Handover Scanning Mechanism with QoS Support in WiMAX FemtoCell Architecture, pp. 1069-1074. Han-Jung Chueh National Chung-Hsing Univ. Fumin Chang Chaoyang Univ. of Tech. Shang-Juh Kao National Chung-Hsing Univ. Deploying FemtoCells in WiMAX network, also called WiMAX FemtoCell architecture, gains a lot of attention due to that FemtoCell is able to provide better indoor services and offloads traffic from the WiMAX network. However, since the signal of WiMAX base station (BS) is stronger than FemtoCell Base Station (fBS), the handover procedure may not be triggered even though fBS is within the BS coverage. Besides, since the coverage of FemtoCell is small, it is possible that a huge number of fBSs are deployed in a WiMAX BS coverage, which causes a large volume of power consumption to scan all indoor fBSs for a handover. In this paper, we propose a beacon-based handover scanning mechanism with Quality of Service (QoS) support. In the proposed mechanism, through the beacon and modified MOB_NBR-ADV messages, a neighbor cell list with QoS parameters is generated automatically at mobile station (MS). The decision criteria for triggering the handover procedure and selecting an appropriate target indoor cell from many candidate fBSs are developed. Through the adoption of the proposed mechanism, the system throughput can be improved and the traffic load through the WiMAX BS can be reduced effectively. A simulation was conducted using QualNet simulator. The simulation results demonstrate that along with the number of FemtoCells increases, both the system ThC 10.3 Reactive Power Optimization of Distribution Network Based on GA with Simulated Annealing Selection, pp. 1054-1057. Zhou Shan Changchun Inst. of Tech. Liu Wenzhou Changchun Inst. of Tech. Cai Changqing Changchun Inst. of Tech. Zhang Li Base of Chinese People's Laberation Army Air Force Aviation Univ. The simulated annealing receiving Metropolis norm as individual replacement policy used for integrated optimization of reactive power of distribution network, establish mathematical models of integrated optimization of reactive power considering comprehensively network loss and minimum voltage deviation in line with the actual distribution network, programming application program, by the evidence of IEEE6 nodes distribution network results, improve the simulated annealing and selection of genetic algorithm so as to meet the basic requirements for distribution network Reactive Power Planning, achieve the optimization of reactive power compensation. ThC 10.4 Research on Multiple Coverage and Connectivity for Wireless Sensor Network, pp. 1058-1062. Wang Jianzhen Business College of Shanxi Univ. 67 throughput and the utilization of FemtoCells increase significantly, as compared with conventional handover mechanisms. IPv6 network than IPv4, IPv6 ISATAP tunnel and IPv6 6to4 tunnel network. ThC 10.7 An Anycast Routing Algorithm Based on Simplified Particle Swarm Optimization and Diversity Strategy, pp. 1075-1079. Taoshen Li Guangxi Univ. Zhigang Zhao Guangxi Univ. To solve anycast routing problem with multiple QoS constraints, a improved anycast routing algorithm based on simplified particle swarm optimization algorithm and diversity strategy is presented. Firstly, the algorithm simplify algorithm’s complexity and improve the convergence velocity extraordinarily by dynamically changing the inertia weight to. Then, a mutation operator is employed to maintain particle’s diversity and balance global and local search effectively. Finally, the validity and efficiency of the presented algorithm are demonstrated by network experiment. The experimental results show that proposed algorithm can better express the advantages of particle swarm optimization algorithm, and can meet the needs of anycast routing with multiple QoS at same time. It has faster convergence speed and can escape from local optimum. ThC 10.11 Performance Evaluation of the IEEE 802.11 MAC for Mobile Wireless Sensor Networks, pp. 1094-1098. Zhong Ping Xiamen Univ. Shi Jianghong Xiamen Univ. Zeng Zhihong Xiamen Univ. Zhang Dezhong Xiamen Univ. Zhou Liping Xiamen Univ. Chen Huihuang Xiamen Univ. With application development of wireless sensor networks, there are some scenarios exited mobile nodes. This motivates the research towards the mobile wireless sensor networks (MWSNs). IEEE 802.11 standard medium access control (MAC) is designed mainly for wireless local and metropolitan area network and used in Mobile Ad-hoc Networks. Its capability whether to suit MWSN has not yet been discovered. This study is to analyze and evaluate the suitability of IEEE 802.11 MAC in MWSN. The simulation is simulated on newly released Network Simulator NS-3. By means of some examples, the results show the energy consumption, delay and packet delivery ratio performance. ThC 10.8 Remote Monitoring of Indoor Environment Using Mobile Robot Based Wireless Sensor Network , pp. 1080-1084. Joshua D Freeman Amrita Univ. Simi S Amrita Univ. Remote environmental monitoring is one of important applications of wireless sensor networking technology where spatially distributed sensor nodes are used to monitor environmental parameters and collaboratively transmit their data though the nerwork. This paper discussed the design of a multi robotic platform within a hybrid wireless sensor network to monitor the environmental changes.The system includes a set of static wireless sensor nodes, a set of mobile robots and a central controller. Mobile robots help to reduce traffic congestions and facilitate close monitoring capabilities. For the effective navigation of the robot, the system uses a known map of the environment, sensor readings and the guidance from the wireless sensor network. The combination of more than one technique for navigation significantly reduces the errors in path planning of the mobile robots. The sensing nodes in the network will forward the accumulated data to the central controller for analysis. The central controller will classify the data based on different threshold levels and records the data. If the system detects an event which exceeds current threshold level, then it will provide an early warning to the authorized users of the system. ThC 10.12 Transient Fingerprint Feature Extraction for WLAN Cards Based on Polynomial Fitting, pp. 1099-1102. Caidan Zhao Xiamen Univ. Lianfen Huang Xiamen Univ. Liting Hu Xiamen Univ. Yan Yao Xiamen Univ. With the rapid development of cognitive radio network (CRN), the information security has become a primary concern. In this paper, transient fingerprinting is incorporated into CRN for detecting Primary User Emulation (PUE) attacks. A novel approach is proposed to extract transient fingerprint feature of transmitters. The energy envelope obtained from the instantaneous signal by spectrogram analysis, is fitted according to the least square estimation. The polynomial coefficients are selected as the feature vectors of instantaneous signal. A data acquisition system is designed to capture IEEE802.11b signals in the 2.4GHz ISM band. The results of data analysis indicate that it greatly improves the performance of detecting different brand of WLAN cards. ThC 11 Software Engineering ThC 11.1 Research on Growth Model Management System of Fruit Tree Based on Modern Information Technology, pp. 1103-1106. Song Jianwei Shijiazhuang Univ. Wu Shuomei Shijiazhuang Univ. Fan Yabin Shijiazhuang Univ. Du Xiaoning China Nuclear Power Engineering Corporation Considering the growth and management of fruit tree, intelligent decision management technology based on modern information technology improves the quality of fruit tree production and meets the needs of modern agriculture, agricultural information technology includes neural networks, ontology, expert system, decision support system etc, and growth model has the function which can predict and manage, the system can regard various parameters of different conditions as input factors, is used to provide pruning, irrigation, fertilization, yield prediction, cultivation and management, model prediction, dynamic control, decision-making and so on, achieve the close combination of theory research and production practice of expert system, and make full use of the advantage of fruit tree growth models and expert system, then provide technical support and management decision services for the management of fruit tree. ThC 10.9 A Research into The Latent Danger of WLAN, pp. 1085-1090. Dongsheng Yin Sun Yat-sen Univ. Kai Cui Sun Yat-sen Univ. Nowadays, WLANs has permeated through our daily lives. In fact, many companies are considering to abandon the wired LAN, because it's old-style and clumsy. People prefer to deploy a more flexible and convenient wireless LAN comparing to the traditional wired one. While people are enjoying the ease and agility brought by WLAN, a grave threat to your WLAN’s security may be lying ahead because of the loopholes of itself. And if this cannot draw public's attention, severe consequences will definitely follow. This study's goal is to arouse people's watchfulness through our research on the security of the WLANs around us. We will thoroughly analyze the latent weakness of WLANs' both encryption modes--WEP and WPA\WPA2, and finally we will propose a series of effective solutions to strengthen your WLAN. ThC 10.10 Research on the IPv6 Performance Analysis Based on Dual-Protocol Stack and Tunnel Transition, pp. 1091-1093. Yingjiao Wu Women & Children's Central Hospital Xiaoqing Zhou Women & Children's Central Hospital Based on the migration mechanism from IPv4 to IPv6, the performance of three kinds of mechanism options, double-stack protocol, ISATAP tunneling and 6to4 tunneling technique are analyzed and tested. The result shows there are some performance advantages on double stack protocol mechanism ThC 11.2 Program Slicing Research Based on MSV in Software Security Field, pp. 1107-1110. Zhonglin Zhang Lanzhoujiaotong Univ. Muyu Lin Lanzhoujiaotong Univ. By proposing a new idea of use of program slicing techniques to determine the independence of the critical safety variables. Mainly 68 to solve the independence of critical security components within a class of critical safety variables be judged is not accurate, complex issues. This idea can intuitive and accurate calculation of the member variable for the category of a variable that is specific criticality safety program slicing statement that through MSV diagram ,which also can analysis of critical variables to achieve the safety purpose of the independence. Services Composition is modeling Web Services Composition by Colored Petri Net, and then using the modeling checking technique to verifying the model. It can find the fault occurring in the process of composing Web Services efficiently. Finally, an example of online shopping is used to explain the idea’s correctness. ThC 11.7 An Aspect-Oriented Extension to MiniJava and Its Implementation, pp. 1131-1135. Xuelian Hu Anhui Univ. Ying Zhang Hefei Univ. of Tech. Aspect-Oriented Programming (AOP) is a new programming paradigm. It is a further development of process oriented, object-oriented method. By introducing the concept of “Aspect”, AOP makes the separation of concerns better, decreases code tangling, solves problems of cross cutting concerns and improves the software quality and efficiency. This paper discusses adding aspect-oriented language facilities into the small object-oriented language MiniJava to get an aspect-oriented programming language “AspectMiniJava” and implementing it by the dynamic weaving technology based on the virtual machine. We use AspectMiniJava language and its compiler in the course of principles of compiler design to further enhance the teaching and practice effect. ThC 11.3 Semantic Web Service Framework Based on Agent and Its Logical Description, pp. 1111-1114. Zou Jinan Putian College Lin Jianbing Putian College Via studying combination of Agent and semantic Web service technique, researching the role of Agent to the architecture of semantic Web service and gives a overall specific realization process, thus paper proposes a framework of semantic Web service based on Agent, and then describes the framework of the Agent's work process and the content of semantic Web services using C&L intend theory. ThC 11.4 CiFeature: A Context-Independent Feature-Oriented Software Development Approach, pp. 1115-1122. Mehran Kavand Payam Noor Univ. Saeed Paarsa Iran Univ. of Sci. & Tech. Ahmad Faraahi Payam Noor Univ. FOSD is the major paradigm in developing SPLs and its main goal is to increase reusability. Most the current FOSD approaches are tool or language dependent, and are not software development context independent. In this paper, we propose a FOSD approach to develop context independent features, called ciFeature. Our method is based on treating features as semi-citizen concepts in the language and using a simple model which could be implemented in any object-oriented language, so that features are decoupled from their contexts. In addition to decoupling of features from tools or languages which are developed them, developing context independent features will result in the features became decouple from the base code, what the refinement approaches suffer from it. Our approach will increase reusability by its flexible composition and configuration mechanism, so that the reusability will be achieved at Feature, Feature Part and the base code levels. Reaching these reusability levels is available thanks to supporting fine-grained and coarse-grained granularity in parallel throughout our approach. Finally developing context independent features will help developers to enjoy FOSD while they don’t have to migrate and adapt to the new languages, language extensions or working using new tools. ThC 11.8 Counterexample Generation and Representation in Model Checking for Probabilistic Timed Automata, pp. 1136-1141. Jianfeng Wu Soochow Univ. Jin Wang Soochow Univ. Mei Rong Jinan Univ. Guangquan Zhang Soochow Univ. Jihan Zhu Soochow Univ. Recently, probabilistic systems have been widely used. People have drawn attention to counterexample generation for probabilistic system model checking. Current works are mainly focusing on the counterexample generation for Markov chains. Probabilistic timed automata (PTA) is the extension of Markov chain with non-determinism and system clocks. This paper focuses on counterexample representation while model checking PTA. Firstly, the semantic of PTA can be regarded as Markov decision process (MDP); secondly, we use adversary to convert MDP into discrete-time Markov chains (DTMCs); thirdly, we convert DTMCs into weighted graph. So, counterexample generation for PTA can be converted into shortest path problem for weighted digraph. Finally, we use regular expressions to represent the counterexample. ThC 11.5 Research on Anti-Interference Algorithm for Web Service Trust Evaluation, pp. 1123-1126. Jianbin Wu Zhejiang Normal Univ. To realize commercial application of web services, its trust and reputation model has been raised into the agenda. And also many researches have been done on web services trust evaluation model. However, in practice there exist a few interferences to influence web service trust evaluation. For example, service providers may improve his own QoS level on purpose or giving vicious evaluation for his competitors. Service providers also may provide fake services or colludes with each other to gain his high profit. Now there are few good methods to deal with it. We put forward two anti-interference algorithms to eliminate vicious evaluation and collusion. The simulation indicates that the algorithms work well on anti-interference for web service trust ev-aluation. ThC 11.9 The Research and Implementation Based on OpenOffice.org Uighur Office Suite Software, pp. 1142-1146. Baoshe Yuan Xinjiang Univ. Wu Shouer Xinjiang Univ. Based on the analysis in OpenOffice.org architecture and researching about software internationalization and localization mechanisms. By adding Software, such as Uighur OpenType font library, Locale identifier, language identifier, ISO code, environment variable, making Uighur Locale environment to the text, preparation of Uighur automatic selection input method, preparation of mixed syllables, auto-homogeneous deformation even, formed a set of input and output support for Uighur OpenOffice.org office Package in the results of a series Customization and Development about Uighur language localization. ThC 11.10 The Research on Collocation Networks of Relation Words In Modern Chinese Language, pp. 1147-1150. Hu Quan Hua Zhong Normal Univ. Jinzhu Hu Hua Zhong Normal Univ. Xie Fang Hubei Univ. of Tech. Complex networks is a new method to research complicated system from the global perspective. The relation words is the important role in complex sentences. This paper uses complex networks to research the relation words in modern Chinese complex sentences. It finds that complex sentences are linked by ThC 11.6 Verifying Web Services Composition Based on LTL and Colored Petri Net, pp. 1127-1130. Jihan Zhu Soochow Univ. Kan Zhang Soochow Univ. Guangquan Zhang Soochow Univ. The main method of model checking based on LTL is constructing a Büchi automata by system model and a Büchi automata equaling with the LTL denied form, and then checking the automata’s acceptive language is empty or not. The idea of verifying Web 69 the relation words’ collocation, so the complex networks which the relations words built is also has the small-world and no-measure characteristics, and it is reflected the relation words’ collocation ability and object. This paper discusses the characteristics and rules of the logic semantic relationship in complex sentences through studing the characteristics of the collocation networks of relation words. interaction of the services, and the issue of existence model checking can be transformed into the problem whether the logic formula is satisfiable or not. ThC 11.15 Modeling Equipment Campaign Based on MASON Platform , pp. 1170-1174. Yuefeng Chen 66393 Units 63963 Units Shunwang Xiao 63963 Units Yefu Wang 63963 Units Zhongyuan Zhang 63963 Units The difficulty of equipment compaign simulating lies in to describe its complexity feature. Owing to this, an agents/space approach was established from ABM, and which construction, theory base, key technology and platform were researched. Furthermore simulating system architecture was constructed on agents/space approach. In this model agent technology was used to model weapon damaging equipment and its damage effect, and the three dimension equipment model was treated as simulating environment, and damage relation was modeled by interaction of agent and space. At last a prototype simulating system of equipment compaign was developed on Mason platform. ThC 11.11 A Library for Parallel Programming with Multi-core Computer, pp. 1151-1153. Qing Li Shanghai Univ. Wu Zhang Shanghai Univ. In this paper, a Multi-Thread Interface (MTI) is developed into a lightweight and easy-to-use class library. This library is based on multi-core processor by means of packaging Windows thread interface functions, with which serial codes can be expanded into parallel ones. In the library, thread-related operations are enveloped into classes in order that programmers can use them more conveniently. MTI constructs for parallelization, restricting control of threads and communication primitives for synchronization. Using this framework, parallel algorithms have been implemented for computing numerical integral and matrix multiplying to prove that MTI reduces the difficulty, such as “programming wall”, brought by multicore system. ThC 11.16 An ANN Verifying Approach to Equipment Compaign Model, pp. 1175-1179. Shunwang Xiao 63963 Units Yuefeng Chen 66393 Units 63963 Units Yuangsheng Dong 63963 Units Feng Liu 63963 Units To any simulating system, only its credibility being confirmed can it take on practical worthiness. When economical and feasibility were concerned, the verifying and validating tactic was put forward to equipment compaign simulation prototype system. Then damage parameter experiment was done under typical condition. Neural network was used to verify error between experiment data and experiential value of damage parameters, the trained neural network was embedded into model. At last system simulating result was validated through real war data and experiment data of real equipment. So a fresh approach on complexity theory was explored to equipment simulating model or analogous problem. ThC 11.12 Demo System of Amplitude Modulation Based on Java, pp. 1154-1158. Zhang Shuiying Zhejiang Sci-Tech Univ. Du Jingjing Zhejiang Sci-Tech Univ. Jin Xuebo Zhejiang Sci-Tech Univ. Yang Runkai Zhejiang Sci-Tech Univ. Demonstration system of amplitude modulation based on JAVA is developed. First, this paper analyzes the principle of amplitude modulation and demodulation. Then, The Architecture of demo system is designed. According to function requirement, we adopt object-oriented method to design and implement the demo system. Finally, we use the button to debug the demo system. The results indicate that the signal wave can change with pressing the button. The demo system has an attractive interface, and is convenient to operate. It also has a good interactivity. This demo system has already been used in educational practice and got a good effect. ThC 11.13 Modeling Aspect-oriented Software Architecture Based on ACME, pp. 1159-1164. Mei Rong Shenzhen Tourism College Changlin Liu Soochow Univ. Guangquan Zhang Soochow Univ. The crosscutting phenomena has been found at architectural level. Using aspects, AOP effectively solves the code tangling problem produced by the crosscutting phenomena at code level. This paper presents an approach to aspect-oriented software architecture design by introducing the concept of aspects into the process of software architecture design. We describe the regular architectural structure with the basic design elements of ACME, and represent the architectural aspects with the proposed extension of ACME. The example of an Online Bookstore System has been used to illustrate our proposal. ThC 11.17 Information Technologies, Organizational Cultures and Knowledge Management, pp. 1180-1185. Shumei Tseng I-Shou Univ. The purpose of this study is to empirically explore the effects of information technologies and organizational cultures in the implementation of knowledge management. Moreover, based on the definition of the five knowledge management gaps, the relationships among knowledge management, information technologies and organizational cultures are analyzed and demonstrated by mean of case studies. The findings reveal that information technologies and organizational cultures play very important roles in determining the magnitudes of these knowledge management gaps. Furthermore, this research discusses how to enhance the effectiveness of implementing knowledge management through appropriate information technologies and organizational cultures. ThC 11.14 A Method for Detecting Mismatch of Time-Aware Web Services Based on SMT, pp. 1165-1169. Xiyan Wang Soochow Univ. Shenbiao Chen Soochow Univ. Guangquan Zhang Soochow Univ. Zhu Jihan Soochow Univ. Jianfeng Wu Soochow Univ. Considering the timed properties between the interactions of Web services, we model the Web services with timed properties formally and propose a method for detecting mismatch of time-aware Web services based on Satisfiability Modulo Theories (SMT) in this paper. The issue of detecting mismatch of Web services can be transformed into the problem of existence model checking whether a deadlock is reachable or not between the ThC 11.18 Liveness Rules from Fairness Based on TLA, pp. 1186-1188. Wan Liang Guizhou Univ. Formal methods use mathematic and logic method to describe and validate the system, TLA (The temporal logic of actions) is for specifying systems, it is brought forward by Leslie Lamport, and it can specify a system’s modeling and property together. Its specifying language is TLA+ and the checking tool is TLC. Liveness property is important property of a system, it is close relation to fairness property. It is in formal a conjunct of the fairness properties of the system properties. Leslie Lamport has put forward several liveness rules. We use a new way to prove the liveness rule from weak fairness and the liveness rule from strong fairness. 70 pressure in measuring holes was smooth; the eccentricity and bearing capacity was basically a linear relationship under a certain condition. The pressure changes in the measuring holes could be used to measure the force of roll collar. The results presented in this paper laid a theoretical basis for design of pneumatic strip shape measuring roll. ThC 11.19 Geometric Identification of Search States on (F~,F)-information, pp. 1189-1193. Yuying Li Ningde Normal Univ. Li Zhang Shangdong Univ. Shiliang Zhang Ningde Normal Univ. Qunsheng Ruan Ningde Normal Univ. ThC 11.23 Study on the Engine Test and Fault Diagnosis System Based on the Information Fusion Technique, pp. 1208-1210. Cheng Wang Huaiyin Inst. of Tech. Shanzhen Xu Huaiyin Inst. of Tech. It analyzed the importance of the four parameters of cylinder pressure, speed, starting rotation speed, starting current, cylinder body temperature for the engine fault diagnosis. It designed the testing and fault diagnosis scheme using AT89c51. According to the testing data and the information fusion evidence reasoning theory, it presented the fault diagnosis method for engine cold start and formed a integration and fusion of intelligent test and fault diagnosis system. Using P-sets, the concepts of ( F , F )-information, ( F , F )search scale and ( F , F )-search circle are proposed. Meanwhile, this paper give the search principle of ( F , F )- information, the sequence theorem of ( F , F )search scale, the internal-outer point theorem of the unit discrete interval on (F~,F)-search scale, and the position theorem of ( F , F )search circle. ( F , F )-search circle is a series of concentric circles. The geometric identification theorem and the identification criterion of the search states on ( F , F )-information are given by ( F , F )-search circle. This paper also provides the application of identifying the search states on ( F , F )-information. The geometric identification of the search ThC 11.24 An Empirical Study on Paying Rate of Basic Pension Insurance based on Probabilistic Voting Model, pp. 1211-1216. Rong Li Beihang Univ. Lin Jian Tsinghua Univ. This thesis employs two OLG Models to analyze the partially funded pension system in China, and proves that the reduction of the population growth rate will lead to the increase of the payment rate. And intergenerational transfer rate between two generations will improve. The ascending of the enterprise payment rate during political-economy equilibrium is determined by the decline of capital output elasticity coefficient and retirement coefficient and the ascending of the political weight of the retirees. Then the thesis concludes that the increase of the social payment rate will diminish the working consumption of labors and improving the retiree consumption. The increase of the social total deposit will reduce the labor’s consumption at the moment. The adding of the proportion in GDP of the total sum of payment is decided by increase of the payment rate of enterprise and the decline of population growth rate. states on ( F , F )-information can enhance the geometry intuitive characteristic of the search states as well as ( F , F )-information size in information systems. The geometric identification of the search states on ( F , F )-information provides a new visualization method for information systems’ search states. ThC 11.20 The Construction and Development of School Practice Base, pp. 1194-1197. Yuan Hongyan Yantai Univ. Liu Jiangxia Yantai Univ. Yu Bo Yantai Univ. Aiming at the current problems of practical teaching in engineering colleges and universities, the paper proposed the concept of establishing school practice base. Take the establishment of engineering training practice base in Yantai University as example, a comprehensive introduction to the practice base of concept, features, content, teaching system and the further construction of the development is presented. Practice shows that construction and application of school practice base is an effective way of solving the existing difficult to practice problems and cultivating students’ practical capability of engineering. ThC 11.25 Reliability Study of Complex Power Systems, pp. 1217-1222. Zhang Ning Xiamen Univ. Lu Yanan Southwest Univ. for Nationalities Ye Tengfei Xiamen Univ. Zheng Siting Xiamen Univ. With the fast development of the power systems, the expanding of the power system is bigger, and users have the higher requirements of the electric quality, so researches and developments in electric power systems analysis has been an area of significant activity for decades. The robustness of a power system is measured by the ability of the system to operate in a state of equilibrium under normal and perturbed conditions. Stability of the power system deals with the study of the behavior of power systems under conditions. The scale of power system is big, so we usually divide it into parts. We can analyze the subsystem through the main features. Among them, the generate electricity systems and the transmission system are very important. In this paper, we make use of differential coefficient to analyze the generator and the transmission factors in power systems. ThC 11.21 Supply Chains Longitudinal Competition-cooperation Games Analysis Based on Reference Chain, pp. 1198-1203. Hu Xianwu City College Wenzhou Univ. The relationship between competition and cooperation in supply chain enterprises is not only affected by the factors inside the chain, but also by the competition chain (reference chain). We choose two-level supply chain in this article, and discuss the four competition and cooperation states of manufacturer and retailer under the same market structure with reference chain, that is, cooperation-cooperation, competition-competition, competition-competition, cooperation-competition, competition-cooperation to establish models and solve. The result of analysis shows that the supply chain utility of cooperation-competition is effective, designing and analyzing the operation mechanism of cooperationcompetition model. When the market profit rate is high, the satisfaction proceeds value of manufacturers is small, the cooperation proceeds distribution mechanism of manufacturer and retailers is easily determined. ThC 12 Teaching Mode ThC 11.22 An Analysis and Simulation on Air Film of a Pneumatic Strip Shape Measuring Roll, pp. 1204-1207. Xiaoming Hu Huaiyin Inst. of Tech. The pressure distribution within pneumatic strip shape measuring roll directly affected its specifications. It presented a finite difference equation of the air film regiona film corresponding to an orifice. An analysis and simulation on film pressure field and the bearing capacity were complted with the principle of Reynolds equation. The results showed that the ThC 12.1 A Study on Profession Ability Structure and Teaching Mode Reform, pp. 1223-1226. Yadong Wang Tianjin Univ. of Tech. & Education Changzeng Wei Tianjin Univ. of Tech. & Education Zhixin Zhou Tianjin Univ. of Tech. & Education The article analyzes the main profession ability of our undergraduates in the circumstance of present social system and employment environment. Aiming at this structure of professional ability, the article gives perspectives of transforming the current 71 teaching modes, and study out the detail teaching mode and structure. The authors hope that we can improve the comprehensive professional ability and employment status of college graduates effectively by education reform. Basics of Computer Applications and promotes some instructive recommendations to address the uneven basic and application ability showed in the process of learning. In practice, the teaching ideas mentioned here acts as an effective role in the enhancement of students’ sense of innovation as well as the manipulative ability of computer application, which has improved the teaching quality and played with good results. ThC 12.2 Constructing Informal Learning Mode Based on Social Software, pp. 1227-1230. Yuan Jiugen Jiangxi Sci. & Tech. Normal Univ. Xing Ruonan Jiangxi Normal Univ. Hu Xiaoqiang Jiangxi Sci. & Tech. Normal Univ. In order to meet learner changes of learning state diversity, informal learning has been gradually entering our field of vision, it becomes a important form of learner’s learning. And social network is a coming Internet revolution, It is particularly important to carry out informal learning with the help of social software. The thesis introduces two basic concept : Social software and informal learning and analyzes the feasibility of informal learning with social software. Finally it concludes four usual informal learning modes: acceptance informal learning, self-directed informal learning, collaborative informal learning and Inquiry informal learning. ThC 12.7 The Design and Application of Geography Experimental Simulation Platform, pp. 1246-1250. Jiang Huixian Fujian Normal Univ. Lin Guangfa Fujian Normal Univ. A teaching method of “virtual” experimental scene based on virtual simulation platform is developed with the aim to solve the existing problems in geographical experimental teaching. The paper discussed some issues on how to build a practice teaching technology system with geographical scene simulation that integrating geographical space information collection, application and simulation. Some examples were given to describe the main construction process of the platform. The application of the platform will provide a new practice teaching pattern in which “experiment---theory sublimation---practice” for geographical experimental teaching research is used to promote students’ abilities on laboratory test and field practice, comprehensive and innovative experiment. ThC 12.3 The Practice of the Student-centered and Teacher-guided Data Structure Teaching Mode, pp. 1231-1234. Yue Chen Zhengzhou Inst. of Info. Sci. & Tech. Jing Cao Zhengzhou Inst. of Info. Sci. & Tech. Qing Dai Zhengzhou Inst. of Info. Sci. & Tech. Chengshi Gao Zhengzhou Inst. of Info. Sci. & Tech. In conventional data structure teaching, the teacher pays more attention to knowledge indoctrination and ignores cultivating students’ ability of solving practical problems. To solve the problem, the new goal of data structure course teaching, including the aspects of knowledge, abilities and qualities, is proposed. And the “student-centered and teacher-guided” data structure teaching mode for achieving the goal is put forward. The transformation of teachers’ and students’ roles in the new model practice is described. ThC 12.8 The Study of New Teaching Method in Dynamic Circuit Response Analysis, pp. 1251-1254. Sheng Guizhen Changchun Inst. of Technolog Cai Changqing Changchun Inst. of Tech. Zhao Yan Univ. of Sci. & Tech. of China The abstract and misunderstanding has been a great handicap in the Circuit Theory teaching process, in particular, the part of Dynamic Circuit Response analysis. In this paper, the introduction of Multisim10 will be provided with teaching practice of the first-order, second-order Dynamic Circuit. The significant meaning of such practice lie in deepening students’ comprehension, enhancing their practice skill, raising the student general analysis ability and innovation ability. ThC 12.4 The Research and Reform Based on CDIO in Data Structure, pp. 1235-1238. Huijuan Qi Shiiazhuang Inst. of Railway Tech. Lina Liu Shiiazhuang Inst. of Railway Tech. Dexiong Li Shiiazhuang Inst. of Railway Tech. Learning from advanced international CDIO engineering education philosophy to solve the problems of traditional "data structure" teaching, we apply CDIO philosophy to "data structure" teaching, and regarding the projects as the carriers, we proposed the specific reform measures in three areas: teaching organization, teaching methods and assessment model. After practicing, we achieved an ideal result. ThC 12.9 An Application-Driven Teaching Model for Series Curriculum, pp. 1255-1259. Min Cao Shanghai Univ. Haiqiang Li Shanghai Univ. Courses for data structures, compiler theories and databases are the most important fundamental specialty courses of computer science. Because of the highly abstract and strong logical characteristics of these series curricula, it is difficult for students to learn and apply them to actual projects. Based on the design and implementation of the information management system for reservoir resettlement compensation, this paper summarizes the problems encountered in the actual development, and proposes some specific solutions. At the same time, it explores and researches the teaching method of these series curricula. A novel application-driven teaching model for series curriculum is proposed. Either the solution of actual project or their application in teaching is effective and feasible. ThC 12.5 Concordance-based Learning and Teaching of Grammar, pp. 1239-1242. Tang Xuemei Anhui Polytechnic Univ. Recent years have witnessed a resurgence of interest in the role of grammar in English language teaching. The present state of grammar teaching in China and the negative effects it causes upon EFL teaching have aroused great attention and consideration. In recent years fresh light has been cast on grammar learning and teaching with the appearance of electronic corpora and concordance. This paper gives a general introduction of concordance-based learning and discusses with examples how to apply it to grammar teaching. Accordingly, concordance-based learning may offer more effective and appropriate pedagogical implications. ThC 12.10 Research of VB Programming Teaching Mode Based on the Core of Computational Thinking Ability Training, pp. 1260-1263. Chunying Zhang Hebei United Univ. Xiao Chen Hebei United Univ. Jianjing Li Hebei United Univ. In this paper, the existing problems and teaching characteristics of VB programming are first analyzed. Then the specific measures to reform the teaching and examination modes are proposed in accordance with the requirements of computational thinking ability training. After that, how to train the students’ “computational thinking” in the VB program curriculum is elaborated on, in the hope of enabling the students to analyze and solve problems and to innovate with computers. ThC 12.6 Teaching Explorations of Basics of Computer Applications, pp. 1243-1245. Zou Quan Xiamen Univ. Li Xubin Xiamen Univ. Lin Chen Xiamen Univ. Our work focuses on the analysis of the course education of the ThC 12.11 72 CDIO in Websit Design Education, pp. 1264-1266. Liu Yang Shijiazhuang Inst. of Railway Tech. Li Xiaonan Shijiazhuang Inst. of Railway Tech. Zheng Hua Shijiazhuang Inst. of Railway Tech. Liu Jia Shijiazhuang Inst. of Railway Tech. Rapid development of higher vocational education, personnel training can not meet the needs of society. Teaching practice the application of CDIO engineering education model, break the routine curriculum model. With professional capacitybuilding in the main line, using the teaching model to project program carrier, it integrated curriculum knowledge and it attention to the quality of students and improve teaching. ThC 12.16 The Construction of the Specialty of Information Management and Information System Based on CDIO Mode, pp. 1282-1285. Ying Hua Suzhou Vocational Univ. Min Xu Suzhou Vocational Univ. CDIO is an innovative mode of higher engineering education at home and abroad in recent years, giving twelve operational standards concerning cultivation of abilities , implementation in all aspects and assessment, which will be a very good reference to the existing education in colleges . This article is guided by the mode of CDIO, discussing the reform in the construction of the specialty of information management and information system from teaching philosophy, teaching objectives, curriculum system, teaching methods and assessment. ThC 12.12 Reforming to Improve the Teaching Quality of Computer Programming Language, pp. 1267-1269. Rongfang Gao Xi'an Shiyou Univ. Training of computer programming ability has aroused increasing attention in the course of Computer Programming Language. This paper analyzed main problems in the subject of computer language course which shows that the major difficulties in teaching the computer languge include obsolete and fragmentary contents of the course, insufficient modularization programming, and little practice training. Then, the reforming teaching mode of thinking, training method and particular steps of the course are proposed. To improve student’s practical ability, the training of programming method and ability of students are emphasized in this paper. Therefore, a better result has been acheaved in the proposed teaching practice. ThC 12.17 Computer Engineering Education Reform Based on CDIO, pp. 1286-1290. Sun Jingdong Southwest Jiaotong Univ. Wang Zhengbin Southwest Jiaotong Univ. Zhang Yan Southwest Jiaotong Univ. Wang Yao Southwest Jiaotong Univ. Through detailed analysis of Conceive, Design, Implement, and Operate (CDIO) engineering education mode, the education of computer engineering is innovated in combining basis theory, personal capability and collaboration of team and environment of society. In view of Capability Maturity Model (CMM), a model of computer engineering education reform Based on CDIO is developed, and the program optimizing method called Prepare, Assess, Summary, and Adjust (PASA) based on CDIO is put forward, furthermore, the basic tasks and demands of the method are also discussed in detail. When the CDIO engineering education model with the project as its carrier is build, the Flexible, Module, and Season (FMS) organization mode of teaching is actively promoted, and the requirements of the project implementation arrangements are met. From the method had been implemented since 2010, the system has got the approval of the teachers and students, which stimulates students’interest, and has a better effect in practice. ThC 12.13 A Teaching Model Based on Schema Theory in Computer Programming Curriculum, pp. 1270-1272. Tiezheng Sun Changchun Univ. of Sci. & Tech. Chunyang Qiu Jilin Univ. of Finance & Economics Jianhua Jiang Jilin Univ. of Finance & Economics Computer Programming Curriculum is a core curriculum for information management and system majors. However, it is hard for information management and system major students to master computer programming technology. To solve this issue, teaching environment and schema theory are discussed in summary firstly, a teaching model based on schema theory is proposed secondly, and a teaching experiment is designed next. The teaching result shows that there is a significant difference in final exam between the proposed model and a regular teaching model. ThC 12.18 Learning Effect for Students with Game-based Learning on Meta-Analysis, pp. 1291-1295. Tsungli Wang Shu-Te Univ. Yafen Tseng Chung Hwa Univ. of Medical Tech. This meta-analysis employs a theoretical framework in quantitatively synthesizing empirical studies that investigate the effects of game-based learning versus classroom instruction on the student learning effect. Analyses of 14 journal papers with 21 studies on 946 students were conducted according to how media were used to support game-based learning. The results indicate that the effect sizes for synchronous game-based learning for the students’ study were consistent and significantly different from zero. The highest effect size is the learning performance (case 1), and the lowest effect size the learning outcome (case 1), although all the studies were the significance. Follow-up analysis of game-based learning findings was framed in terms of some patterns of interaction with the learning effect including learning performance, learning outcome, and knowledge test and so on. ThC 12.14 The Exploration on Task-driving Teaching Mode of Network Security Course Reformation and Construction, pp. 1273-1276. Yu Han Dalian Univ. of Tech. Naigao Jin Dalian Univ. of Tech. Hong Yu Dalian Univ. of Tech. Zhenquan Qin Dalian Univ. of Tech. Analyze the characteristics of network security courses and the use of task-driven teaching practical significance. Discuss the detailes to carry out all aspects of curriculum, including classroom teaching, task-driven experimental procedures, evaluation system of the re-establishment and task-driven implementation of teaching effectiveness. ThC 12.15 Study and Practice on CDIO Innovative Education, pp. 1277-1281. Jiang Fan Guangzhou Univ. Zhang Chunliang Guangzhou Univ. Wang Yijun Guangzhou Univ. Xiao Zhongmin Guangzhou Univ. Innovation education is the core of engineering education, CDIO teaching embodies the innovative education, mainly using the TRIZ innovation theory, to solve the contradictions in knowledge points optimization, reorganization of knowledge point, courses creation, curriculum construction, teaching management in the CDIO teaching. And improving the CDIO curriculum, teaching management and the others is adapted to innovation education, to create an innovative educational environment. TRIZ innovation theory is taught systematically to help students master the innovative methods, to enhance students’ innovating ability. ThC 12.19 A Qualitative Study in Middle School on Information Technology Teaching Model, pp. 1296-1300. Minhua Wu Capital Normal Univ. Weili Peng Capital Normal Univ. With the new course conception of “teacher-oriented, student-centered” proposed, the teaching model has undergone great changes. This study bases on the six teaching video of information technology discipline in the “seminar of information technology in Beijing”, making use of the NVivo, a qualitative analysis software, and discusses all the aspects of teaching model under the new curriculum concept, then proposes individualized teaching model. ThC 12.20 Teaching Method Reform of the Drawing Course by Integrating 73 CDIO Mode, pp. 1301-1302. Lina Yuan Wuyi Univ. Ling Wang Wuyi Univ. In order to meet the demand for a large number of creative engineering talents in industry development under the background of economic globalization, Education Ministry formally started CDIO education model in 2008, and first made experiments on eighteen domestic universities. After exploration in descriptive geometry and mechanical drawing, the content of our course is boldly reformed, which enhances the students’ ability to practise and think, and this reform turns out to be effective. provides a convenient method for the customers to participate the design process. Since all the operations are conducted through internet/intranet, customers, designers and analysts are able to participate the design process at different geographical locations. According to the interface procedure of the model transformation compiled in this paper, the finite element model was successfully transformed from CAD system to CAE system. ThC 13.4 Design of LAN-export Flow Control Strategy Based on Application Layer Channel, pp. 1315-1318. Ni Sheng Guangxi Medical Univ. Tang Zhong Guangxi Medical Univ. Contradiction between the rapid expansion of WAN traffic demand and local area network export-bandwidth force the flow control nodes are deployed to the local area network key links. The article analysis of the traffic needs of network users. From the perspective of the LAN operations, described the principles and objectives of channel flow control that based on application layer the principle, designed fourchannel flow control and a plan of strategy. ThC 13 Web Application ThC 13.1 A Novel Verification Code Technology to Make Your System More Secure, pp. 1303-1306. Dancheng Li Northeastern Univ. Qiang Wei Northeastern Univ. Liu Zhiliang Northeastern Univ. Binsheng Liu Northeastern Univ. Verification code technology is designed to distinguish humans from computers using distorted letters and/or numbers, to protect websites from machine attacking. The current verification code technology faces a problem: too simple to prevent an attacking machine to recognize automatically, or too complex for a human user. It will be hard for us to decide which to choose? This paper proposes a novel method. The verification code will be meaningful and can be simple, and some random meaningful images are also transferred to the client at the same time, people should not only input the verification code, but also need to choose one image whose content has the same meaning with verification code. For example, the verification code is “cat”, and transferred images will contain an image of cat, user should select the cat image so that he/she may pass the validation. Theoretical analysis and simulation experiments illustrate that this method is effective, safe and with low complexity. ThC 13.5 A Web Service QoS Prediction Approach Based on Multi-Dimension QoS, pp. 1319-1322. Lu Li Suzhou Vocational Univ. Mei Rong Jinan Univ. Guangquan Zhang Soochow Univ. With the rapid development of web service, there are a lot of web services to be chosen. Consumers usually choose the suitable web service when they know little about web services. To address this problem, this paper presents a web service QoS prediction approach based on multi-dimension QoS. It normalizes the multi-dimension QoS parameters and maps each dimension QoS parameter into the same interval in order to provide references for consumers to choose the suitable web service. At last, an application example is used to explain this approach. ThC 13.6 On the Formalization of Aggregate Relation Based on Ontology and Its Implement of OWL, pp. 1323-1326. Zhao Bo Yunnan Normal Univ. Duan Chongjiang Yunnan Normal Univ. Zhang Jie Yunnan Normal Univ. In order to represent aggregate relation based on ontology clearly and correctly, the rich semantic properties of aggregate relation in addition to composition and aggregation are elaborated and formalized based on ontology in algebra theory in the paper. However, OWL, as an ontology modeling language, does not provide support for these semantic properties of aggregate relation directly. How to represent such the properties of aggregate relation in OWL is discussed and presented. ThC 13.2 Investigation and Analysis and Optimizing Countermeasures of Current Website Construction of Top Third-class Hospital in Shandong Province, pp. 1307-1310. Song Guojian Jining Medical College Wang Qianfei Jining Medical College Chu Hongrui Jining Medical College By the way of investigating and analyzing the website construction of the eighteen top third-class hospitals in Shandong Province, the overall level of the website construction of the top third-class hospital in the region is revealed, and the deficiencies of the website construction is mainly discussed, and for the construction and optimization of the hospital website suggestions are also put forward. ThC 13.7 Portal-based Design for SaaS System Presentation Layer Configurability, pp. 1327-1330. Dancheng Li Northeastern Univ. Wei Zhang Northeastern Univ. Shuangshuang Zhou Northeastern Univ. Cheng Liu Northeastern Univ. Weipeng Jin Northeastern Univ. SaaS (software as a service) is a new software development mode. It has drawn many IT workers’ attentions. Its core concept is that transform from developing softwares into developing services in the process of software development. And the applied SaaS mode developed system can provide the users with a greater operating space, and it can be more meet the needs of users. In the SaaS application system, the multi-tenants share a single instance can effectively reduce the costs on hardware and maintenance and maximize the scale of SaaS application. Although the single instance architecture implements a true sense of the SaaS architecture, at the same time this architecture results that all of the tenants have to use the same version of user interface. It is quite difficult to meet the personalized needs of tenants and the user experience is rather serious. And the user interface reflects in the presentation layer when we do the web development. Obviously, the problem about the configurability of the ThC 13.3 A Method of CAD/CAE Data Integration Based on XML, pp. 1311-1314. Yi Zhang Chongqing Univ. Li Hua Worcester Polytechnic Inst. In spite of the widespread use of CAD systems for design and CAE systems for analysis, the two processes are not well integrated because CAD and CAE models inherently use different types of geometric models and there currently exists no generic, unified model that allows both design and analysis information to be specified and shared. XML has become the de-facto standard for data representation and exchange on the World-Wide Web. This paper proposes a data integration method based on the XML technique in order to resolve the problem of data transmission for CAD and CAE. Designers parametrically model the bridges through 3D CAD platform. CAE analysts conduct explicit dynamic FEA (Finite Element Analysis) on the designed bridge structure. CAD and CAE functions are accomplished through C/S architecture. An XML and Web Service based DAC (Design-Analysis Connection) is developed to maintain a consistence between CAD model and FEA model. The design is then displayed to the customers through B/S mechanism, which 74 presentation layer in SaaS application is deserved to be researched. In this paper, we focus on the portal technology and related knowledge to format a configurability strategy. Taking use of the strategy to design and implement the user interface configuration in SaaS application system. communication unit adopts processor LPC2134 (ARM7) and SIM300, Monitoring center design plan with JAVA as programming language, and B/S model as well. ThC 13.12 A Mobile Learning System Based on WAP, pp. 1351-1354. Wei Ying Zhejiang Univ. This paper brings up a mobile learning system, which can be used to collaborative learning, learning evaluation, information distribution, resource sharing and so on. This system is developed by using Java ME technology, the Web application server is powered by Tomcat 6.0, and the background database uses SQL Server database. To support the WAP 2.0 protocols, all documents of this system follow the XHTML MP specification. Therefore, the users can access the system by using a wireless communication device which supports the WAP 2.0 protocols. ThC 13.8 The Relationship of Motivation and Self-Regulation in Web - Based Autonomous English Learning, pp. 1331-1334. Haiyan Li North China Electric Power Univ. The objective of this study was to investigate how different motivational components of social cognitive theory relate to students' use of cognitive and metacognitive learning strategies in web- based autonomous English learning (WAEL) . University students (n = 140) completed a survey that assessed their task value and self-efficacy, as well as outcome variables that included their use of three self-regulated learning (SRL) strategies. Pearson correlations indicate that task value and self-efficacy were significant positive predictors of students’ use of various learning strategies. Educational implications and suggestions for future research are discussed. FrA 1 Artificial Intelligence FrA 1.1 Multi-objective Optimization Using Genetic Algorithm:Applications to Imperfect Preventive Maintenance Model, pp. 1355-1360. Chung-Ho Wang National Defense Univ. Sheng-Wang Tsai National Defense Univ. In this study, a multi-objective hybrid genetic algorithm (MOHGA) is proposed to optimize a multi-objective imperfect preventive maintenance (MOIPM) model. The MOHGA proposed not only utilizes a Pareto-based technique to determine and retain the superior chromosomes as the GA chromosome evolutions are performed, but also guides their search direction. In order to obtain diverse non-dominated solutions that approach the optimized Pareto-efficient frontier, the closeness metric and diversity metric are employed to evaluate the superiority of the non-dominated solutions. Accordingly, decision makers can easily determine the most appropriate maintenance alternative to constitute a maintenance strategy from the optimized non-dominated solutions, given the practical requirements of system performance under the constraints of maintenance resources. Furthermore, this study employs response surface methodology via systematic parameter experiments to determine the best search parameter settings in the MOHGA proposed. A simulated case verifies the efficacy and practicality of the MOHGA. ThC 13.9 The Three-dimensional Way to Describe and Build the Complex Web Service Composition System, pp. 1335-1339. Li Dancheng Northeastern Univ. Zhang Ming Northeastern Univ. Liu Cheng Northeastern Univ. Liu Binsheng Northeastern Univ. In this paper, the structure of the complex web service composition relationship and the insufficiency of the conventional web service deployment was discussed, then it introduced a method to describe the complex composition relationships between web services. This material also serves as a guide for readers to build an elastic complex web service deploy platform which can archive real time monitoring and flexible deployment to maximize the service efficiency, security and grantee the system stability. ThC 13.10 Personalized Recommendation Using Implicit Interaction Information, pp. 1340-1345. Liu Nancheng Xianmen Univ. Qingshan Jiang Shenzhen Inst.s of Advanced Tech. Chinese Academy of Sci.s Haishan Chen Xiamen Univ. Beizhan Wang Xiamen Univ. Currently, the information in the internet is becoming explosive. In order to help the users searching the items they are interested in, such as the news or the books, in this paper, we propose an automatic personalized recommendation algorithm by constructing the social graph resting on the users’ implicit interaction information. We at first introduce a metric to measure the users’ affinity based on their implicit interaction information to construct a social graph, and then categorize the users into different clusters within which they will have similar tastes, finally, we use a personalized recommendation algorithm to recommend the items shared in the same cluster to the users. The experiments on a book data set are performed to demonstrate that our proposed method can well generate the recommendations which users will be interested in with high accuracy and efficiency. FrA 1.2 Margin Based Variable Importance for Random Forest, pp. 1361-1366. Yang Fan Xiamen Univ. Li Xuan Xiamen Univ. Zhou Qifeng Xiamen Univ. Luo Linkai Xiamen Univ. Random forest variable importance measure (RF-VIM) has been widely used in many applications such as bioinformatics. The permutation based VIM accesses the variable importance with changes of the OOB accuracy caused by random permutation. In this paper a margin based variable importance measure was proposed, which use the changes in the margin distribution of training samples caused by random permutation to assess the importance of features. Experiments on gene expression data show that the method outperforms both the original RF-VIM and the Gini importance on some datasets. ThC 13.11 Optimization of Remote Monitoring of Cathodic Protection Power Supply System Base on Four-tier Structure and B/S Model, pp. 1346-1350. Liu Ting Wuhan Univ. of Tech. Zhao Xing Wuhan Univ. of Tech. Cathodic power supplies are widely used for corrosion prevention on storage tanks,transmission and distribution pipelines in the gas and petrochemical industry.To improve reliabiliaty of the cathodic protection systems ,a remote monitoring of power supply systems base on four_tier structure and B/S model is developed. This paper presented four tier structure:Acquisition unit control scheme with MSP430F2013 as control chip, Digital control unit control plan with dsPIC33FJ16GS504 as core chip, GPRS FrA 1.3 System-level Modeling and Performance Analysis of IEEE802.11 Wireless Communication Protocol, pp. 1367-1372. Zhangqin Huang Beijing Univ. of Tech. Chunhua Xiao Beijing Univ. of Tech. Zhiqiang Wang Beijing Univ. of Tech. In order to analyze the performance of IEEE 802.11 wireless communication protocol, a performance abstract model of IEEE 802.11 protocol was built base on POOSL language and the performance was analyzed qualitatively and quantificationally in ad hoc network and WLAN with AP. During modeling, the protocol was abstracted rationally. Wireless channel was successfully simulated and the two accessing methods of DCF (basic and RTS/CTS) were simulated accurately. By simulating, the effects of 75 related parameters (the number of STAs, CWmin and frame size) on performance of the protocol (valid throughput, average delay and the fairness of upload and download throughput) were analyzed and got the optimist values of the CWmin. Xin Li Louisiana State Univ. Polygonal meshes are the most popular representation scheme for 3D surfaces in computer graphics. Polygonal meshes usually have topological and/or geometric noises during their scanning and collection steps. Many geometric computing and manipulation operations need to be performed on clean meshes. Therefore, topological noises on polygonal meshes need to be removed in a preprocessing step, which is called topology denoise. We classify a few popular topology denoise technologies and analyze their properties. FrA 1.4 A Vertical Handover Scheme from WMAN to WLAN by Taking into Account the Maximum Available Resource, pp. 1373-1378. Hsiu-Lang Wang National Chung-Hsing Univ. Shang-Juh Kao National Chung-Hsing Univ. In a heterogeneous wireless network environment, the end users are expected to get more bandwidth from WLAN, other than from WMAN, for real time applications. However, adopting traditional Received Signal Strength (RSS) based approach could be inadequate for vertical handover. When WLAN is within the coverage of a WMAN Base Station (BS), an associating Mobile Node (MN) can hardly connect to a WLAN Access Point (AP) due to the default high handover triggering threshold. On the other hand, without knowing the utilization information of scanned APs, once the MN handover to a busy AP by detecting a better signal, it may suffer from bandwidth contention. In this paper, we propose an efficient handover scheme, from WMAN to WLAN, to make use of the received signal to interference and noise ratio and the information about back-haul bandwidth for the criteria to trigger a handover. The time to start a handover is determined by considering the variations of data rate as the MN moves and the most suitable target AP is selected according to its maximum available bandwidth. The simulation results show that the MN consistently has a better throughput with the proposed scheme, as compared with the RSS-based vertical handover scheme. And among all candidates APs, the MN has the minimum packet delay with the selected AP association. FrA 1.8 Detecting Frame Duplication Based on Spatial and Temporal Analyses, pp. 1396-1399. Guoshiang Lin Da-Yeh Univ. Jiefan Chang Da-Yeh Univ. Chenghung Chuang Asia Univ. A passive scheme is developed to achieve frame du-plication detection for videos in the paper. The proposed scheme is a coarse-to-fine approach and composed of candidate clip selection, spatial correlation calculation, and frame duplication classification. To screen duplicated candidates in the temporal domain, the histogram differ-ence of two adjacent frames in RGB color space is adopted. To evaluate the similarity of image content, a block-based algorithm is used to measure spatial correlation of each corresponding frame between the query clip and the candidate one. Based on the spatial and temporal analyses in the temporal and spatial domains, we can localize the duplicated clips. The experimental results show that our scheme can not only detect but also localize duplicated clips well. In addition, the proposed scheme outperforms an existing method in terms of false alarm, missed detection, and accuracy. FrA 1.5 APlag: A Plagiarism Checker for Arabic Texts, pp. 1379-1383. Mohamed El Bachir Menai King Saud Univ. Manar Bagais King Saud Univ. Plagiarism is a serious problem, especially in academia and education. Detecting it is a challenging task, particularly in natural language texts. Many plagiarism detection tools have been developed for diverse natural languages, mainly English. Language-independent tools exist as well, but are considered as too restrictive as they usually do not consider specific language features. In this paper, we introduce APlag, a new plagiarism detection tool for Arabic texts, based on a logical representation of a document as paragraphs, sentences, and words, and new heuristics for text comparison. We describe its main attributes and present the results of some experiments conducted on a dummy test set. We demonstrate its effectiveness by comparing its performance to that of APD, a plagiarism detection tool for Arabic. Overall, preliminary results show that APlag significantly improves the results obtained by APD in terms of recall and precision metrics. FrA 1.9 Design of Representaiton Scheme towards Better Image Search, pp. 1400-1403. Shikui Wei Beijing Jiaotong Univ. Yao Zhao Beijing Jiaotong Univ. Zhenfeng Zhu Beijing Jiaotong Univ. Recently, Bag-of-Words(BoW) model has been widely used for feature representation in multimedia search area due to its simpli?cation and effectiveness. While various variants of BoWmodels have been developed to improve the discriminative cabability, less efforts have been paid on discovering the working mechanism underlying them. In this paper, we systematically investigate the impact of various factors in a quantitive manner, and discover how to improve the image search by jointly optimizing these factors. Subsequently, a rational, which states the rule of factor optimization, is proposed on the basis of the experiments on descriptor matching and used to guide the design of better image search systems. To validate the correctness of the proposed rational, a BoW-based image search system, which consists of image database indexing and searching components, is developed for testing. The comprehensive experiments demonstrate that it is beneficial to employ the proposed rational to develop a better image search system. FrA 1.6 A FPGA Based Digital Design Training Platform, pp. 1384-1389. M.Serdar BASCIL Sakarya Univ. Irfan YAZICI Sakarya Univ. Feyzullah TEMURTAS Bozok Univ. The role of laboratories are very important in engineering education. In this paper FPGA based digital design training platform was designed for Electrical & Electronics Engineering undergraduate students. Training platform interface was created at Visual C# program. The system combines the hardware and software and students access to both software and hardware tools to practice, implement and test their designs in the laboratory environment. The main purpose of the system is to minimize the losing and damaging TTL components used in laboratory environment, to increase the student’s hardware and software abilities and creative senses. FrA 1.10 Robust LMI Based Control of Wheeled Mobile Robots, pp. 1404-1409. A.Dolly Mary National Inst. of Tech., India This paper is concerned with the robust H-infinity (H∞) control of Wheeled Mobile Robots(WMR) by LMI approach. H∞ differs from the classical control approach in that the controller stabilizes the system irrespective of the exogenous inputs (disturbances & noise) affecting the system and the unmodelled dynamics. The H∞ constraints can be expressed as linear matrix inequalities via bounded real lemma. The LMI approach is advantageous over the Riccati equations approach because of a few reasons cited. It is applicable to all plants without restrictions on infinite or pure imaginary invariant zeros. The approach yields a finite dimensional parameterization of all H∞ controllers. In this proposed work the LMI approach towards robust H∞ control is applied to the control of Wheeled Mobile Robots(WMR). WMR is a multi input multi output system which finds applications in tedious tasks like nuclear waste disposal, explorations, mines etc. This approach yields a finite dimensional controller as compared FrA 1.7 A Survey of Topology Denoise Technologies, pp. 1390-1395. Zhang Ning Xiamen Univ. Ye Tengfei Xiamen Univ. Wuyi Yu Xiamen Univ. Maoqing Li Xiamen Univ. 76 to other H∞ control methods. language assessment, for there are several areas where we are still in need of better understanding the computerized language assessment. FrA 1.11 An Efficient Uplink Scheduling Mechanism with enabling Multi-device Transmission and Maximum Latency Fulfillment in IEEE 802.16j Networks, pp. 1410-1415. Fumin Chang Chaoyang Univ. of Tech. I-Ping Hsieh National Chung-Hsing Univ. Shang-Juh Kao National Chung-Hsing Univ. IEEE 802.16j spreads out the coverage of the WiMAX network via extending the signal transmission by using the relay technology. To take the advantage of relaying in IEEE 802.16j network, an efficient schedule with quality of service (QoS) provision for multiple link transmissions is necessary, especially when link interference exists. In this paper, we propose an uplink scheduling mechanism with enabling Multi-device Transmission and Maximum Latency Fulfillment (MT-MLF). In the mechanism of MT-MLF, an interference detection mechanism is first carried out, then a resource distribution algorithm and a dynamic frame adjustment method are developed. Through the adoption of the proposed scheduler, both the uplink resource utilization and the requirement of real time applications can be better enhanced. Two simulation experiments were conducted with different levels of interference. The results demonstrate that under a fixed QoS type of connections, when the total number of connections goes up to 360 and 420 and the maximum latency violation rate approaches 20%, the average uplink transmission rate of MT-MLF can achieve 6.67Mbps and 7.92Mbps, which apparently outperform 4Mbps and 3.91Mbps as compared with regular relay scheduling schemes. FrA 2.3 The Outline Plan of Beijing Open Learning System, pp. 1429-1432. Ma Rong Beijing open Univ. Now, Beijing Radio and Television University (abbreviated as BRTVU) undertakes the task of building and running Beijing Open University. To achieve the goals well, BRTVU has design and developed Beijing Open Learning System. The system provides one-stop services around students and their leaning process. The system pays attention to learning activities, and assures educational quality through the process controlling and evaluation of activity effect. This article describes the system’s building background, design objectives, principles and functions of structures. FrA 2.4 Teaching Data Structures and Software Architecture while Constructing Curriculum Platform, pp. 1433-1437. Min Cao Shanghai Univ. Zhen Cao Shanghai Univ. Data Structures and Software Architecture are two important courses of the subjects allied to computer science. Both of them are abstract and need practical experience to understand well. This paper discusses how to apply the different knowledge to the teaching process of Data Structures and Software Architecture by constructing the curriculum platform, which is a web instructional system. An optimal algorithm for generating authority tree dynamically applied to the developed web system is proposed. The knowledge hidden in the details of the algorithm is applied to the teaching. It is meant to explore a new method of teaching, rich the teaching content, grow the students’ interest of curricula, and improve their ability of practice. FrA 1.12 Topic-special Information Extraction of Online Store, pp. 1416-1420. Zheng Siting Xiamen Univ. Zhang Ning Xiamen Univ. Yang Fan Xiamen Univ. Taobao,witch is the most representive transaction platform in C2C industry in China.It is taken as example ,this paper designed the estracting flow of online store's information automatically,and realized automatic online store's information collection and its structured output by Python language. FrA 2.5 The Design and Implementation of Routing and Switching Platform and Applications in an Experiment Teaching, pp. 1438-1441. Deng Beixing Tsinghua Univ. Xu Shuzhen Tsinghua Univ. In order to meet the needs for the curriculum reform of Electronic Engineering Department of Tsinghua University, we constructed routing and switching experimental platform using the control network technology based on ZTE's switches and three-layer routers. The platform supports the computer network experiment course and practice in open extracurricular for undergraduate. FrA 2 Computer Education FrA 2.1 The Research of Construction of the Diversified Training Mode to Graduate Students, pp. 1421-1424. Wang Chunzhi Hubei Univ. of Tech. Hong Li Hubei Univ. of Tech. Jiang Wei Hubei Univ. of Tech. In order to adapt the gradual diversification, the diversification of training mode to graduate students is formed. Meanwhile, in order to satisfy the need of people’s study and creation in modern society, the education to the graduates is presenting the development tendencies of the internationalization, the diversification, the modernization, and the individuation. FrA 2.6 The Practice and Probe about Training Mode in Master of Engineering of Computer Science, pp. 1442-1444. Shiping Lin Fuzhou Univ. This paper reviews and concludes the result on Fuzhou University how to carries out the innovative training model on the engineering postgraduate students of computer technology from the course of system design and construction, the practice design and implement as well as the model and evaluation about thesis. FrA 2.2 Computer-Assisted Formative Assessment in Language Classrooms: Focus and Forms, pp. 1425-1428. Cheng Ke Beijing Union Univ. Wang Yingwei Beijing Union Univ. Hou Xiaoli Beijing Union Univ. Yang Yajun Beijing Union Univ. In computerized language assessment, formative assessment presently turns out to be one of the major areas of use. The saying paper is intended to give a brief review of certain issues involving application of computer-assisted formative assessment (CAFA) in the field of Language Assessment in terms of (1) historical perspectives embodied in development from computer-assisted assessment (CAA) to computer-assisted language assessment (CALA) then to internet or web-assisted assessment; (2) effectiveness issues in computerized formative assessment in the area of Language E-Assessment; (3) Forms and tools (E-work and E-portfolio) existing for us to employ this innovative approach for FrA 2.7 Higher Learning Institution - Industry Collaboration: A Necessity to Improve Teaching and Learning Process, pp. 1445-1449. Kalaimagal Ramakrishnan Univ. Malaya Norizan Mohd Yasin Univ. Malaya The purpose of this paper is to improve the understanding of Higher Learning Institution and industry collaboration to improve the teaching and learning process. The paper is based upon a quantitative and qualitative study. It is produced after gathering feedback through questionnaires from eighty-three employers throughout Malaysia for the ICT graduates. A group of employers were also interviewed to gather their in-depth view on the importance and benefits of Higher Learning Institution - industry collaboration, the initiatives, techniques and approaches that could be designed to improve the teaching and learning process. Results of the questionnaires and interviewing session with 77 employers illustrate that, with an active engagement with Industry, Higher Learning Institution could increase the efficiency, effectiveness, and quality of graduates whom can satisfy the employers’ need in the entry level of employability in their future. 1460-1462. Yu Zheng Shanghai Univ. Jianquan Dong Shanghai Univ. This paper analyzed the curriculum teaching situation in the database principles of undergraduate education, summarized of a number of issues in the teaching practice. Aimed to solve these problems, and the characteristics of the course, the content of teaching, the perspectives of optimization of teaching contents and reform of teaching methods were discussed. FrA 2.8 Application of Mini Case Study in Computer Networks, pp. 1450-1453. Ganlin Wang Shanghai Ocean Univ. Runyuan Yin Shanghai Ocean Univ. Xiaohua Yuan Shanghai Ocean Univ. For the abstract concepts and complex theories in Computer Networks, this paper introduced a mini case study approach as teaching aids in the course of Computer Networks. A virtual network experiment environment for mini cases was built with the software of VMware, and the cases were analyzed by the Wireshark. The cases of simple network communication and TCP protocol analysis were used to demonstrate the application of the approach. Through integrating the theory and practice, it helps students master the fundamental principles of Computer Networks. FrA 2.11 Research on Teaching Reform of Computer Science and Technology Speciality in General Education, pp. 1463-1467. Shen Yunfu Shanghai Univ. Dong Xiaowen Shanghai Univ. Recently, undergraduate enrollment as a breakthrough of the teaching reform based on the general education is becoming a hot issue. In this paper, under the background of this kind enrollment mode in Shanghai University and the general education of cultivating "comprehensive human development", the curriculum and teaching reform for the specialty of computer science and technology are discussed in detail. We analyze and study the curriculum system, knowledge fields, training objectives, teaching contents, etc, for the first year and later three years based on the general education, and propose some basic principles about curriculum setting and main course lines. Then we propose the implementation and approaches of the training program for undergraduates in this specialty to enable students to adapt to the society and to meet social needs better. FrA 2.9 Screen Education: Contemporary University Students’ Contexts and Problems of Media Literacy, pp. 1454-1459. Wu Zhibin Nanjing Univ. of Aeronautics & Astronautics Jiang Zhaojun Nanjing Univ. of Aeronautics & Astronautics The purpose of this study is to investigate how Chinese university students efficiently understand and utilize the screen media, especially when the mass media have been the basic approach to gaining information for them. In order to give a full understanding of the issue of media literacy education for Chinese college students, three questions are going to be discussed in this article by using the historical analysis method. The first question is why the screen media have become an education problem? Through looking back the evolution of screen media and the development of media literacy education, it is found that media literacy is only one of education problems in a certain context, which is concerned by some countries. The second problem is what the context and the problem of media literacy education for Chinese college students is? Although the contexts and problems of media literacy education are different from each other in British, Canada, America and Japan, the study of media education in these four countries starts from its real context, and based on which some issues about screen education are raised and studied and solutions ar e proposed. The context where China carries out the media literacy education is the public’s general rejection of the secreen media culture arising from the lack of the media literacy education. The third problem is how to respond to theoretically and deal with in practice Chinese current college students’ media literacy edacation? We need frist set up the course of media literacy education in universities as soon as possible, and complete two changes in order to strengthern the theoretical and practice response. One is the change from the traditional concept of education to the inspirational and participatory concept, and the other change is from the education mode of teaching knowledge to the mode of suportive learning. This can promote the college students’healthy development in using screen media, so as to achieve the harmony between the man and screen. FrA 2.12 ABMT-An Automated Support Based Rule Mining Technique , pp. 1468-1473. Ashwin C S Information Technology, India Dinesh Kumar J Information Technology, India Gugan L Information Technology, India Harihar M V Information Technology, India Kousik M Information Technology, India Vijay Krishnan K Information Technology, India Data mining mechanisms have widely been applied in various business and manufacturing companies across many sectors. Data mining is defined as “the nontrivial extraction of implicit, previously unknown, and potentially useful information from data”. Data mining encompasses a number of different technical approaches such as clustering, data summarization, learning classification rules, finding dependency networks, analyzing changes and detecting anomalies. Mining association rules from a large database of business data, such as transaction records forms the area of data mining. It discovers the hidden, interesting relationship between the items in the database based on the support and confidence thresholds. A high-support constraint avoids the combinatorial explosion in discovering frequent item sets, but at the expense of missing interesting patterns of low support. To specify the most appropriate support constraint, either uniform or non-uniform, to discover interesting patterns without suffering from combinatorial explosion and missing some low-support but perceptive rules. In existing system, the specification is derived from frequent 2 item sets. It may miss some interesting rules composed of more than 2 items. In the proposed system, the specification is derived for every level of item sets using cumulative support and CLS. FrA 2.10 Teaching Reform and Practice of Database Principles, pp. 78 Author Index 79 This Page Intentionally Left Blank. 80 A A.Dolly Mary.................................................... FrA 1.10 Abdullah Mansoor........................................... ThC 4.7 Abul L. Haque..................................................ThC 5.57 Ahmad Faraahi................................................ThC 11.4 Aihua Zhang.................................................... ThC 5.33 Ajay Indian.......................................................ThC 5.8 Amin Khodabandeh Amiri................................ThC 5.21 An Shiqi........................................................... MoA 4.2 Anam Zaman...................................................ThC 4.7 Ao Ming........................................................... ThC 7.3 Ashwin C S......................................................FrA 2.12 1404 531 788 1115 691 588 638 83 531 884 1468 B Bao Haitao.......................................................ThC 3.28 .........................................................................ThC 3.29 Baocong Jiao...................................................ThA 1.4 Baoshe Yuan................................................... ThC 11.9 Beizhan Wang................................................. ThC 13.10 Bi Huiying........................................................ ThC 5.51 Bi Tingyan........................................................ThC 5.59 .........................................................................ThC 5.58 Bin Liu..............................................................ThC 3.31 Bing Xue.......................................................... ThC 3.31 Bingjun Li.........................................................ThC 1.21 Binsheng Liu....................................................ThC 13.1 Bo Fu............................................................... ThC 5.16 Bo Jiang...........................................................ThC 4.4 Bo Jinli............................................................. MoA 2.3 Boqin Liu..........................................................ThC 5.12 456 460 180 1142 1340 766 799 794 468 468 273 1303 619 517 32 602 C Cai Changqing.................................................ThC 7.3 ........................................................................ ThC 3.8 ........................................................................ ThC 7.2 ........................................................................ ThC 7.10 ........................................................................ ThC 12.8 ........................................................................ ThC 10.3 Cai Ying...........................................................ThC 5.53 Caidan Zhao....................................................ThC 10.12 Caidong Zhang................................................ThC 8.3 Chakarida Nukoolkit........................................ ThA 1.3 ........................................................................ ThC 1.6 Changlin Liu.................................................... ThC 11.13 Changlong Jiang............................................. ThC 8.3 Changqing Cai.................................................MoA 3.5 ........................................................................ ThC 2.1 Changzeng Wei...............................................ThC 12.1 Charng-Tzer Harn........................................... ThC 5.49 Chen Chen...................................................... MoA 2.1 ........................................................................ ThC 8.1 Chen Hao........................................................ ThC 6.7 Chen Hongwei.................................................ThC 1.13 Chen Huahui................................................... ThC 8.7 Chen Huihuang............................................... ThC 10.11 Chen Lin.......................................................... ThC 1.5 Chen Lina........................................................ ThC 1.4 Chen Xinbo......................................................ThC 8.2 Chen Xiumin....................................................ThC 1.20 Chen Yanjie.....................................................MoA 3.2 Chen Yao........................................................ ThC 5.18 Chen Yaodong................................................ ThC 1.28 Cheng Ke........................................................ FrA 2.2 Cheng Liu........................................................ ThC 13.7 Cheng Wang................................................... ThC 2.7 ........................................................................ ThC 11.23 ........................................................................ ThC 3.23 ........................................................................ ThC 7.11 Chenghung Chuang........................................ FrA 1.8 Chengshi Gao................................................. ThC 12.3 Chengyin Zhang.............................................. ThC 5.1 Chenyang Cui..................................................ThC 2.2 Chenyang Yan.................................................ThC 9.11 Chien-Yun Dai................................................. ThC 5.49 ........................................................................ MoA 6.4 Chu Hongrui.................................................... ThC 13.2 884 375 880 915 1251 1054 772 1099 946 176 205 1159 946 70 310 1223 758 24 938 847 236 965 1094 199 195 942 269 56 627 305 1425 1327 333 1208 437 919 1396 1231 557 313 1013 758 149 1307 Chung-Ho Wang..............................................FrA 1.1 Chunhua Xiao..................................................FrA 1.3 Chunlan Wang.................................................MoA 3.4 ........................................................................ MoA 1.4 Chunlin Wang..................................................ThC 3.10 Chunya Ni........................................................ThC 1.23 Chunyang Qiu................................................. ThC 12.13 Chunying Zhang.............................................. ThC 5.41 ........................................................................ ThC 12.10 Chunyu Liu...................................................... ThC 3.21 Chunzhi Wang.................................................ThC 1.13 ........................................................................ ThC 9.15 Cleve Yeo Keng Lin.........................................ThC 9.15 Cristiana Brunelli............................................. ThC 5.36 1355 1367 66 16 384 281 1270 726 1260 428 236 1033 1033 706 D Dachao Hu...................................................... ThC 3.15 Dalei Song.......................................................ThC 3.31 Dan Guo.......................................................... ThC 5.55 Dan Wei...........................................................ThC 1.9 Dancheng Li.................................................... ThC 13.1 ........................................................................ ThC 13.7 Dandan Yang.................................................. ThC 1.3 Daofeng Zhou..................................................ThC 7.6 Deng Beixing................................................... FrA 2.5 Deng Su.......................................................... ThC 1.4 Deng Yiyuan....................................................ThC 7.1 Dengwen Gan................................................. MoA 1.4 Dexiong Li....................................................... ThC 12.4 Deyun Zhou.....................................................ThC 1.2 Dinesh Kumar J...............................................FrA 2.12 Ding Hui...........................................................ThC 3.1 Dong Xiaowen................................................. FrA 2.11 Dong Yihong....................................................ThC 8.7 Dongsheng Yin................................................ThC 10.9 ........................................................................ ThC 4.10 Dongsong Ban.................................................ThC 4.9 Dr.Prakash Raghavendra................................ThC 10.5 Du Bo.............................................................. ThC 3.8 Du Jingjing.......................................................ThC 11.12 ........................................................................ ThC 3.36 Du Li................................................................ ThC 2.6 Du Xiaoning.....................................................ThC 11.1 Duan Chongjiang.............................................ThC 13.6 402 468 779 218 1303 1327 191 897 1438 195 876 16 1235 189 1468 348 1463 965 1085 547 541 1063 375 1154 492 330 1103 1323 E E.Jeevitha........................................................ThC 4.1 81 504 F Fan Qinman......................................................ThC 3.27 ..........................................................................ThC 3.25 Fan Yabin......................................................... ThC 11.1 Fan Yang.......................................................... ThC 1.5 Fangjie Yu........................................................ ThC 3.31 Fangqi Deng..................................................... MoA 3.4 Farooq Ahmed..................................................ThC 4.7 Feng Hanrong...................................................MoA 1.5 Feng Liu............................................................ThC 11.16 Feng Shu.......................................................... ThC 3.2 Feng Yang........................................................ ThC 5.13 Feyzullah TEMURTAS..................................... FrA 1.6 Floriana Falcinelli............................................. ThC 5.36 Fumin Chang.................................................... ThC 10.6 ..........................................................................FrA 1.11 452 445 1103 199 468 66 531 19 1175 351 605 1384 706 1069 1410 G Ganlin Wang....................................................FrA 2.8 Gao Kun.......................................................... ThC 9.4 Gaurav Agarwal...............................................ThC 5.8 Ge Yan............................................................ ThC 1.23 Ge Yu.............................................................. ThC 5.38 Genchang Zhao...............................................ThC 5.29 Geng Yan........................................................ ThC 1.10 Gu Hao............................................................ ThC 3.35 Guan Xiaohui...................................................ThC 5.25 Guan Zhiyan.................................................... ThC 10.4 Guangquan Zhang...........................................ThC 11.6 .........................................................................ThC 11.8 1450 988 588 281 715 671 222 489 657 1058 1127 1136 .........................................................................ThC 11.13 .........................................................................ThC 11.14 .........................................................................ThC 13.5 .........................................................................ThC 5.35 Guangtian Zhou...............................................ThC 5.13 Guanlin Wang..................................................ThC 7.14 Gugan L...........................................................FrA 2.12 Guofeng Zhu....................................................ThC 2.2 Guoshiang Lin................................................. FrA 1.8 1159 1165 1319 703 605 933 1468 313 1396 H Haiguang Fang................................................ ThA 1.4 Haihe Shi......................................................... ThC 5.19 Hailing Xiong................................................... MoA 5.1 Haiqiang Li.......................................................ThC 12.9 Haishan Chen..................................................ThC 13.10 Haiyan Li..........................................................ThC 13.8 Haiyin Zhang................................................... ThC 6.1 Han Lin............................................................ ThC 5.52 Han Tan...........................................................ThC 5.1 Han Yan...........................................................ThC 2.9 Han Yueping....................................................ThC 2.9 Han-Jung Chueh............................................. ThC 10.6 Hanrong Chen................................................. MoA 5.1 .........................................................................ThC 5.46 .........................................................................ThC 5.28 Harihar M V......................................................FrA 2.12 He Jun............................................................. ThC 3.24 He Qiusheng....................................................ThC 3.26 Hema Banati....................................................ThC 9.14 Hong Yu...........................................................ThC 12.14 Hong Duan...................................................... ThC 6.4 Hong Li............................................................ FrA 2.1 .........................................................................ThC 1.13 Hong Zhuang...................................................ThC 8.6 Hongyun Wang................................................ThA 1.4 Hou Xiaoli........................................................ FrA 2.2 Hou Yunbin......................................................ThC 7.4 Hsinchiu Chang............................................... ThC 2.5 Hsiu-Lang Wang..............................................FrA 1.4 Hu Dongping....................................................ThC 2.8 Hu Hongping....................................................ThC 2.10 Hu Quan.......................................................... ThC 11.10 Hu Ruimin........................................................ThC 6.6 .........................................................................ThC 6.7 Hu Shuzheng...................................................ThC 3.22 Hu Xianwu....................................................... ThC 11.21 Hu Xiaoqiang................................................... ThC 12.2 Hu Yahong.......................................................ThC 5.63 Hu Yu...............................................................MoA 1.3 Huang Chunman............................................. ThC 3.34 Huang Hongbin................................................ThC 1.4 Huang Jun....................................................... MoA 6.6 Huang Lingli.....................................................MoA 6.6 Huang Rui........................................................ThC 9.6 Huang Weimin................................................. MoA 1.3 Huang Xingyun................................................ ThC 9.8 .........................................................................ThC 5.9 Huang Zhigao.................................................. ThC 2.3 .........................................................................ThC 4.2 Huanhuan Xu...................................................ThC 6.12 Huanzhong Li.................................................. ThC 4.9 Huapeng Chang.............................................. ThC 9.15 Hui Xia............................................................. ThC 7.14 Huijuan Qi........................................................ThC 12.4 Huiling Wang................................................... ThC 3.6 Hung Chau Kim............................................... ThC 5.34 Hungpeng Lee................................................. ThC 2.5 180 631 111 1255 1340 1331 821 769 557 340 340 1069 111 748 668 1468 441 449 1027 1273 835 1421 236 960 180 1425 888 324 1373 337 344 1147 843 847 433 1198 1227 815 12 483 195 158 158 995 12 1003 592 316 508 871 541 1033 933 1235 365 697 324 I I-Ping Hsieh.....................................................FrA 1.11 Irfan YAZICI.....................................................FrA 1.6 1410 1384 J Ji Li.................................................................. ThC 9.2 Ji Keyan...........................................................ThC 7.8 Ji Pengwei....................................................... ThC 7.2 Jian Zhou.........................................................ThC 2.2 978 904 880 313 82 Jianan Liang.................................................... ThC 4.10 Jianbin Wu.......................................................ThC 11.5 Jianchang Liu.................................................. MoA 5.4 Jianfeng An..................................................... ThC 5.50 Jianfeng Wu.................................................... ThC 11.8 ........................................................................ ThC 11.14 Jiang Daiyou....................................................ThC 5.61 Jiang Fan.........................................................ThC 3.34 ........................................................................ ThC 12.15 Jiang Huixian...................................................ThC 12.7 Jiang Li............................................................ ThC 5.63 Jiang Wei.........................................................FrA 2.1 Jiang Yu.......................................................... ThC 5.47 Jiang Zhaojun..................................................FrA 2.9 ........................................................................ ThC 5.23 Jiangbo Qian................................................... ThC 8.5 Jiangman Xu................................................... MoA 5.2 ........................................................................ MoA 5.3 Jiangui Wu.......................................................ThC 6.4 Jianguo Ma......................................................ThC 2.4 Jianhong Zhang...............................................ThC 2.1 Jianhua Jiang.................................................. ThC 12.13 Jianjing Li........................................................ ThC 5.41 ........................................................................ ThC 12.10 Jianlian Li........................................................ MoA 3.4 Jianping Li....................................................... ThC 5.48 Jianping Zeng..................................................ThC 7.13 Jianquan Dong................................................ FrA 2.10 Jianxi Fan........................................................ ThC 3.7 Jianxia Chen....................................................ThC 9.15 Jie Deng.......................................................... ThC 5.2 Jie Hu.............................................................. ThC 9.17 Jie Wu............................................................. ThC 1.19 ........................................................................ ThC 1.22 Jiefan Chang................................................... FrA 1.8 Jiexiao Yu........................................................ThC 4.6 Jihan Zhu.........................................................ThC 11.6 ........................................................................ ThC 11.8 Jihong Zhu.......................................................ThC 7.14 Jihua Ye.......................................................... MoA 1.4 ........................................................................ MoA 3.4 Jin Wang......................................................... ThC 11.8 Jin Xuebo........................................................ ThC 11.12 Jing Cao.......................................................... ThC 12.3 Jing Chunfeng................................................. MoA 2.5 Jinghu Pan...................................................... ThC 3.21 Jinjun Hu......................................................... ThC 2.4 Jin-Jung Jang.................................................. MoA 6.4 Jinzhu Hu........................................................ ThC 11.10 Jiquan Yin........................................................ThC 1.15 Jiwen Yang......................................................ThC 3.7 Joshua D Freeman..........................................ThC 10.8 Ju Song........................................................... ThC 6.1 Jun Li...............................................................ThC 5.46 ........................................................................ MoA 5.1 Jun Tong......................................................... ThC 3.9 Jun Zheng....................................................... ThC 8.4 Junling Hu....................................................... ThC 3.15 Junmei He....................................................... ThC 5.12 Junqin Wu....................................................... ThC 2.6 Junshen Chen................................................. MoA 1.2 Junyan Luo......................................................ThC 5.45 Junyong Luo....................................................ThC 1.11 547 1123 126 763 1136 1165 808 483 1277 1246 815 1421 751 1454 649 955 114 120 835 320 310 1270 726 1260 66 755 928 1460 370 1033 562 1041 265 278 1396 525 1127 1136 933 16 66 1136 1154 1231 38 428 320 149 1147 245 370 1080 821 748 111 380 950 402 602 330 6 744 226 K Kai Cui.............................................................ThC 10.9 Kai Li............................................................... ThC 6.8 Kai Tan............................................................ ThC 1.16 Kaihua Liu....................................................... ThC 4.6 ........................................................................ ThC 1.23 Kalaimagal Ramakrishnan.............................. FrA 2.7 Kan Zhang.......................................................ThC 11.6 Karthik V Bellur................................................ThC 10.5 Kehe Cai..........................................................ThC 1.14 Ken Chen........................................................ ThC 5.30 ........................................................................ ThC 5.26 Kousik M..........................................................FrA 2.12 Krupal M.......................................................... ThC 10.5 1085 852 250 525 281 1445 1127 1063 240 675 660 1468 1063 Kun Wu............................................................ThC 6.1 Kun Zhang.......................................................ThC 1.2 Kuowei Lee......................................................ThA 1.1 L Li Cuizhi...........................................................MoA 1.6 Li Dancheng.................................................... ThC 13.9 Li Gengming.................................................... ThC 3.4 Li Hang............................................................ ThC 5.47 Li Hua.............................................................. ThC 13.3 Li Kongwen......................................................ThC 6.9 Li Li..................................................................ThC 4.3 Li Maoqing.......................................................ThC 8.8 Li Ning............................................................. MoA 2.6 Li Ruihong....................................................... ThC 2.9 ........................................................................ ThC 2.10 Li Suicheng......................................................ThC 9.6 Li Suxun.......................................................... ThC 4.11 Li Wang........................................................... ThC 5.60 Li Xiaoli............................................................MoA 2.5 Li Xiaolong.......................................................MoA 3.2 Li Xiaonan....................................................... ThC 12.11 Li Xingnan....................................................... ThC 5.40 Li Xuan............................................................ FrA 1.2 Li Yizhen..........................................................MoA 2.7 ........................................................................ ThC 3.19 Li Yumei.......................................................... ThC 9.16 Li Zhang.......................................................... ThC 11.19 Li Zhiping.........................................................ThC 9.9 ........................................................................ ThC 1.8 Li Zhongming...................................................ThC 6.6 ........................................................................ ThC 6.7 Liang Likai....................................................... ThC 5.27 Liang Tao........................................................ ThC 2.2 Liang Zhisheng................................................ThC 3.5 ........................................................................ ThC 9.4 ........................................................................ ThC 6.2 Liangping Zhang..............................................ThC 3.20 Liao Hao.......................................................... ThC 7.1 Liao Kangli.......................................................ThC 8.7 Lili Zhang.........................................................ThC 3.12 Limin Shao...................................................... ThC 1.16 Lin Dongmei.................................................... MoA 6.3 Lin Guangfa.....................................................ThC 12.7 Lin Jian............................................................ ThC 11.24 Lin Jianbing..................................................... ThC 11.3 Lin Jing............................................................ ThC 5.54 Lin Ling............................................................ThC 3.19 Lin Shan.......................................................... ThC 5.10 Lina Liu............................................................ThC 12.4 Lina Yuan........................................................ ThC 12.20 Ling He............................................................ ThC 3.30 ........................................................................ ThC 1.12 Ling Lin............................................................MoA 2.7 Ling Wang....................................................... ThC 12.20 Ling Xing......................................................... ThC 2.4 Lingbing Tao....................................................ThC 8.6 Linghong Lv.....................................................ThC 8.4 Liping Yin.........................................................ThC 5.64 Lisang Liu........................................................ ThC 1.24 Liting Hu.......................................................... ThC 10.12 Liu Baobin....................................................... ThC 5.11 Liu Bin............................................................. ThC 3.26 Liu Binsheng....................................................ThC 13.9 Liu Cheng........................................................ ThC 13.9 Liu Chengxia................................................... ThC 5.53 Liu Jia.............................................................. ThC 12.11 Liu Jiangxia..................................................... ThC 11.20 Liu Jianye........................................................ ThC 7.9 Liu Li................................................................ThC 5.59 Liu Min.............................................................ThC 7.4 Liu Nancheng.................................................. ThC 13.10 Liu Qun............................................................ThC 9.12 Liu Ting............................................................ThC 13.11 Liu Wenjie........................................................ThA 1.2 Liu Wenzhi.......................................................ThC 5.3 Liu Wenzhou................................................... ThC 10.3 ........................................................................ ThC 7.10 821 189 166 22 1335 358 751 1311 856 512 971 41 340 344 995 552 804 38 56 1264 723 1361 47 420 1037 1189 1006 214 843 847 665 313 361 988 826 425 876 965 391 250 145 1246 1211 1111 776 420 595 1235 1301 464 232 47 1301 320 960 950 817 286 1099 600 449 1335 1335 772 1264 1194 909 799 888 1340 1019 1346 172 568 1054 915 83 ........................................................................ ThC 7.3 Liu Xiaochun....................................................ThC 2.8 Liu Yang.......................................................... ThC 12.11 Liu Yuming...................................................... ThC 5.22 Liu Zhaobin......................................................ThC 5.3 Liu Zhiqin.........................................................ThC 5.62 Lixia Cheng..................................................... ThC 7.13 Lixin Wang.......................................................MoA 3.5 Lizhao Liu........................................................ ThC 1.27 Long Zhou....................................................... ThC 4.4 Lu Gang...........................................................ThC 3.19 Lu Li.................................................................ThC 13.5 Lu Yanan......................................................... ThC 11.25 Lu Zhengyu..................................................... MoA 3.3 Luo Delin......................................................... ThC 1.18 Luo Guowei..................................................... ThC 10.2 Luo Linkai........................................................ FrA 1.2 Lv Jiake........................................................... ThC 3.11 884 337 1264 645 568 811 928 70 297 517 420 1319 1217 61 260 1051 1361 386 M M.Serdar BASCIL............................................ FrA 1.6 Ma Rong.......................................................... FrA 2.3 Ma Zeyun.........................................................ThC 9.7 Manar Bagais.................................................. FrA 1.5 Manting Kao.................................................... ThC 5.49 Maochun Zhou.................................................ThC 8.5 Maoqing Li....................................................... ThC 1.27 .........................................................................FrA 1.7 Maria Banari.................................................... ThC 5.21 Md Tahsin Kabir...............................................ThC 5.57 Mehran Kavand............................................... ThC 11.4 Mei Rong......................................................... ThC 11.13 .........................................................................ThC 13.5 Meijuan Yin......................................................ThC 1.11 Meng Fanrong................................................. ThC 5.5 Mengyi Liu....................................................... ThC 1.14 Miao Kehua..................................................... ThC 1.28 Miao Xiao........................................................ ThC 1.28 Min Cao........................................................... ThC 12.9 .........................................................................FrA 2.4 Min Xu............................................................. ThC 12.16 Ming Hu........................................................... ThC 5.30 Minghai Jiao.................................................... ThC 5.4 .........................................................................ThC 5.44 .........................................................................ThC 5.7 Mingshuang Bi.................................................ThC 7.7 .........................................................................ThC 7.6 Minhua Wu...................................................... ThC 12.19 Mohamed El Bachir Menai.............................. FrA 1.5 Mohammad Tahmid Bari................................. ThC 5.57 Mostafijur Rahman.......................................... ThC 4.5 MR.Meenakshi................................................ ThC 4.1 Muyu Lin.......................................................... ThC 11.2 1384 1429 999 1379 758 955 297 1390 638 788 1115 1159 1319 226 577 240 305 305 1255 1433 1282 675 572 740 584 901 897 1296 1379 788 521 504 1107 N Naidila Sadashiv..............................................ThC 3.33 Naigao Jin....................................................... ThC 12.14 Narges Yousefnezhad.....................................ThC 5.21 Naufal Alee......................................................ThC 4.5 Nhon Do.......................................................... ThC 5.42 Nhon Do Van...................................................ThC 5.34 Ni Sheng..........................................................ThC 13.4 Norizan Mohd Yasin........................................ FrA 2.7 477 1273 638 521 730 697 1315 1445 O Ou Huanghai................................................... MoA 6.1 Ou Qizhong..................................................... ThC 9.8 ........................................................................ ThC 5.9 .........................................................................ThC 5.39 Ou Xu.............................................................. ThC 3.5 .........................................................................ThC 9.4 .........................................................................ThC 6.2 Ou Yang.......................................................... ThC 3.16 136 1003 592 720 361 988 826 406 P Pan Hongbing..................................................ThC 4.3 Peiji Shi............................................................ThC 3.21 Peng Hehuan...................................................ThC 9.7 512 428 999 Peng Luo......................................................... ThC 4.6 Peng Zhang..................................................... ThC 1.15 Ping Yan.......................................................... ThC 5.44 .........................................................................ThC 5.7 Pingliao Zhu.....................................................MoA 1.4 Pornchai Mongkolnam.....................................ThC 1.6 Praewphan Chansripiboon.............................. ThC 1.6 .........................................................................ThA 1.3 Praveen Jain....................................................ThC 10.5 Punam Bedi..................................................... ThC 9.14 525 245 740 584 16 205 205 176 1063 1027 Q Qi Anning.........................................................MoA 4.2 Qi Xinxing........................................................ ThC 5.62 Qi Zhong..........................................................ThC 6.4 Qian Jiangbo................................................... ThC 8.7 Qiang Luo........................................................ ThC 8.6 Qiang Ma......................................................... ThC 2.4 Qiang Wei........................................................ThC 13.1 Qiang Yi...........................................................ThC 5.40 Qianqian Li...................................................... ThC 9.15 Qiaoyun Chen..................................................ThC 5.14 Qin Zhao..........................................................MoA 2.2 Qing Dai...........................................................ThC 12.3 Qing Huang..................................................... ThC 6.11 Qing Li............................................................. ThC 11.11 Qing Ye............................................................ThC 5.4 Qingda Zhou....................................................ThC 1.9 Qingnian Huang.............................................. ThC 5.26 .........................................................................ThC 5.30 Qingqiang Wu..................................................ThC 8.3 Qingshan Jiang................................................ThC 1.9 .........................................................................ThC 13.10 Qiong Cheng................................................... ThC 5.16 Qiu Zhongpan..................................................MoA 5.5 Qiuli Tong........................................................ MoA 4.4 Qiuqi Ruan.......................................................ThC 6.10 Qu Ming........................................................... ThC 3.11 Quan Zou.........................................................ThC 1.5 Quanyou Feng.................................................ThC 4.9 Qunsheng Ruan.............................................. ThC 11.19 83 811 835 965 960 320 1303 723 1033 609 28 1231 866 1151 572 218 660 675 946 218 1340 619 129 95 860 386 199 541 1189 R R. B Ahmad..................................................... ThC 4.5 Ren Ji.............................................................. ThC 1.1 Ren Zhang.......................................................ThC 3.22 Richa Sharma..................................................ThC 9.14 Richard Watson Todd......................................ThC 1.6 Robert M. Randoy........................................... ThC 5.30 .........................................................................ThC 5.26 Rong Jiang...................................................... ThC 5.26 Rong Li............................................................ ThC 11.24 Rongfang Gao................................................. ThC 12.12 Ruan Ruolin.....................................................ThC 6.7 .........................................................................ThC 6.6 Rui Chen..........................................................MoA 4.1 Runyuan Yin.................................................... FrA 2.8 Ruoxi Wang..................................................... ThC 1.13 521 186 433 1027 205 675 660 660 1211 1267 847 843 78 1450 236 S S. S. Iyengar....................................................ThC 6.11 S.M Dilip Kumar...............................................ThC 3.33 Saba Zia.......................................................... ThC 4.7 Saeed Paarsa..................................................ThC 11.4 Satita Sopitsirikul............................................. ThA 1.3 Saurabh Singh.................................................ThC 5.8 Shang-Juh Kao................................................FrA 1.11 .........................................................................ThC 10.6 .........................................................................FrA 1.4 Shanzhen Xu................................................... ThC 3.23 .........................................................................ThC 7.11 .........................................................................ThC 2.7 .........................................................................ThC 11.23 Shao Yongni.................................................... MoA 2.5 Shaobing Song................................................ ThC 5.38 Shaoquan Fang............................................... MoA 4.4 Shen Lixia........................................................ThC 9.10 Shen Meie....................................................... ThC 5.53 866 477 531 1115 176 588 1410 1069 1373 437 919 333 1208 38 715 95 1010 772 84 Shen Yunfu......................................................FrA 2.11 Shenbiao Chen................................................ThC 11.14 Sheng Guizhen................................................ThC 12.8 Shengbing Zhang............................................ ThC 5.50 Sheng-Wang Tsai............................................FrA 1.1 Shi Jianghong..................................................ThC 10.11 Shi Shuyuan.................................................... ThC 3.1 Shi Zhenyin......................................................MoA 3.6 Shihai Zhu....................................................... ThC 5.60 Shikui Wei........................................................FrA 1.9 Shiliang Zhang.................................................ThC 11.19 Shiming Zhang................................................ ThC 9.5 Shiping Lin.......................................................FrA 2.6 Shu Gao.......................................................... ThC 7.12 Shuangshuang Zhou....................................... ThC 13.7 Shumei Tseng................................................. ThC 11.17 Shunwang Xiao............................................... ThC 11.16 .........................................................................ThC 11.15 Shunzhi Zhu.................................................... ThC 3.38 Simi S.............................................................. ThC 10.8 Sina Xu............................................................ ThC 7.7 Song Bingxue.................................................. MoA 3.1 Song Guojian...................................................ThC 13.2 Song Jianwei................................................... ThC 11.1 .........................................................................ThC 1.1 Sufang An........................................................ThA 1.4 Sumayya Shiraz.............................................. ThC 4.7 Sun Bo.............................................................ThC 3.24 Sun Jingdong...................................................ThC 12.17 Sun Yanan.......................................................ThC 5.47 Sun Yu.............................................................ThC 1.8 .........................................................................ThC 9.9 1463 1165 1251 763 1355 1094 348 74 804 1400 1189 991 1442 923 1327 1180 1175 1170 499 1080 901 52 1307 1103 186 180 531 441 1286 751 214 1006 T Tang Guoxiang................................................ ThC 3.11 .........................................................................ThC 5.32 Tang Xuemei................................................... ThC 12.5 Tang Zhong..................................................... ThC 3.5 .........................................................................ThC 13.4 Tangtang Xie................................................... ThC 5.46 .........................................................................MoA 5.1 Tangtang Xie................................................... ThC 5.28 Taoshen Li.......................................................ThC 10.7 Thu_Le Pham.................................................. ThC 5.42 Tian Xia........................................................... ThC 1.7 Tianhua Zhang................................................ ThC 1.27 Tianmao Xu..................................................... ThC 6.1 Tiezheng Sun.................................................. ThC 12.13 Tingting Zhu.....................................................ThC 3.12 Tong Biao........................................................ MoA 6.2 Tong Qiang......................................................ThC 5.27 Tongcheng Huang........................................... ThC 5.64 Tsungli Wang...................................................ThC 12.18 Tzu-Hao Lee....................................................MoA 6.4 386 686 1239 361 1315 748 111 668 1075 730 210 297 821 1270 391 141 665 817 1291 149 V V.K.G. Kalaiselvi..............................................ThC 4.1 Van Ho Long....................................................ThC 5.34 Vijay Krishnan K.............................................. FrA 2.12 504 697 1468 W Wan Liang........................................................ ThC 11.18 Wan-Fei Chen.................................................. ThC 5.49 Wang Chunzhi.................................................. FrA 2.1 Wang Dengcai.................................................. ThC 1.20 Wang Huiting.................................................... ThC 9.7 Wang Jianbo.....................................................ThC 8.2 Wang Jianzhen.................................................ThC 10.4 Wang Jun......................................................... ThC 3.13 ..........................................................................ThC 3.14 Wang Liping......................................................MoA 3.6 Wang Qianfei....................................................ThC 13.2 Wang Rui..........................................................ThC 6.3 ......................................................................... ThC 5.22 Wang Weihong................................................. ThC 5.63 Wang Wenjing.................................................. ThC 1.10 Wang Xiaochi................................................... MoA 4.7 Wang Xiaohui................................................... ThC 3.3 1186 758 1421 269 999 942 1058 395 398 74 1307 830 645 815 222 107 354 Wang Xuan.......................................................ThC 3.11 ..........................................................................ThC 5.32 Wang Yao.........................................................ThC 12.17 Wang Yi............................................................ ThC 7.1 Wang Yijun....................................................... ThC 3.34 ..........................................................................ThC 12.15 Wang Yingwei...................................................FrA 2.2 Wang Yudong...................................................ThC 5.18 Wang Zheng..................................................... ThC 3.22 Wang Zhixiao....................................................ThC 5.5 Wang Zilan....................................................... ThC 5.54 Wang Ziyang.................................................... MoA 3.1 Wei Min.............................................................ThC 5.24 ..........................................................................ThC 5.17 Wei Wang......................................................... ThC 3.37 Wei Xu.............................................................. ThC 8.8 Wei Ying........................................................... ThC 13.12 Wei Yuanyuan.................................................. ThC 5.17 ......................................................................... ThC 5.24 Wei Zhang........................................................ ThC 13.7 Wei Zhou.......................................................... MoA 5.4 Weiguang Shi................................................... ThC 1.23 Weili Peng........................................................ ThC 12.19 Weipeng Jin......................................................ThC 13.7 Weixing Wang.................................................. MoA 5.6 ......................................................................... ThC 3.20 Weiyao Lan.......................................................ThC 6.8 Wengxing Li......................................................ThC 5.50 Wenhua Dou.....................................................ThC 4.9 Wenhua Zeng...................................................MoA 4.1 Wenyuan Chan.................................................ThA 1.1 Wu Yonghai......................................................ThC 3.25 ..........................................................................ThC 3.27 Wu Di................................................................MoA 2.5 Wu Jinqun.........................................................ThC 8.2 Wu Jun............................................................. ThC 3.19 ..........................................................................MoA 2.7 Wu Kehe...........................................................ThC 3.3 Wu Liping..........................................................MoA 1.6 Wu Shouer........................................................ThC 11.9 Wu Shuomei..................................................... ThC 11.1 ..........................................................................ThC 1.1 Wu Wenbo........................................................MoA 6.2 Wu Xuyang....................................................... ThC 1.26 ..........................................................................ThC 1.25 Wu Yajuan........................................................ ThC 5.43 Wu Yue.............................................................ThC 5.56 Wu Zhang......................................................... ThC 11.11 Wu Zhibin......................................................... ThC 5.23 ..........................................................................FrA 2.9 Wuyi Yu............................................................ FrA 1.7 386 686 1286 876 483 1277 1425 627 433 577 776 52 654 623 495 971 1351 623 654 1327 126 281 1296 1327 133 425 852 763 541 78 166 445 452 38 942 420 47 354 22 1142 1103 186 141 293 289 736 783 1151 649 1454 1390 X Xia Youming.................................................... ThC 1.8 Xiafu Peng....................................................... ThC 1.24 Xian Wu........................................................... ThC 3.7 Xiang Deng......................................................ThC 8.3 Xiang Jianghua................................................ThC 3.34 Xianzhe Hua.................................................... ThC 4.8 Xiao Chen........................................................ThC 12.10 .........................................................................ThC 5.41 Xiao Li..............................................................ThC 1.11 Xiao Zhongmin................................................ ThC 12.15 Xiaohua Yuan.................................................. FrA 2.8 214 286 370 946 483 537 1260 726 226 1277 1450 Xiaojing Hu...................................................... ThC 1.27 Xiaojing Shang................................................ ThC 1.16 Xiaoli Zhang.....................................................ThC 7.12 Xiaoming Hu.................................................... ThC 11.22 Xiaonan Liu......................................................ThC 1.11 Xiaoqian Guo...................................................ThC 5.1 Xiaoqing Zhou................................................. ThC 10.10 Xiaoya Fan...................................................... ThC 5.50 Xiaoyan Liu......................................................ThC 5.1 Xie Deti............................................................ ThC 5.32 Xie Fang.......................................................... ThC 11.10 Xie Pan............................................................ ThC 5.54 Xilong Tan....................................................... ThC 3.6 297 250 923 1204 226 557 1091 763 557 686 1147 776 365 85 Xin Li................................................................ThC 6.11 .........................................................................ThC 6.12 .........................................................................FrA 1.7 Xing Ruonan....................................................ThC 12.2 Xinxiao Zhao....................................................MoA 5.3 .........................................................................MoA 5.2 Xiong Zhi......................................................... ThC 7.9 Xiongwei Liu.................................................... ThC 5.48 Xisheng Zhan.................................................. ThC 1.19 Xiufeng Liu.......................................................ThC 5.6 Xiuju Zhan....................................................... ThC 5.6 Xiumin Yu........................................................ ThC 7.7 Xiuxia Lu..........................................................ThC 1.21 Xiyan Wang..................................................... ThC 11.14 Xu Fang........................................................... ThC 7.5 Xu Mingbao..................................................... ThC 4.2 Xu Qiuhua........................................................ThC 5.58 Xu Shuzhen..................................................... FrA 2.5 Xu Tianwei.......................................................ThC 9.9 Xu Xuerong......................................................ThC 3.3 Xu Zhihui......................................................... ThC 1.18 Xu Zhongyu..................................................... ThC 7.1 Xue Ka.............................................................ThC 2.3 Xuefen Lin....................................................... ThC 5.45 Xuejian Yan..................................................... MoA 4.3 Xuelian Hu.......................................................ThC 11.7 Xuemei Chen...................................................ThC 7.6 Xuemin Zhang................................................. ThC 2.1 Xueqiao Wang.................................................ThC 6.10 Xueqing Li........................................................MoA 4.3 .........................................................................MoA 5.3 .........................................................................MoA 5.2 866 871 1390 1227 120 114 909 755 265 580 580 901 273 1165 891 508 794 1438 1006 354 260 876 316 744 88 1131 897 310 860 88 120 114 Y Yabin Yan........................................................ThC 7.13 Yadong Wang..................................................ThC 12.1 Yafen Tseng.................................................... ThC 12.18 Yaguang Ding..................................................ThC 2.2 Yalu Liu........................................................... ThC 1.3 Yan Guohong.................................................. ThC 3.36 Yan Jun........................................................... ThC 9.6 Yan Lingjie.......................................................ThC 4.11 Yan Wang........................................................ThC 3.38 Yan Zhao......................................................... MoA 3.5 Yang Fan.........................................................FrA 1.2 .........................................................................FrA 1.12 Yang Fulong.................................................... MoA 6.3 Yang Gefeng................................................... ThC 6.2 .........................................................................ThC 3.5 Yang Liuqing....................................................MoA 1.3 Yang Quanfa................................................... ThC 3.22 Yang Runkai.................................................... ThC 11.12 Yang Xiaofang................................................. MoA 5.5 Yang Yajun......................................................FrA 2.2 Yang Yanping.................................................. ThC 1.20 Yangmei Zheng............................................... ThC 5.37 Yanhua Li........................................................ ThC 1.21 Yanqing Wang................................................. ThC 5.47 Yanxiang He.................................................... ThC 5.2 Yanyan Huang.................................................ThC 3.30 .........................................................................ThC 1.12 Yao Zhao......................................................... FrA 1.9 Ye Conghuan...................................................ThC 3.18 .........................................................................ThC 3.17 Ye Binqiang..................................................... ThC 7.1 Ye Tengfei....................................................... FrA 1.7 .........................................................................ThC 11.25 Ye Tian............................................................ ThC 5.2 Yefu Wang.......................................................ThC 11.15 Yi Chen............................................................ThC 1.17 Yi Du................................................................ThC 1.7 Yi Jiang............................................................ThC 10.1 Yi Jin................................................................ThC 6.10 Yi Li..................................................................ThC 5.14 Yi Zhang.......................................................... ThC 13.3 Yifang Zhang................................................... MoA 6.5 Yihong Dong....................................................ThC 8.5 Yin Yanshu...................................................... ThC 3.2 928 1223 1291 313 191 492 995 552 499 70 1361 1416 145 826 361 12 433 1154 129 1425 269 710 273 751 562 464 232 1400 416 411 876 1390 1217 562 1170 256 210 1047 860 609 1311 154 955 351 .........................................................................ThC 3.1 Ying Hua..........................................................ThC 12.16 Ying Liang........................................................ThC 9.1 Ying Wang....................................................... ThC 1.27 Ying Zhang...................................................... ThC 11.7 Yingjiao Wu..................................................... ThC 10.10 Yingying Liu..................................................... ThC 3.21 Yin-Tsuo Huang...............................................ThA 1.1 Yizhi Wang...................................................... ThC 6.10 Yong Ouyang...................................................ThC 1.17 Yu Bo...............................................................ThC 11.20 Yu Chen...........................................................ThC 3.9 .........................................................................ThC 1.5 Yu Han.............................................................ThC 12.14 Yu He...............................................................ThC 5.20 Yu Hongtao......................................................MoA 2.3 Yu Jie...............................................................ThC 5.47 Yu Lejun.......................................................... ThC 3.24 Yu Li................................................................ ThC 9.2 Yu Xiao............................................................ MoA 3.2 .........................................................................MoA 2.6 Yu Xiaohong.................................................... ThC 1.1 Yu Zhao........................................................... ThC 3.37 Yu Zhen........................................................... ThC 7.5 Yu Zheng......................................................... FrA 2.10 Yuan Hongyan.................................................ThC 11.20 Yuan Jiugen.....................................................ThC 12.2 Yuan Jun......................................................... MoA 6.1 Yuan Yan.........................................................ThC 6.3 Yuangsheng Dong...........................................ThC 11.16 Yuanhe Zhao................................................... MoA 5.4 Yue Chen.........................................................ThC 12.3 Yuefeng Chen..................................................ThC 11.16 .........................................................................ThC 11.15 Yueqi Zhong.................................................... ThC 6.5 Yu-Hsi Yuan.................................................... ThC 5.49 .........................................................................MoA 6.4 Yuhui Ma......................................................... ThC 1.16 Yuliang Tang................................................... ThC 10.1 Yun Wu............................................................ThC 3.38 Yun Zhang....................................................... ThC 7.7 .........................................................................ThC 7.6 Yunchen Liu.....................................................ThC 3.9 Yunpeng Zhang............................................... ThC 3.9 Yu-Tsang Chen............................................... MoA 6.4 Yuying Li..........................................................ThC 11.19 Yuyu Zhang..................................................... ThC 1.14 .........................................................................ThC 1.15 348 1282 974 297 1131 1091 428 166 860 256 1194 380 199 1273 634 32 751 441 978 56 41 186 495 891 1460 1194 1227 136 830 1175 126 1231 1175 1170 839 758 149 250 1047 499 901 897 380 380 149 1189 240 245 Z Zeng Guangyu.................................................ThC 5.52 Zeng Wenhua..................................................ThC 3.19 Zeng Yi............................................................ ThC 5.15 Zeng Zhihong.................................................. ThC 10.11 Zhang Aihua.................................................... MoA 6.3 Zhang Chunliang............................................. ThC 12.15 Zhang Damin...................................................MoA 3.3 Zhang Dan.......................................................ThC 7.9 Zhang Dezhong...............................................ThC 10.11 Zhang Hui........................................................MoA 4.5 ........................................................................ MoA 1.6 Zhang Jie.........................................................ThC 13.6 Zhang Lanfang................................................ ThC 5.39 Zhang Li.......................................................... ThC 10.3 Zhang Ming..................................................... ThC 13.9 Zhang Nan.......................................................ThC 3.32 Zhang Ning......................................................FrA 1.12 ........................................................................ MoA 2.6 ........................................................................ ThC 4.11 ........................................................................ FrA 1.7 ........................................................................ ThC 11.25 Zhang Ping...................................................... ThC 5.52 Zhang Rong.................................................... ThC 4.3 Zhang Shengwu.............................................. ThC 6.9 Zhang Xiaoli.................................................... MoA 3.3 Zhang Xiaozhou.............................................. ThC 6.9 Zhang Yan.......................................................ThC 12.17 Zhang Ying...................................................... ThC 7.4 769 420 614 1094 145 1277 61 909 1094 99 22 1323 720 1054 1335 472 1416 41 552 1390 1217 769 512 856 61 856 1286 888 Zhang Yinnan.................................................. MoA 4.7 Zhang Yuang...................................................ThC 4.3 Zhang Zhuo..................................................... ThC 7.8 ........................................................................ ThC 7.10 ........................................................................ ThC 7.3 Zhangqin Huang..............................................FrA 1.3 Zhao Bo...........................................................ThC 13.6 Zhao Hongyi.................................................... ThC 5.3 Zhao Kuiling.................................................... MoA 1.1 Zhao Lixiao......................................................ThC 1.18 Zhao Mingfu.................................................... ThC 7.1 Zhao Xing........................................................ ThC 13.11 Zhao Yan.........................................................ThC 5.22 ........................................................................ ThC 6.3 ........................................................................ ThC 12.8 ........................................................................ ThC 3.14 ........................................................................ ThC 3.13 Zhao Yanyan................................................... ThC 9.3 Zhen Cao.........................................................FrA 2.4 Zhenfeng Zhu.................................................. FrA 1.9 Zheng Hua.......................................................ThC 12.11 Zheng Siting.................................................... ThC 11.25 ........................................................................ FrA 1.12 Zheng Xiaoyi................................................... ThC 4.11 Zheng Xin........................................................ MoA 3.6 Zheng Yamin................................................... ThC 5.27 Zheng Yinhuan................................................ ThC 2.3 Zhengbao Liu.................................................. ThC 10.1 Zhengde Zhao................................................. ThC 5.29 Zhenquan Qin..................................................ThC 12.14 Zhi Jiang..........................................................MoA 6.7 Zhigang Zhao.................................................. ThC 10.7 Zhihui Yang..................................................... MoA 4.6 Zhijie Wang..................................................... ThC 8.5 Zhijun Xie........................................................ ThC 8.4 Zhilin Ren........................................................ ThC 5.46 Zhiqiang Wang................................................ FrA 1.3 Zhixin Tie.........................................................ThC 8.6 Zhixin Zhou......................................................ThC 12.1 Zhixiong Liu..................................................... ThC 10.1 Zhizhen Yang.................................................. MoA 4.6 ........................................................................ ThC 9.5 Zhong Ping...................................................... ThC 10.11 Zhongdang Yu.................................................ThC 5.33 Zhonglin Zhang............................................... ThC 11.2 Zhongyuan Zhang........................................... ThC 11.15 Zhou Hanchang...............................................ThC 2.10 Zhou Jingui......................................................ThC 5.40 Zhou Jingwei................................................... ThC 9.13 Zhou Liping..................................................... ThC 10.11 Zhou Minghong............................................... MoA 2.4 Zhou Qifeng.................................................... FrA 1.2 Zhou Shan.......................................................ThC 10.3 Zhou Wei......................................................... ThC 5.11 Zhou Xiaojun................................................... ThC 4.2 Zhou Yuntao....................................................ThA 1.2 Zhou Zhimin.................................................... ThC 5.25 Zhou Zili.......................................................... MoA 1.5 ........................................................................ MoA 2.5 Zhu Jihan........................................................ ThC 11.14 Zhu Meining.................................................... ThC 1.20 Zhu Yuwei....................................................... MoA 4.2 Zhu Zhengwei................................................. ThC 3.35 Zou Jinan........................................................ ThC 11.3 Zou Yuzhuo..................................................... ThC 1.26 86 107 512 904 915 884 1367 1323 568 1 260 876 1346 645 830 1251 398 395 984 1433 1400 1264 1217 1416 552 74 665 316 1047 671 1273 162 1075 102 955 950 748 1367 960 1223 1047 102 991 1094 691 1107 1170 344 723 1023 1094 35 1361 1054 600 508 172 657 19 38 1165 269 83 489 1111 293