ICCSE 2011 The 6th International Conference on Computer Science

advertisement
ICCSE 2011
The 6th International Conference
on Computer Science and Education
August 3-5, 2011. Singapore
Final Program & Book of Abstracts
Organizer
National Research Council of Computer Education in Colleges & Universities,
China
Technical Co-Sponsors
IEEE Control Systems Chapter, Singapore
National University of Singapore, Singapore
Florida International University, USA
Sichuan University, China
INTERNATIONAL CONFERENCE
ON COMPUTER SCIENCE & EDUCATION
(ICCSE)
PAST, PRESENT AND FUTURE
1st ICCSE 2006
The 1st International Conference on Computer Science & Education
July 24-26, 2006. Xiamen, China
http://iccse.xmu.edu.cn/2006/
2nd ICCSE 2007
The 2nd International Conference on Computer Science & Education
July 25-28, 2007. WuHan, China
http://iccse.xmu.edu.cn/2007/
3rd ICCSE 2008
The 3rd International Conference on Computer Science & Education
July 25-28, 2008. Kaifeng, China
http://iccse.xmu.edu.cn/2008/
4th ICCSE 2009
The 4th International Conference on Computer Science & Education
July 25-28, 2009. Nanning, China.
http://iccse.xmu.edu.cn/2009/
5th ICCSE 2010
The 5th International Conference on Computer Science & Education
August 24-27, 2010. Hefei, China.
http://iccse.xmu.edu.cn/2010/
6th ICCSE 2011
The 6th International Conference on Computer Science & Education
August 3-5, 2011. Singapore
http://iccse.xmu.edu.cn
7th ICCSE 2012
The 7th International Conference on Computer Science & Education
July 25-28, 2012. Sydney, Australia.
http://iccse.xmu.edu.cn
Table of Contents
Welcome Message
1
Committees
2
Keynote Addresses
3
Information about Singapore
5
General Conference Information
9
Operation Timetable for Cruise
11
Program-at-a-Glance
13
Technical Program
17
Book of Abstracts
35
Author Index
79
This Page Intentionally Left Blank.
Welcome Message
On behalf of the conference organizing committee, we are happy to present this Final Program and the
Proceedings of the 6th International Conference on Computer Science & Education (ICCSE 2011). Held at the
amazing cruise SuperStar Virgo, August 3–5, 2011, the conference is organized by National Research Council of
Computer Education in Colleges & Universities, China, and technically sponsored by the IEEE Control Systems
Chapter, Singapore, Florida International University, USA, and Sichuan University, China. The conference aims to
create a forum for scientists and practicing engineers throughout the world to present and discuss the most
recent ideas, innovations, trends, experiences, and concerns in the field of computer science and education. The
conference program includes one pre-conference workshop, 16 technical sessions, 2 keynote speeches by
distinguished experts in the fields.
ICCSE 2011 marks another milestone for the conference series, which was originally started in Xiamen, China, in
2006. Since then, ICCSE has sequentially been held in Wuhan, Kaifeng, Nanning and Hefei, respectively.
Participants included many internationally renowned researchers and practicing engineers worldwide. This year,
we have received 889 submissions from 12 countries and regions. With a rigorous review process conducted by
the conference program committee, 341 high quality manuscripts have been accepted for presentation in the
final technical program and for inclusion in the conference proceedings.
Lying almost on the equator, Singapore is a thriving city-state that has overcome its dearth of natural resources
to become one of the juggernaut economies of Asia. In the crowded streets of Chinatown, fortune tellers,
calligraphers and temple worshippers are still a part of everyday life. In Little India, you can buy the best sari
material, freshly ground spices or a picture of your favorite Hindu god. In the small shops of Arab Street, the
voice of the imam can be heard from the nearby Sultan Mosque. Known for its high-tech wizardry, Singapore also
offers a taste of the great Asian culture and provides a rare and unique retreat, full of vibrant action-packed
adventure and opportunities to unwind while focusing on wholesome wellbeing.
We wish to take this opportunity to thank all the members of the organizing committee, and the program
committee for their effort and time. The conference would have not been existent and successful without their
hard work. We are indebted to all the members of our team.
Finally, we would like to particularly thank all our delegates for your interest, contributions and participation in
ICCSE this year. We hope that it will be a rewarding and interesting experience, both technically and nontechnically, to all of you. We look forward to your strong support again in the future ICCSEs.
Wish you all have a great time in Singapore!
Yuan Kaibang and Cheng Xiang
General Chairman
ICCSE 2011
Zhang Fengxiang and Hai Lin
Program Chairmen
ICCSE 2011
1
Li Maoqing and Ben M. Chen
Organization Chairmen
ICCSE 2011
Committees
General Chair
Lin Zongli, University of Virginia, USA
Shen Xiajiong, Henan University, China
Wang Hong, Hubei College of Economics
Weng Yang, Sichuan University, China
Xu Bugong, South China University of Technology,
China
Xie Lihua, Nan yang Technological University,
Singapore
Zhang Xuesong, Southeast Missouri State University,
USA
Zhong Wende, Nanyang Technological University,
Singapore
Zhu Shunzhi, Xiamen University of Technology,
China
Yuan Kaibang, President of National Research
Council of Computer Education in Colleges &
Universities, China
Cheng Xiang, National University of Singapore,
Singapore
Program Chairs
Zhang Fengxiang, Huazhong University of Science
and Technology, China
Hai Lin, National University of Singapore, Singapore
Publication Chair
Organization Chairs
Wang Jianliang, Nanyang Technology University,
Singapore
Xi Bin, Xiamen University, China
Li Maoqing, Xiamen University, China
Ben M. Chen, National University of Singapore,
Singapore
Program Committee
Invites Session Chairs
Ching-Shoei Chiang, Soochow University, Taiwan
Chen Ben M., National University of Singapore
Chen Chong, Fuzhou University, China
Clarence W. de Silva, University of British Columbia,
Canada
Frank Lewis, University of Texas at Arlington, USA
Huang Jie, Chinese University of Hong Kong
Iven Mareels, University of Melbourne, Australia
Jonathan Li, University of Waterloo, Canada
Li Tao, Florida International University, USA
Li Taoshen, Guangxi University, China
Liu Tenghong, Zhongnan University of Economics
and Law, China
Li Xin, Louisiana State University, USA
Luo Bin, Anhui University, China
Li Tao, Florida International University, USA
Weng Yang, Sichuan University, China
Publicity Chairs
Lin Chen, Xiamen University, China
Wang Qing, Tianjin University, China
Wang Ziyang, Beijing Jiaotong University, China
Wei Shikui, Nanyang Technology University,
Singapore
Wei Wei, Norwegian University of Science and
Technology, Norway
Yang Fan, Xiamen University, China
2
Keynote Addresses
Keynote Address I
Impulse Stochastic Control and Composite Markov Processes
Xi-Ren Cao
Prof, Phd, Fellow of IEEE, Fellow of IFAC
Shanghai Jiaotong University
Hong Kong University of Science and Technology
Abstract: Motivated by the portfolio management problem, we propose a composite model for Markov
processes. The state space of a composite Markov process consists of two parts, J and
J in the Euclidean space
n
R . When the process is in, it evolves like a continuous-time Levy process; and once the process enters J, it
makes a jump (with a finite size) instantly according to a transition function like a direct-time Markov chain. The
composite Markov process provides a new model for the impulse stochastic control problem, with the instant
jumps in J modeling the impulse control feature (e.g., selling or buying stocks in the portfolio management
problem). With this model, we show that an optimal policy can be obtained by a direct comparison of the
performance of any two policies.
Prof. Dr. Xi-Ren Cao received the M.S. and Ph.D. degrees from Harvard
University, in 1981 and 1984, respectively. From 1984 to 1986, he was a research
fellow at Harvard University. From 1986 to 1993, he worked as consultant
engineer/engineering manager at Digital Equipment Corporation, Massachusetts,
U.S.A. From 1993 to 2010, he was with the Hong Kong University of Science and
Technology (HKUST), where he served as reader/professor/chair professor.
Since July 2010, he is a chair professor of Shanghai Jiao Tong University and an
affiliate member of the Institute for Advanced Study, Hong Kong University of
Science and Technology.
Dr. Cao owns three patents in data- and tele- communications and published
three books in the area of performance optimization and discrete event dynamic
systems. He is a Fellow of IEEE (1996), a Fellow of IFAC (2008), and is/was the
Chairman of IEEE Fellow Evaluation Committee of IEEE Control System Society,
Editor-in-Chief of Discrete Event Dynamic Systems: Theory and Applications, Associate Editor at Large of IEEE
Transactions of Automatic Control, and Board of Governors of IEEE Control Systems Society and on the Technical
Board of IFAC. His current research areas include and financial engineering, stochastic learning and optimisation,
performance analysis of economic systems, and discrete event dynamic systems.
3
Keynote Address II
A Framework for the Control of Multi-Agent Systems
Jie Huang
Prof, Phd, Fellow of IEEE, Fellow of IFAC, Fellow of CAA
Department of Mechanical and Automation Engineering
The Chinese University of Hong Kong
Abstract: Over the past decade, with the increasing applications of wireless sensor networks, coordination of a
group of mobile robots , autonomous vehicle formation and so on, various cooperative control problems such as
consensus, flocking, and formation of multi-agent systems have attracted intensive attention. In this talk, we will
describe a framework for handling various control problems for a multi-agent system. This framework will be
called the cooperated output regulation problem. The core of this framework includes the establishment of the
concepts of the distributed observer, and the distributed internal model. On one hand, we will show that this
framework will set a stage for solving the asymptotic tracking and disturbance rejection problem in an uncertain
multi-agent system via a distributed control approach. On the other hand, we will show that this framework
contains many control problems of multi-agent systems such as consensus, synchronization, and formation as
special cases, thus leading to a unified solution to several different control problems of multi-agent systems.
Prof. Dr. Jie Huang studied Power Engineering at Fuzhou University from 1977 to
1979 and Circuits and Systems at Nanjing University of Science and Technology
(NUST) from 1979 to 1982. He got his Master's degree from NUST in 1982 and was a
faculty member there from 1982 to 1986. He completed his Ph.D. study in automatic
control at the Johns Hopkins University in 1990 and subsequently held a postdoctoral fellow position there until July 1991. From August 1991 to July 1995, he
worked in industry in USA. In September 1995, he joined the Department of
Mechanical and Automation Engineering, the Chinese University of Hong Kong. He is
now a professor and also the director of Applied Control and Computing Laboratory
there. He served as a Science Advisor to the Leisure and Cultural Services
Department of Hong Kong Special Administrative Region, and Honorary Advisor to
Hong Kong Science Museum. His research interests include control theory and
applications, robotics and automation, neural networks and systems biology, and
guidance and control of flight vehicles. He authored two books and numerous papers.
He received China State Natural Science Award, Class II, in 2010, Croucher Senior Research Fellowship award in
2006, and the best paper award (with Zhiyong Chen) of the Eighth International Conference on Control,
Automation, Robotics, and Vision in 2004. He is IFAC Fellow and IEEE Fellow.
Jie Huang is / was editor, associate editor, guest editor of several journals. He was Distinguished Lecturer of IEEE
Control Systems Society from 2005 to 2008, a member of the Board of Governors of IEEE Control Systems Society
from 2006 to 2007. He served as general chair, program chair in numerous international Conferences.
4
Information about Singapore
Local Information
Singapore is a tropical island country in Asian, it consists of the island itself and other 63 small islands and it is
also a City Country. The country located at the south of Malaysia, adjacent to the Strait of Malacca and there are
Singapore Strait in the south remote with Indonesia across the sea and Johor strait in the north separates with
Malaysia between which links by long dam. With the geographical advantages location, Singapore developed into
one of the most important financial, service and shipping centre. Except the island of Singapore, the relatively
bigger islands are Pulau Tekong, Pulau Ubin and Sentosa Island. Singapore is a City Country and it means the City
of Lion. Ever since 60s, the city are rebuilt and cleaned thus it is also called ‘Graden City’ The climate of Singapore
is tropical climate and it characteristics with Warm humid. Thus, for those who are in favor of sunbath,
swimming, shipping as well as other water sports, Singapore can be called paradise.
Geography
Singapore consists of 63 islands, including the main island, widely known as Singapore Island but also as Pulau
Ujong. There are two man-made connections to Johor, Malaysia: the Johor–Singapore Causeway in the north, and
the Tuas Second Link in the west. Jurong Island, Pulau Tekong, Pulau Ubin and Sentosa are the largest of
Singapore's smaller islands. The highest natural point is Bukit Timah Hill at 166 m (545 ft).
There are ongoing land reclamation projects, which have increased its land area from 581.5 km2 (224.5 sq mi) in
the 1960s to 704 km2 (272 sq mi) today; it may grow by another 100 km2 (40 sq mi) by 2030. Some projects
involve merging smaller islands through land reclamation to form larger, more functional islands, as with Jurong
Island. About 23% of Singapore's land area consists of forest and nature reserves. Urbanisation has eliminated
most primary rainforest, with Bukit Timah Nature Reserve the only significant remaining forest.
Climate
Singapore has a tropical rainforest climate with no distinctive seasons, uniform temperature and pressure, high
humidity, and abundant rainfall. Temperatures usually range from 23 to 33 °C (73 to 91 °F). Relative
humidityaverages around 79% in the morning and 73% in the afternoon. May and June are the hottest months,
with the wetter monsoon season in November and December. From August to October, there is often haze caused
by bush fires in neighboring Indonesia. Singapore does not observe summer time. The length of the day is nearly
constant all year round.
Culture
Racial and religious harmony is regarded by the government as a crucial part of Singapore's success and played a
part in building a Singaporean identity. Due to the many races and cultures in the country, there is no single set
of culturally acceptable behaviours. The country is generally conservative socially but some liberalisation has
occurred. Foreigners also make up 42% of the population and have a strong influence on Singaporean
culture. A.T. Kearney named Singapore the most globalised country in the world in 2006 in its Globalization
Index. The Economist Intelligence Unit in its "Quality-of-Life Index" ranks Singapore as having the best quality of
life in Asia and eleventh overall in the world.
Currency
The local currency in Singapore is the Singapore Dollar (SGD). There are many currency exchange and banking
facilities available at Singapore Changi Airport (SIN) and these include convenient ATM cashpoints, which are
located throughout the airport.
Transportation
Singapore is a major international transportation hub in Asia, positioned on many sea and air trade routes.
The Port of Singapore, managed by port operators PSA International and Jurong Port, was the world's second
busiest port in 2005 in terms of shipping tonnage handled, at 1.15 billion gross tons, and in terms
of containerised traffic, at 23.2 million twenty-foot equivalent units (TEUs). It is also the world's second busiest
in terms of cargo tonnage, coming behind Shanghai with 423 million tons handled. In addition, the port is the
world's busiest for transshipment traffic and the world's biggest ship refuelling centre.
5
Singapore is an aviation hub for the Southeast Asian region and a stopover on the Kangaroo
route between Sydney and London. There are 8 total airports in the country, and Singapore Changi Airport hosts
a network of 80 airlines connecting Singapore to 200 cities in 68 countries. It has been rated one of the best
international airports by international travel magazines, including being rated as the world's best airport for the
first time in 2006 by Skytrax. The national airline is Singapore Airlines.
The island has a road system covering 3,356 kilometres (2,085 mi) which includes 161 kilometres (100 mi) of
expressways. The public road system is served by the many bus services and a number of licensed taxi-operating
companies, and thousands of people use these services everyday. Since 1987, the heavy rail passenger Mass
Rapid Transit (MRT) metro system has been in operation.
Electricity
The standard power supply in Singapore is 220 volt AC with a frequency of 50 Hz. Hotels generally provide wall
sockets accommodating both “straight two-pin plugs,” and “triangular 3-pins plugs” and in bathroom for razors
and hair dryers. The details for power plugs sockets could be found at
http://en.wikipedia.org/wiki/Electric_plug#Type_G . An adapter should be carried yourself, if required.
Telephone
The country code of Singapore is +65. Prepaid mobile phone cards, from MobileOne, SingTel and StarHub, can be
purchased in retail shops with passport.
International roaming service is available in both Singapore and the Cruise, but you should confirm with your
service provider in advance.
Shopping
All kinds of articles right from designer brands, jewelery, fashion accessories and watches to electrical goods
from around the globe are available in Singapore. You only need right information for the right place to shop.
Orchard Road: This place has some biggest malls of Singapore. You can get all the items like stylish clothes,
electronic goods, cosmetics, shoes, furniture or anything you are looking for, at Orchard Road.
VivoCity: This is one of the biggest shopping malls of Singapore. At this place one can find all the major brands
from all across the globe.
Centrepoint: This one is most popular shopping hub in Singapore. There are stores that have special collections of
electronics, furnishings, classical music, optical equipment, fine arts and, of course, casual clothings and so on
The Heeren: An ideal place for music lovers. The biggest superstore HMV is situated in The Heeren. You can also
enjoy some mouth-watering cuisines at this shopping junction.
Bugis Junction: If you are good at bargaining, then this the shopping destination for you.
Little India: A place to find Indian handicrafts and anything that is inspired by Indian culture.
Central Shopping Belt: This place will give you an unforgettable shopping experience.
Chinatown: Here one can find beautifully embroidered kimonos, clothes, jewelery and traditional crafts.
Sim Lim Square: The heaven of electrical and electronic goods, computer softwares and hardware.
Arab Street: Mainly deals in clothes and textiles.
6
Tourism
Sentosa
Sentosa is located in the main island of Singapore, south from downtown 1.5 kilometers of the idyllic holiday
island which has spectacular adventure park museum of natural and historical sites and so on. Sentosa can let
people away from urban cities. People who love seas can enjoy water activities along the beach, while those who
love the natural can enjoy the underwater world, HuJi garden and butterfly garden. In the historical sites, there
are western cable forts, maritime museums and Singapore host museums. In the theme park , existed a 37meter-high merlion tower called the fantasy island, which can let visitors from downtown high-rise buildings
overlook Sentosa and the surrounding landscape around. After nightfall, the music fountain is dancing with the
rhythm of symphony.
Singapore River
Singapore River is the only river in Singapore. She is a river about 4.1 kilometers long, that formed by the rushing
sea and the artificially canal. The merlion statuary standing at sea beach is the symbol of Singapore.
Chinatown
Chinatown Singapore is located in the south of Chinatown. Chinese city was known as “Chinatown”, because the
original inhabitants cleaning with bullock cart. Today, it is the modern shopping center, including kinds of
vendors and old shop. The Fo Ya temple is built by Shifazhao (a famous Buddha) in the November 2002. In
Chinatown, The main hall feed a solemn Buddha, also called “LIFE” or “future Buddha”, who is also services the
public. If you come to Chinatown Maybe the FoYa Temple is a good place for your visiting and blessing.
Merlion Park
According to the ancient classics records, in that time, Singapore is named Temask. In the 14th century, the
legend says that there is an ancient Indonesia prince found the island (Singapore), he saw a magical beast there,
and later he learned that the beast is a lion. In this, the prince named the island “Singapore”. Now, there are more
than one million visitors from all over the world, coming to visit the Merlion Park and taking photos with it.
Singapore Flyer
The wheel diameter of the 42-story Singapore Flyer is reached at 150 meters. The total height of the 42- story
Singapore Flyer is 165 meters. The 28 installed air condition cabin can accommodate 28 passengers separately. It
takes about 30 minutes to rotate. The flyer wheel is located in the center of the south coast. It can not only take a
view of the outside scenery of Singapore downtown, but also can view the Singapore’s straits including Indonesia
Island, which is the busiest shipping settings in the world.
Singapore Zoo
The Singapore Zoo is located in the central of Singapore. It is designed with an open concept, taking the use of the
natural reserve of the central for barriers. So it can allow visitors not to be disturbed with cages and iron column,
and that the visitors can see the scenery clearly. The Singapore Zoo covers 28 hectares. There are 250 kinds of
mammal animals, birds and reptiles. Total volume of the animals is nearly 3000.The Singapore Zoo shows many
endanger animals, including dragon, sleep bear, golden monkeys and the largest heard ape in the world.
The Esplanade
The Esplanade, which is completed in October 2002, being one of the landmarks in Singapore. The appearance of
The Esplanade is peculiar outstanding. It is like two big durians, so a lot of people call it “The Durian Art Center”.
It is composed of 4,590 pieces of glass roof sunshade. It is based on the simulated calculation of Singapore
sunshine environment settings. The flavor of the internal is European theater. The function of it is pluralism,
7
including center hall, theater, shopping centers, restaurants and outdoor performance space, let the eastern and
western art culture bump the most beautiful park.
Mount Faber
Mount Faber is situated in the southern part of Singapore and the total area is extending to 56.46 hectares. More
than 100 meters of flowers in the 1960s ,and it was established in 1994. Mount Faber Park added more
infrastructures after completely renovated and the resort island of sentosa cable station is also here。Looking
around on the mountains, the scenery is very beautiful. We can not only see the city at night amongst the
complex from the mountain but also be intoxicated with the night view and the romantic atmosphere in all
around. If you have time to take up the hill on feet, you can enjoy the beauty of the surroundings.
8
General Conference Information
The 6th International Conference on Computer Science & Education (ICCSE’11) will be held on from August 3 to
5, 2011, in Singapore. The conference is jointly organized by National Research Council of Computer Education in
Colleges & Universities, China and technically sponsored by IEEE Control Systems Chapter, Singapore, National
University of Singapore, Singapore, Florida International University, USA and Sichuan University, China.
Language
The official language of the conference is English.
Registration Fee
Categories
Singapore Dollar
Chinses Yuan
Paper Upload
Attendee
Standard Rate
S$ 500
RMB 2600
1
1
Student Rate
S$ 400
RMB 2000
1
1
The 2nd paper for the
S$ 160
same first author.
RMB 800
1
0
Accompanying Person
S$ 400
RMB 1800
0
1
Over Length Fee
S$ 50 per page
RMB 250 per page
The regular length is 6 pages
including references.
Extra CD-ROM & Book of
S$ 50 per pack
Abstracts
RMB 250 per pack
Each paper registration already
includes one pack.
Banquet Fee
RMB 300 per pax
Include the meals, banquet and
the city tour
S$ 60 per pax
The registration fee covers
+ Delegates:
Name badge * Admission to all sessions * Admission to the exhibition * Conference kit * Opening and Closing
Sessions * All receptions * Meals * Souvenir * Free City Tour
+ Accompanying persons:
Name badge * All reception * Meals * conference dinner and one social/cultural event * City Tour
+ The conference registration fee is nonrefundable, and does not include post-conference travel or
accommodation.
Onsite Registration Hours and Location
Date: 3 August 2011 (Wed)
Time: 10:00 – 17:40
Venue: #2-25/27, Cruise Centre, 1 Maritime Square, Singapore Cruise Centre, Level 2, Singapore
Important notes for VISA
l
Please apply your multiple-entry Singapore VISA, if required.
l
Please apply your Malaysia visa advance for this following Country passport:
Israel, Serbia Montenegro, and Yugoslvia.
9
Airport Pick-up Shuttle Bus
There is a shuttle bus on both Aug 2 (Tuesday) and Aug 3(Wedensday), 2011.
l Stops and Schedule:
(1)Terminal 3 at 16 :20 à (2) Terminal 1 at 16 :30 à (3) Terminal 2 at 16 :40
à(4) Hotel (Aug 2) / Cruise Centre (Aug 3).
l Meeting Points:
Information Counter in each terminal. ICCSE volunteers will stay at these meeting points to collect delegates
in Aug 2 and 3.
l For more information for Changqi Airport, please visit http://www.changiairport.com/.
- For whom miss the shuttle bus
If you miss the shuttle bus or want to go to the Cruise Center yourself, you may
l
By Taxi. The taxi rate from Airport to Cruise Center is 25-35 SGD, in 30 – 40 mins.
l
By MRT (Subway). To get to the city, passengers need to transfer to the west bound train at Tanah
Merah (EW4, Green Line) train station. The last train service leaving Changi Airport station which would
allow a transfer to the last west bound train at Tanah Merah station is scheduled at 11.18pm.
The MRT station for Cruise Center is HarbourFront(NE1, Purple line), and use Exit B to get into Cruise
Center.
l
For more information for MRT, please visit http://www.publictransport.sg
10
Operation Timetable for Cruise
SuperStar Virgo 2-Night Redang Cruise
Operated by Star Cruises, Singapore
Check-in Counter: #2-25/27, Cruise Centre
(1 Maritime Square, Singapore Cruise Centre, Level 2, Singapore 099253)
Date
Time
Program
03/8
Wed.
10:00
Start to register
Delegates could deposit luggage in our registration counter,
then leave for city tour.
16:30
Start to the boat
Delegate came back to registration counter to collect the
luggage then start to the boat.
17:40
Registration counter
closed
18:00
Start the dinner
18:30
Immigration closed
20:00
Depart
07:00
Get up
07:30
08:10
08:30
–
11:30
11:45
–
12:45
13:00
14:00
–
19:00
Breakfast
04/8
Thu
Keynote Speech
Lunch
Remark
All delegates and staffs check in the boat
International buffet at deck 12
Chinese food at deck 6
Buffet at deck 12
At The Lido Room, Deck 7/8.
You can choose Chinese food or Western food
The boat reach Redang Island
Redang Island*
1, Snorkeling, 3-4 hours at $45.00 per pax
(at own expense)
2, Diving, 3 hours at $155.00 per pax
3, Discovery Scuba, 1 hour at $125.00 per pax
Note:
l Meal at own expense
l Limited seat available, need to advance booking.
l If you do not like to go to Redang Island, you can stay on
the boat.
l Please prepare your own swimming suit and sunblock
18:10
20:00
Banquet at Bella Vista
(deck 6)
All delegates and staffs have the dinner together
Dress code: Elegant casual, no shorts or open-toed footwear is
allowed. All garments for gentlemen must come with a collar.
If the delegates do not like to take the Chinese food, he/she still
can choose the western food at same restaurant.
05/8
07:00
Get up
11
Fri
07:30
–
08:10
Breakfast
08:30
–
11:00
11:30
Plenary Panel Session
11:45
–
13:00
13:00
14:00
Lunch
14:30
-
Check your cabin
Disembark
Sentosa Tour
Buffet breakfast at deck 12
At Picture House at deck 8
Max for 80 pax, first come first serve and the door will closes
once venue is filled.
Take your luggage from your cabin
Take your lunch
Check out Immigration
Delegates will be sent to Sentosa Island for free tour.
Note:
□1.A shuttle bus will be scheduled to send delegates to the
conference-recommended hotel, if delegate book the room
in advance, at 21:00 pm.
□2.Delegate also can book his preferred hotel, and arrange
his/her journey freely onward.
□3.Recommended Hotel (at own expense)
Oxford Hotel
218 Queen Street, Singapore 188549
- S$ 150.00 per room per night with breakfast.
Link Hotel
www.linkhotel.com.sg
50 Tiong Bahur Road, Singapore 168733
- S$ 200.00 per room per night with breakfast.
Gallery Hotel www.galerryhotel.com.sg
1 Nanson Road Singapore 238909 @ Robertson Quay
- S$ 230.00 per room per night with breakfast & internet
12
Program at a Glance
13
This Page Intentionally Left Blank.
14
Agenda of ICCSE 2011
l
Pre-Conference Workshop, Taiyuan, China (July 25-27, 2011)
Sunday, July 24
Zhuofan Haojing Hotel, Taiyuan, China
13:00–21:00
Onsite Registration
Lobby
Monday, July 25
l
08:30 - 09:00
Opening Ceremony
09:30 -11:30
Plenary Panel Session (MoA)
14:30 – 18:00
Taiyuan City Tour
Conference, Singapore (August 3-5, 2011)
Wednesday, Aug 3
1 Maritime Square, Singapore Cruise Centre, Level 2, Singapore
10:00–17:40
Onsite Registration; Cruise Check-in.
Counter #2-25/27, Cruise Centre
Thursday Morning, Aug 4
SuperStar Virgo Cruise
08:00–08:20
Opening Ceremony
08:20-08:50
Group Photography
09:10-10:00
Keynote Speech I (ThK1)
The Lido Room, Deck 7/8
The Lido Room, Deck 7/8
Impulse Stochastic Control and Composite Markov Processes
Xi-Ren Cao
Prof, Phd, Fellow of IEEE, Fellow of IFAC
Shanghai Jiaotong University
Hong Kong University of Science and Technology
10:20-11:10
Keynote Speech II (ThK2)
The Lido Room, Deck 7/8
A Framework for the Control of Multi-Agent Systems
Jie Huang
Prof, Phd, Fellow of IEEE, Fellow of IFAC, Fellow of CAA
Department of Mechanical and Automation Engineering
The Chinese University of Hong Kong
10:20-11:10
Invited Speeches (ThA)
12:00-13:30
The Lido Room, Deck 7/8
Luncheon
Thursday Afternoon, Aug 4
Redang Tour
18:30-19:30
Banquet (ThB)
15
Bella Vista (deck 6)
19:30 – 22:00
Free Talk Session (ThC)
Bella Vista (deck 6)
Track/Region
1
2
3
4
Topic
ThC1
Artificial Intelligence II
ThC2
Computer Education V
ThC3
Computer Education
VI
ThC4
Web-based Education
Mode
Track/Region
5
6
7
8
Topic
ThC5
Web Application
ThC6
Communication &
Networking II
ThC7
Computer Application
III
ThC8
Control Technology
Track/Region
9
10
11
12
Topic
ThC9
Computer Application
IV
ThC10
Communication &
Networking III
ThC11
Computer Education
VII
ThC12
Wireless Mesh
Network
Track/Region
13
14
15
Topic
ThC13
Computer Application
IV
ThC14
Database & Systems
Engineering II
ThC15
Computer Education
VII
Friday Morning, Aug 5
Parallel Sessions (FrA)
Track
1
2
FrA
08:30-10:30
FrA1
Computer Education
FrA2
Computer Education II
12:30-13:30
Picture House (deck 8)
Luncheon
Friday Afternoon, Aug 5
Sentosa, Singapore
A shuttle bus will be scheduled to send delegates to the conference-recommended hotel at 21:00 pm.
16
Technical Program
17
This Page Intentionally Left Blank.
18
Jing Chunfeng
Wu Di
Li Xiaoli
Shao Yongni
MoA 1
Artificial Intelligence
MoA 1.1
The Calculation Approach of the Nearest Neighbor Distance of
Chaotic Time Series’s Reconstructed Space, pp. 1-5.
Gong Zhuping
South China Univ. of Tech.
Zhao Kuiling
South China Univ. of Tech.
Zhejiang Inst. of Mechanical
& Electrical Engineering
Zhejiang Univ.
Zhejiang Univ.
Zhejiang Univ.
MoA 2.6
Design of Transcutaneous Coupling Wireless Charger, pp. 41-46.
Li Ning
Xiamen Univ.
Yu Xiao
Xiamen Univ.
Zhang Ning
Xiamen Univ.
MoA 1.2
Delay-Dependent Robust Stability and Stabilization for
Norm-Bounded Uncertain Systems with Time-Varying Delay, pp.
6-11.
Li Lee
National Sun Yat-Sen Univ.
Junshen Chen
National Sun Yat-Sen Univ.
MoA 2.7
The Application of Pipeline Technology: An Overview, pp. 47-51.
Li Yizhen
Xiamen Univ.
Ling Lin
Xiamen Univ.
Wu Jun
Xiamen Univ.
MoA 1.3
Study on Power E-Commerce Network Security Technique and
Design Based on Firewall, pp. 12-15.
Yang Liuqing
Fuzhou Vocational & Technical Inst.
Hu Yu
Fuzhou Vocational & Technical Inst.
Huang Weimin
Fuzhou Vocational & Technical Inst.
MoA 3
Control Technology
MoA 3.1
Optimization Research of Building Exports Positions based on
the Evacuating Movement, pp. 52-55.
Song Bingxue
Univ. of Sci. & Tech. Beijing
Wang Ziyang
Beijing Jiaotong Univ.
MoA 1.4
The Research and Practice of Inquiry Learning Model Based on
the Network Environment, pp. 16-18.
Jihua Ye
Jiangxi Normal Univ.
Dengwen Gan
Jiangxi Normal Univ.
Pingliao Zhu
Jiangxi Normal Univ.
Jiangxi Vocational & Technical
Chunlan Wang
College of Electricity
MoA 3.2
Parameters Optimization of Mechanical Arm PID Controllers
Based on CLPSO Algorithm, pp. 56-60.
Li Xiaolong
Southwest Jiaotong Univ.
Chen Yanjie
Hunan Univ.
Yu Xiao
Xiamen Univ.
MoA 1.5
Application of Individualized Teaching Model for Basic Computer
Science at Vocational Colleges, pp. 19-21.
Zhejiang Inst. of Mechanical
Zhou Zili
& Electrical Engineering
Zhejiang Inst. of Mechanical
Feng Hanrong
& Electrical Engineering
MoA 3.3
The Robust H∞ Control for Discrete-time Switched Interval
System, pp. 61-65.
Zhang Damin
Zhejiang Univ.
Zhang Xiaoli
Xiamen Univ.
Lu Zhengyu
Zhejiang Univ.
MoA 1.6
The Design and Research Based on the Intrusion Detection
Model of Packet Filtering Technology, pp. 22-23.
Li Cuizhi
Business College of Shanxi Univ.
Zhang Hui
Business College of Shanxi Univ.
Wu Liping
Business College of Shanxi Univ.
MoA 3.4
Simulation of the Intelligent Control Circuit based on Petri Net,
pp. 66-69.
Jihua Ye
Jiangxi Normal Univ.
Jianlian Li
Jiangxi Normal Univ.
Fangqi Deng
Jiangxi Normal Univ.
Jiangxi Vocational & Technical
Chunlan Wang
College of Electricity
MoA 2
Computer Application
MoA 3.5
Design of Vertical Parking Monitor System, pp. 70-73.
Changqing Cai
Changchun Inst. of Tech.
Lixin Wang
Shenyang Univ. of Tech.
Yan Zhao
Univ. of Sci. & Tech. of China
MoA 2.1
The Apply of ID3 in Stock Analysis, pp. 24-27.
Chen Chen Chinese People's Armed Police Force Academy
MoA 3.6
The Control Algorithm for a Photovoltaic Inverter to be Applied in
Weak Power Grid, pp. 74-77.
Shi Zhenyin
Gansu Electric Power Design Inst.
Zheng Xin
Gansu Electric Power Design Inst.
Wang Liping
Gansu Electric Power Design Inst.
MoA 2.2
A New Approach for Noisy Iris Database Indexing Based on
Color Information, pp. 28-31.
Qin Zhao
Taiyuan Univ.
MoA 2.3
The Development and Designation of Visual Experiments on
Demonstration and Assembly of Computers, pp. 32-34.
Yu Hongtao
Inner Mongolia Univ. for Nationalities
Bo Jinli
Inner Mongolia Univ. for Nationalities
MoA 4
Artificial Intelligence
MoA 2.4
Based on Excel and Macro Designing Standardization Self-test
System, pp. 35-37.
Zhou Minghong
Business College of Shanxi Univ.
MoA 4.1
Multi-objective Optimization in Dynamic Environment:A Review,
pp. 78-82.
Rui Chen
Xiamen Univ.
Wenhua Zeng
Xiamen Univ.
MoA 2.5
Discrimination of Varieties of Rice Using Near Infrared Spectral
by PCA and MDA Model, pp. 38-40.
Zhejiang Inst. of Mechanical
Zhou Zili
& Electrical Engineering
MoA 4.2
Design and Realization of SPI Interface in Lithium-ion Battery
Voltage Measuring System, pp. 83-87.
An Shiqi
Qingdao Univ. of Sci. & Tech.
Qi Anning
Qingdao Univ. of Sci. & Tech.
19
Zhu Yuwei
Qingdao Inst. of Bioenergy & Bioprocess Tech.
MoA 6.1
S-T Analysis of Classroom Teaching, pp. 136-140.
Yuan Jun
Guangxi Teachers Education Univ.
Ou Huanghai
Guangxi Teachers Education Univ.
MoA 4.3
A Multidimensional Data Analysis System Based on MDA for
Educational Data Warehousing, pp. 88-94.
Xuejian Yan
Shandong Univ.
Xueqing Li
Shandong Univ.
MoA 6.2
Research and Practice on Higher Vacational “Photogrammetry
and Remote Sensing” Course Construction, pp. 141-144.
Tong Biao
Liaoning Provincial College of Communication
Wu Wenbo
Liaoning Provincial College of Communication
MoA 4.4
A Comparison of Multi-Tenant Data Storage Solutions for
Software-as-a-Service, pp. 95-98.
Shaoquan Fang
Tsinghua Univ.
Qiuli Tong
Tsinghua Univ.
MoA 6.3
Exploration of Visual Teaching for Digital Filter Design, pp.
145-148.
Yang Fulong
Lanzhou Univ. of Tech.
Zhang Aihua
Lanzhou Univ. of Tech.
Lin Dongmei
Lanzhou Univ. of Tech.
MoA 4.5
A Design of Distributed Collaborative Intrusion Detection Model,
pp. 99-101.
Zhang Hui
Business College of Shanxi Univ.
MoA 6.4
Base on Human-Computer Interaction Perspective to Analyze the
Factors of Technology Acceptance Model on IRSSP for Taiwan
Recommendatory Admission, pp. 149-153.
Chien-Yun Dai
National Taiwan Normal Univ.
Jin-Jung Jang
National Taiwan Normal Univ.
Tzu-Hao Lee
National Taiwan Normal Univ.
Yu-Tsang Chen
Chung Shan Industrial Commercial
High School
Yu-Hsi Yuan
National Taiwan Normal Univ.
MoA 4.6
Research on M-learning supported by 3G/4G, pp. 102-106.
Zhizhen Yang
Shanghai Second Polytechnic Univ.
Zhihui Yang
North China Univ. of Tech.
MoA 4.7
Implementation of Software Testing Course Based on CDIO, pp.
107-110.
Zhang Yinnan
Zhejiang Univ. of Sci. & Tech.
Wang Xiaochi
Zhejiang Univ. City College
MoA 6.5
A Mode of Ability-targeted Computer Curriculum Reform Based
on Projects in Engineering Education, pp. 154-157.
Zhejiang Inst. of Mechanical
Yifang Zhang
& Electrical Engineering
Zhejiang Inst. of Mechanical
Binwei Yang
& Electrical Engineering
MoA 5
Software Engineering
MoA 5.1
A Study on the Methods of Software Testing Based on the Design
Models, pp. 111-113.
Tangtang Xie
Southwest China Univ.
Jun Li
Southwest China Univ.
Hanrong Chen
Southwest China Univ.
Hailing Xiong
Southwest China Univ.
MoA 6.6
Improving Computing Undergraduates’ Entrepreneurial Abilities,
pp. 158-161.
Huang Lingli
China Jiliang Univ.
Huang Jun
China Jiliang Univ.
MoA 5.2
Design of Database Architecture in the SaaS-based Multi-tenant
Educational Information System, pp. 114-119.
Jiangman Xu
Shandong Univ.
Xueqing Li
Shandong Univ.
Xinxiao Zhao
Shandong Univ.
MoA 6.7
The Educational Modeling Languages in Instructional Design:
Towards a UML Applications, pp. 162-165.
Zhi Jiang
Jimei Univ.
ThA 1
Computer Application
MoA 5.3
Design of a Multiple Modeling Language Supported Workflow
Architecture in Educational Information System, pp. 120-125.
Xinxiao Zhao
Shandong Univ.
Xueqing Li
Shandong Univ.
Jiangman Xu
Shandong Univ.
ThA 1.1
An Empirical Study of Consumer’s Repurchase Intention of
Tablet PC, pp. 166-171.
Yin-Tsuo Huang
Toko Univ.
Kuowei Lee
National Taichung Inst. of Tech.
Wenyuan Chan
Yunnan Univ.
MoA 5.4
The Construction of Chinese Chess Computer Game Platform,
pp. 126-128.
Wei Zhou
Northeastern Univ.
Jianchang Liu
Northeastern Univ.
Yuanhe Zhao
Northeastern Univ.
ThA 1.2
Application of ICT in Human Machine Interface Design Course,
pp. 172-175.
Liu Wenjie
Northwestern Polytechnical Univ.
Zhou Yuntao
Northwestern Polytechnical Univ.
MoA 5.5
Research and Design of Network Behavior Management System
Based on B/S Architecture, pp. 129-132.
Deng Xinxin
Xiamen Univ.
Qiu Zhongpan
Xiamen Univ.
Yang Xiaofang
Xiamen Univ.
ThA 1.3
Improving University e-Learning with Exploratory Data Analysis
and Web Log Mining, pp. 176-179.
Chakarida Nukoolkit
King Mongkut's Univ.
of Tech. Thonburi
Praewphan Chansripiboon
King Mongkut's Univ.
of Tech. Thonburi
Satita Sopitsirikul
King Mongkut's Univ.
of Tech. Thonburi
MoA 5.6
Application of Lightweight Software Framework Based on SSH,
pp. 133-135.
Weixing Wang
Chongqing Univ.
ThA 1.4
Research on Distance Collaborative Activities for Teacher
Education based on Online Video and Cloud Computing
MoA 6
Computer Education
20
Environment, pp. 180-185.
Baocong Jiao
Sufang An
Hongyun Wang
Haiguang Fang
Selection, pp. 222-225.
Geng Yan
Wang Wenjing
Capital Normal Univ.
Captical Normal Univ.
Captical Normal Univ.
Captical Normal Univ.
ThC 1.11
User Alias Authority Ranking Based on Email Communication
Relation Analysis, pp. 226-231.
Meijuan Yin
Zhengzhou Info. Sci. & Tech. Inst.
Junyong Luo
Zhengzhou Info. Sci. & Tech. Inst.
Xiaonan Liu
Zhengzhou Info. Sci. & Tech. Inst.
Xiao Li
Zhengzhou Info. Sci. & Tech. Inst.
ThC 1
Artificial Intelligence
ThC 1.1
Research on Expert System of Diseases and Insects of Jujube
Based on Neural Networks, pp. 186-188.
Song Jianwei
Shijiazhuang Univ.
Wu Shuomei
Shijiazhuang Univ.
Ren Ji
Shijiazhuang Television College
Yu Xiaohong
Hebei Taihang Machinery Industries
Corporation
ThC 1.12
DNA Computing Research Progress and Application, pp.
232-235.
Yanyan Huang
Xiamen Univ.
Ling He
Xiamen Univ.
ThC 1.13
P2P Caching Sequences Based on Partial Trust Negotiation
Game, pp. 236-239.
Chunzhi Wang
Hubei Univ. of Tech.
Ruoxi Wang
Huazhong Normal Univ.
Hong Li
Hubei Univ. of Tech.
Chen Hongwei
Hubei Univ. of Tech.
ThC 1.2
Research on UAV Health Evaluation Based on PNN, pp.
189-190.
Kun Zhang
Northwestern Polytechnical Univ.
Deyun Zhou
Northwestern Polytechnical Univ.
ThC 1.3
An Iterative Algorithm for Solving Complementarity Problems and
its Convergence, pp. 191-194.
Yalu Liu
Beijing Inst. of Petro-Chemical Tech.
Dandan Yang
Inner Mongolia Normal Univ.
ThC 1.14
The Automatic Detection Algorithm of Tongue Cancer Stem Cells
Based on Fuzzy Pattern Recognition, pp. 240-244.
Kehe Cai
Wuhan Univ.
Mengyi Liu
Wuhan Univ.
Yuyu Zhang
Wuhan Univ.
ThC 1.4
Research on CPS Spatio-Temporal Event Model Based on the
State, pp. 195-198.
Chen Lina
National Univ. of Defense Tech.
Huang Hongbin
National Univ. of Defense Tech.
Deng Su
National Univ. of Defense Tech.
ThC 1.15
A Novel Circle Covering Algorithm Based on Coulomb Force
Model for the Problem of Locating Repeaters, pp. 245-249.
Yuyu Zhang
Wuhan Univ.
Jiquan Yin
Wuhan Univ.
Peng Zhang
Wuhan Univ.
ThC 1.5
Development of Particle Swarm Optimization Algorithm, pp.
199-204.
Yu Chen
Xiamen Univ.
Fan Yang
Xiamen Univ.
Quan Zou
Xiamen Univ.
Chen Lin
Xiamen Univ.
ThC 1.16
Constructing the Representation Model of Arithmetic Word
Problems for Intelligent Tutoring System, pp. 250-255.
Yuhui Ma
Bohai Univ.
Kai Tan
Bohai Univ.
Limin Shao
Bohai Univ.
Xiaojing Shang
Bohai Univ.
ThC 1.6
Text Cohesion Visualizer, pp. 205-209.
Chakarida Nukoolkit
Praewphan Chansripiboon
Pornchai Mongkolnam
Richard Watson Todd
Business College of Shanxi Univ.
Business College of Shanxi Univ.
King Mongkut's Univ.
of Tech. Thonburi
King Mongkut's Univ.
of Tech. Thonburi
King Mongkut's Univ.
of Tech. Thonburi
King Mongkut's Univ.
of Tech. Thonburi
ThC 1.17
Design of Automated Course Scheduling System Based on
Hybrid Genetic Algorithm, pp. 256-259.
Yong Ouyang
Hubei Univ. of Tech.
Yi Chen
Hubei Univ. of Tech.
ThC 1.18
Heuristic Simulated Annealing Genetic Algorithm for Traveling
Salesman Problem, pp. 260-264.
Luo Delin
Xiamen Univ.
Zhao Lixiao
Xiamen Univ.
Xu Zhihui
95168 Military Unit
ThC 1.7
Improve VSM Text Classification by Title Vector Based
Document Representation Method, pp. 210-213.
Tian Xia
Shanghai Second Polytechnic Univ.
Yi Du
Shanghai Second Polytechnic Univ.
ThC 1.19
Iterative Learning Control for Uncertain Time-delay Linear
System, pp. 265-268.
Jie Wu
Hubei Normal Univ.
Xisheng Zhan
Hubei Normal Univ.
ThC 1.8
Formal Contexts in Ontologies, pp. 214-217.
Sun Yu
Yunnan Normal Univ.
Xia Youming
Yunnan Normal Univ.
Li Zhiping
Yunnan Normal Univ.
ThC 1.20
Research on Intelligent Test Paper Generation Base on Improved
Genetic Algorithm, pp. 269-272.
Chen Xiumin
Hebei Normal Univ. of Sci. & Tech.
Wang Dengcai
Hebei Normal Univ. of Sci. & Tech.
Zhu Meining
Hebei Normal Univ. of Sci. & Tech.
Yang Yanping
Hebei Normal Univ. of Sci. & Tech.
ThC 1.9
A New Method for Classification in DNA Sequence, pp. 218-221.
Qingda Zhou
Xiamen Univ.
Qingshan Jiang
Shenzhen Inst.s of Advanced Tech.,
Chinese Academy of Sci.s
Dan Wei
Xiamen Univ.
ThC 1.21
An Improved System Dynamics Model for China’s Ration
Demand System, pp. 273-277.
ThC 1.10
Question Classification Oriented Chinese Framenet Feature
21
Yanhua Li
Xiuxia Lu
Bingjun Li
Henan Agricultural Univ.
Henan Agricultural Univ.
Henan Agricultural Univ.
ThC 2.4
Measurements and Analysis of Internet Physical Properties
Based on ICMP, pp. 320-323.
Jinjun Hu
Southwest Univ. of Sci. & Tech.
Ling Xing
Southwest Univ. of Sci. & Tech.
Jianguo Ma
Southwest Univ. of Sci. & Tech.
Qiang Ma
Southwest Univ. of Sci. & Tech.
ThC 1.22
A New Approach to Stability Analysis of Systems with State
Delay, pp. 278-280.
Jie Wu
Hubei Normal Univ.
ThC 2.5
Improvement on Decoding of the (71, 36, 11) Quadratic Residue
Code, pp. 324-329.
Hungpeng Lee
Fortune Inst. of Tech.
Hsinchiu Chang
Fortune Inst. of Tech.
ThC 1.23
Research of Optimal Placement of Active Reference Tags Based
on LANDMARC Algorithm, pp. 281-285.
Weiguang Shi
Tianjin Univ.
Kaihua Liu
Tianjin Univ.
Chunya Ni
Tianjin Univ.
Ge Yan
Tianjin Univ.
ThC 2.6
The Test and Analysis of FMO Model in Error Concealment
Based on H.264, pp. 330-332.
Du Li
Jiangxi Univ. of Sci. & Tech.
Junqin Wu
Jiangxi Univ. of Sci. & Tech.
ThC 1.24
Diagonal Recurrent Neural Network with Output Feedback and its
Application, pp. 286-288.
Lisang Liu
Xiamen Univ.
Xiafu Peng
Xiamen Univ.
ThC 2.7
Study on Digital Measurement Methods of Engine Transient
Speed and Corresponding Error, pp. 333-336.
Cheng Wang
Huaiyin Inst. of Tech.
Shanzhen Xu
Huaiyin Inst. of Tech.
ThC 1.25
Jurisprudence on New Developments of Brain Science, pp.
289-292.
Wu Xuyang
Xiamen Univ.
Zou Yuzhuo
Xiamen Univ.
ThC 2.8
Power Design of 3G Wireless Data Terminal Based on USB Bus,
pp. 337-339.
Liu Xiaochun
Chang-an Univ.
Hu Dongping
ZTE Corporation
ThC 1.26
Law Philosophy Analysis: Application of Medical Instruments for
Direct Reading and Influence of the Activities of Cranial Nerve,
pp. 293-296.
Wu Xuyang
Xiamen Univ.
Zou Yuzhuo
Xiamen Univ.
ThC 2.9
Spatial Sampling Criteria for Recognition of Structures, pp.
340-343.
Han Yueping
North Univ. of China
Li Ruihong
North Univ. of China
Han Yan
North Univ. of China
ThC 1.27
A Fast Adaptive Stream Cipher Algorithm and Expanded Search,
pp. 297-304.
Xiaojing Hu
Xiamen Univ.
Lizhao Liu
Xiamen Univ.
Ying Wang
Xiamen Univ.
Maoqing Li
Xiamen Univ.
Tianhua Zhang
Louisiana Tech Univ.
ThC 2.10
Face Recognition Based on Singular Value and Feature-matrix,
pp. 344-347.
Hu Hongping
North Univ. of China
Li Ruihong
North Univ. of China
Zhou Hanchang
North Univ. of China
ThC 1.28
An Indoor Positioning Technology Based on GA-BP Neural
Network, pp. 305-309.
Miao Kehua
Xiamen Univ.
Chen Yaodong
Xiamen Univ.
Miao Xiao
Xiamen Univ.
ThC 3
Computer Application
ThC 3.1
A New Study on the Integrating of Random Walk Process and
Multiple Point Geostatistics to Model the Fluvial Reservoir, pp.
348-350.
Yin Yanshu
Yangtze Univ.
Ding Hui
Yangtze Univ.
Shi Shuyuan
Yangtze Univ.
ThC 2
Communication Technology
ThC 2.1
A Transient Signal Detection Technique Based on Flatness
Measure, pp. 310-312.
Xuemin Zhang
Changchun Inst. of Tech.
Changqing Cai
Changchun Inst. of Tech.
Jianhong Zhang
Changchun Inst. of Tech.
ThC 3.2
Integrating Data from Multiple Disciplines for Reservoir
Microfacies Forecasting, pp. 351-353.
Yin Yanshu
Yangtze Univ.
Feng Shu
Yangtze Univ.
ThC 2.2
An Improved Warped DFT Algorithm Based on Signal Sparse
Representation, pp. 313-315.
Jian Zhou
Anhui Univ.
Chenyang Cui
Anhui Univ.
Guofeng Zhu
Anhui Univ.
Yaguang Ding
Anhui Univ.
Liang Tao
Anhui Univ.
ThC 3.3
Research of Spatial Index & Caching for Power GIS, pp. 354-357.
Wang Xiaohui
North China Electric Power Univ.
Wu Kehe
North China Electric Power Univ.
Xu Xuerong
North China Electric Power Univ.
ThC 3.4
A Research of Online Exam System Based on SSH Architecture,
pp. 358-360.
Li Gengming
Xiamen Univ.
ThC 2.3
Finite Element Analysis of Composite Leaf Spring, pp. 316-319.
Zheng Yinhuan
Wuhan Univ. of Tech.
Xue Ka
Wuhan Univ. of Tech.
Huang Zhigao
Wuhan Railway Vocational College of Tech.
ThC 3.5
Application Research of Fuzzy Clustering Approach in the New
Rural Cooperative Medical Insurance System Module, pp.
22
361-364.
Tang Zhong
Yang Gefeng
Ou Xu
Liang Zhisheng
Supportive E-Learning Environment, pp. 411-415.
Ye Conghuan
Xiaogan Univ.
Guangxi Medical Univ.
Guangxi Medical Univ.
Guangxi Medical Univ.
Guangxi Medical Univ.
ThC 3.18
A Service Computing Model Based on Interaction Among Local
Campus Clouds, pp. 416-419.
Ye Conghuan
Xiaogan Univ.
ThC 3.6
Information Technology in Teacher's Professional Skill Training
Application, pp. 365-369.
Xilong Tan
Hubei Univ. of Education
Huiling Wang
Hubei Univ. of Education
ThC 3.19
The Forecasting of Shanghai Index Trend Based on Genetic
Algorithm and Back Propagation Artificial Neural Network
Algorithm, pp. 420-424.
Li Yizhen
Xiamen Univ.
Zeng Wenhua
Xiamen Univ.
Lin Ling
Xiamen Univ.
Wu Jun
Xiamen Univ.
Lu Gang
Xiamen Univ.
ThC 3.7
Scheduling Model of Access Requests in Open Storage
Architectures, pp. 370-374.
Xian Wu
Soochow Univ.
Jianxi Fan
Soochow Univ.
Jiwen Yang
Soochow Univ.
ThC 3.20
Constructions on Disaster Tolerant Backup System of
Management Information System, pp. 425-427.
Liangping Zhang
Chongqing Tech. & Business Univ.
Weixing Wang
Beihai Vocational College
ThC 3.8
High-cost-performance and Simple Moving Sticks Length
Measurement Device, pp. 375-379.
Du Bo
Changchun Inst. of Tech.
Cai Changqing
Changchun Inst. of Tech.
ThC 3.21
The Land Use Planning Environmental Impact Assessment in
Longnan City, pp. 428-432.
Yingying Liu
Northwest Normal Univ.
Peiji Shi
Northwest Normal Univ.
Chunyu Liu
Northwest Normal Univ.
Jinghu Pan
Northwest Normal Univ.
ThC 3.9
Research Based on Real Time Monitoring System of Digitized
Agricultural Water Supply, pp. 380-383.
Yunchen Liu
Shandong Univ.
Yu Chen
Shandong Univ.
Yunpeng Zhang
Shandong Univ.
Jun Tong
Shandong Univ.
ThC 3.22
Data Decoding of Flight Recorder Tape Based on Image
Recognition, pp. 433-436.
Yang Quanfa
Beihang Univ.
Ren Zhang
Beihang Univ.
Hu Shuzheng
Beijing Aeronautical Tech. Research Center
Wang Zheng
Beijing Aeronautical Tech. Research Center
ThC 3.10
How to Regulate Computer Crime in Germany Criminal Law, pp.
384-385.
Chunlin Wang
Jiangsu Univ.
ThC 3.11
A Parameter Selection of Support Vector Machine with Genetic
Algorithm for Citrus Quality Classification, pp. 386-390.
Tang Guoxiang
Southwest Univ.
Qu Ming
Southwest Univ.
Wang Xuan
Southwest Univ.
Lv Jiake
Southwest Univ.
ThC 3.23
Simulation and Experimental Study on Electromagnetic Field in
Magnetic Particle Clutch, pp. 437-440.
Shanzhen Xu
Huaiyin Inst. of Tech.
Cheng Wang
Huaiyin Inst. of Tech.
ThC 3.12
Application of Data Mining in the Analysis of Needs of University
Library Users, pp. 391-394.
Tingting Zhu
Changchun Inst. of Tech.
Lili Zhang
Changchun Inst. of Tech.
ThC 3.24
A Novel Method Based on Lines Clustering for Extracting
Multi-ROI in Images with Simple Background, pp. 441-444.
He Jun
Beijing Normal Univ.
Sun Bo
Beijing Normal Univ.
Yu Lejun
Beijing Normal Univ.
ThC 3.13
Analysis of Properties on Cargo Constrained System of Truck
Rollover Based on MATLAB/simulink, pp. 395-397.
Zhao Yan
Wuhan Univ. of Tech.
Wang Jun
Wuhan Univ. of Tech.
ThC 3.25
Multi-objective Optimization Design of Multi-piece Leaf Springs
Based on Pareto, pp. 445-448.
Wu Yonghai
Huaiyin Inst. of Tech.
Fan Qinman
Huaiyin Inst. of Tech.
ThC 3.14
Analysis of Swinging Angle Hydraulic Detection System of
Constant Velocity Universal Joints Based on MATLAB, pp.
398-401.
Wang Jun
Wuhan Univ. of Tech.
Zhao Yan
Wuhan Univ. of Tech.
ThC 3.26
A New Improved Algorithm Applicated in NCO Based on Specific
Angle, pp. 449-451.
Liu Bin
Taiyuan Inst. of Tech.
He Qiusheng
Taiyuan Univ. of Sci. & Tech.
ThC 3.15
Combined Water Seam Crystallizer’s Thermal Field Analysis and
Simulation , pp. 402-405.
Dachao Hu
Shanghai Inst. of Tech.
Junling Hu
Univ. of Bridgeport
ThC 3.27
Modeling and Simulation of Truck with Random Vibration
Response, pp. 452-455.
Wu Yonghai
Huaiyin Inst. of Tech.
Fan Qinman
Huaiyin Inst. of Tech.
ThC 3.16
The Inquiry in Hospital Beds Arrangement Based on Queuing
Theory, pp. 406-410.
Ou Yang
Guangxi Teachers Education Univ.
ThC 3.28
Numerical Analysis on the Pressure Waves in Tunnels, pp.
456-459.
Bao Haitao
Huaiyin Inst. of Tech.
ThC 3.17
ThC 3.29
Service Delivery Using Social Network Analysis in P2P
Study the Effect of Rear Spoiler on Car Aerodynamics
23
Characteristics, pp. 460-463.
Bao Haitao
Xu Mingbao
Zhou Xiaojun
Huaiyin Inst. of Tech.
ThC 3.30
Research of Ant Colony Algorithm and the Application of 0-1
Knapsack, pp. 464-467.
Ling He
Xiamen Univ.
Yanyan Huang
Xiamen Univ.
The Maintenance Section of North Xiangfan
The Maintenance Section of Jianan
ThC 4.3
A Hybird Hierarchical Architecture for 3D Multi-Cluster NoC, pp.
512-516.
Wang Jiawen
Nanjing Univ.
Li Li
Nanjing Univ.
Zhang Yuang
Nanjing Univ.
Pan Hongbing
Nanjing Univ.
He Shuzhuan
Nanjing Univ.
Zhang Rong
Nanjing Univ.
ThC 3.31
Research on the Strategy of Power Management for Submersible
Temperature Logger, pp. 468-471.
Dalei Song
Ocean Univ. of China
Bin Liu
Ocean Univ. of China
Fangjie Yu
Ocean Univ. of China
Bing Xue
Ocean Univ. of China
ThC 4.4
Implementation Scheme for Capacitive Touch Sliding, pp.
517-520.
Bo Jiang
Wuhan Polytechnic Univ.
Long Zhou
Wuhan Polytechnic Univ.
ThC 3.32
Community Mining in Dynamic Social Networks—Clustering
Based Improved Ant Colony Algorithm, pp. 472-476.
Zhang Nan
Jilin Univ.
Wang Zhe
Jilin Univ.
ThC 4.5
Performance Comparison of Single Board Computer: A Case
Study of Kernel on ARM Architecture, pp. 521-524.
Naufal Alee
Univ. Malaysia Perlis
Mostafijur Rahman
Univ. Malaysia Perlis
R. B Ahmad
Univ. Malaysia Perlis
ThC 3.33
Cluster, Grid and Cloud Computing: A Detailed Comparison, pp.
477-482.
Naidila Sadashiv
Acharya Inst. of Tech.
S.M Dilip Kumar Univ. Visvesvaraya College of Engineering
ThC 4.6
A Mobile RFID Localization Algorithm Based on Instantaneous
Frequency Estimation, pp. 525-530.
Jiexiao Yu
Tianjin Univ.
Kaihua Liu
Tianjin Univ.
Peng Luo
Tianjin Univ.
ThC 3.34
Design and Optimization of Drip Irrigation Emitters Using Directly
of Sewage, pp. 483-488.
Jiang Fan
Guangzhou Univ.
Huang Chunman
Guangdong Baiyun Univ.
Xiang Jianghua
Guangzhou Univ.
Wang Yijun
Guangzhou Univ.
ThC 4.7
Flash Aging Prevention Technique (FAP) for Flash Based Solid
State Disks, pp. 531-536.
Anam Zaman
National Univ. of Sci. & Tech., Pakistan
Sumayya Shiraz
National Univ. of Sci. & Tech., Pakistan
Saba Zia
National Univ. of Sci. & Tech., Pakistan
Abdullah Mansoor
National Univ. of Sci. & Tech., Pakistan
Farooq Ahmed
National Univ. of Sci. & Tech., Pakistan
ThC 3.35
Design of the USB Download Interface Based on Embedded
POS, pp. 489-491.
Zhu Zhengwei
Changzhou Univ.
Gu Hao
Changzhou Univ.
ThC 4.8
Room Temperature and Humidity Monitoring and Energy-saving
System, pp. 537-540.
Xianzhe Hua
Guizhou Univ.
ThC 3.36
Practice and Application of Multisim in Digital Electronic
Experiment Teaching, pp. 492-494.
Yan Guohong
Zhejiang Sci-Tech Univ.
Zhang Shuiying
Zhejiang Sci-Tech Univ.
Du Jingjing
Zhejiang Sci-Tech Univ.
ThC 4.9
Optical Burst Switching for Many-Core Processor-to-Memory
Photonic Networks, pp. 541-546.
Quanyou Feng
National Univ. of Defense & Tech.
Dongsong Ban
National Univ. of Defense & Tech.
Huanzhong Li
National Univ. of Defense & Tech.
Wenhua Dou
National Univ. of Defense & Tech.
ThC 3.37
Virtualization in Railway Datacenter Management Environment,
pp. 495-498.
Wei Wang
Beijing Jiaotong Univ.
Yu Zhao
Beijing Jiaotong Univ.
ThC 4.10
A Research on Storage Performance Optimization of Virtual
Machine, pp. 547-551.
Dongsheng Yin
Sun Yat-sen Univ.
Jianan Liang
Sun Yat-sen Univ.
ThC 3.38
Health Care Fraud Detection Using Nonnegative Matrix
Factorization, pp. 499-503.
Shunzhi Zhu
Xiamen Univ. of Tech.
Yan Wang
Xiamen Univ. of Tech.
Yun Wu
Xiamen Univ. of Tech.
ThC 4.11
The System MP3 on the Basis f SD Card Applied to the Elevator
Multimedia, pp. 552-556.
Zheng Xiaoyi
Xiamen Univ.
Li Suxun
Xiamen Univ.
Zhang Ning
Xiamen Univ.
Yan Lingjie
Xiamen Univ.
ThC 4
Computer Architecture
ThC 4.1
Voice for the Voiceless, pp. 504-507.
K.Rajeswari
Sri Sai Ram Engineering College
E.Jeevitha
Sri Sai Ram Engineering College
MR.Meenakshi
Sri Sai Ram Engineering College
V.K.G. Kalaiselvi
Sri Sai Ram Engineering College
ThC 5
Computer Education
ThC 5.1
The Study of Higher Education of the Disabled from the
Perspective of Human Capital Theory, pp. 557-561.
Xiaoyan Liu
Tianjin Univ. of Tech.
Han Tan
Tianjin Univ. of Tech.
ThC 4.2
Research for Rotor Monitoring System Based on Virtual
Instrument Technology, pp. 508-511.
Huang Zhigao
Wuhan Railway Vocational College of Tech.
24
Chengyin Zhang
Xiaoqian Guo
Tianjin Univ. of Tech.
Tianjin Univ. of Tech.
Research and Practice on Teaching Computer Science
Undergraduates Based on Educational Games, pp. 605-608.
Feng Yang
Heilongjiang Univ.
Guangtian Zhou
Heilongjiang Univ.
ThC 5.2
China-U.S. Educational Exchange in the History, pp. 562-567.
Yanxiang He
Wuhan Univ.
Ye Tian
Wuhan Univ.
Jie Deng
State Univ. of New York at Binghamton
ThC 5.14
Surveying and Analyzing Graduate Students' Studying
Satisfaction Degree, pp. 609-613.
Qiaoyun Chen
Nanjing Normal Univ.
Yi Li
Nanjing Normal Univ.
ThC 5.3
Innovation of Practical Teaching Pattern of Network Engineering
Specialty Based on Capability, pp. 568-571.
Liu Wenzhi
Jiangsu Province Support Software
Engineering R & D Center for Modern Info.
Tech. Application in Enterprise
Liu Zhaobin
Jiangsu Province Support Software
Engineering R & D Center for Modern Info.
Tech. Application in Enterprise
Zhao Hongyi
Xi'an Univ. of Tech.
ThC 5.15
Analysis on the Difference between Public Education and Social
Security in Regulating Income Distribution, pp. 614-618.
Zeng Yi
Wuhan Univ.
ThC 5.16
Research and Implement of the Virtual Laboratory of Power
Electronics Based on LabVIEW, pp. 619-622.
Qiong Cheng
Hubei Univ. of Tech.
Bo Fu
Hubei Univ. of Tech.
ThC 5.4
The Research of College Computer Courses Teaching Quality
Improvement, pp. 572-576.
Qing Ye
Jiangxi Univ. of Traditional Chinese Medicine
Minghai Jiao
Northeastern Univ.
ThC 5.17
Research on Multi-purpose Training-based Curriculum System of
Computer Concept, pp. 623-626.
Wei Yuanyuan
Wuhan Textile Univ.
Wei Min
Wuhan Univ. of Tech.
ThC 5.5
Core Basic Course Group Construction in Computer Major, pp.
577-579.
Wang Zhixiao
China Univ. of Mining & Tech.
Meng Fanrong
China Univ. of Mining & Tech.
ThC 5.18
Study on the Coordinated Development between Higher
Vocational & Technical Education, pp. 627-630.
Wang Yudong
Jiangmen Polytechnic
Chen Yao
Jiangmen Polytechnic
ThC 5.6
Analysis of Computer Teaching Reform from the Perspective of
Learning Psychology at Univeristy of Chinese Medicine, pp.
580-583.
Xiuju Zhan
Guangzhou Univ. of Chinese Medicine
Xiufeng Liu
Guangzhou Univ. of Chinese Medicine
ThC 5.19
A Practical Teaching Approach to Management Information
System Course, pp. 631-633.
Haihe Shi
Jiangxi Normal Univ.
ThC 5.7
Research on Web-based Teaching and Learning Self-directed
Platform, pp. 584-587.
Ping Yan
Shenyang Aerospace Univ.
Minghai Jiao
Northeastern Univ.
ThC 5.20
The Thinking of Computer Language Courses in China, pp.
634-637.
Yu He
Beijing Tech. & Business Univ.
ThC 5.21
An Investigation of Undergraduate Software Engineering
Curriculum: Iranian Universities Case Study, pp. 638-644.
Amin Khodabandeh Amiri Mazandaran Univ. of Sci. & Tech.
Maria Banari
Mazandaran Univ. of Sci. & Tech.
Narges Yousefnezhad
Mazandaran Univ. of Sci. & Tech.
ThC 5.8
Analysis of Knowledge Based Graphical Password
Authentication, pp. 588-591.
Gaurav Agarwal
Invertis Univ.
Saurabh Singh
Invertis Univ.
Ajay Indian
Invertis Univ.
ThC 5.22
Kill Two Birds with One Stone: Boosting Graduate Students’
Abilities in Simulation by Realization Dynamic Demonstration
Experiments, pp. 645-648.
Wang Rui
Beihang Univ.
Liu Yuming
Beihang Univ.
Zhao Yan
Beihang Univ.
ThC 5.9
Network Course Design for Secondary Vocational Education, pp.
592-594.
Huang Xingyun
Wuhan Univ. of Tech. Guangxi
Mech.& Elec. Industry School
Ou Qizhong
Guangxi Teachers Education Univ.
ThC 5.10
Exploration of Education Reform Based on 32-bit Assembly
Language Programming, pp. 595-599.
Lin Shan
Hubei Univ. of Tech.
ThC 5.23
Ideas Transforming in the Public Arts Education of Virtual
Museum, pp. 649-653.
Jiang Zhaojun
Nanjing Univ. of Aeronautics & Astronautics
Wu Zhibin
Nanjing Univ. of Aeronautics & Astronautics
ThC 5.11
Exploration of Ternary Training Mode on Continuing Education,
pp. 600-601.
Liu Baobin
Jiangsu Economic & Trade Tech. Inst.
Zhou Wei
Zhejiang Univ.
ThC 5.24
Research on Talent-training Mode of Modern Computer
Hardware Design, pp. 654-656.
Wei Yuanyuan
Wuhan Textile Univ.
Wei Min
Wuhan Univ. of Tech.
ThC 5.12
The Computer Basic Education for Postgraduates in Colleges
under Network Teaching Auxiliary Platform Reform and
Exploration, pp. 602-604.
Boqin Liu
Southwest Univ.
Junmei He
Southwest Univ.
ThC 5.25
Construction of Curriculum System on Webpage Design and
Website Development in Higher Vocational Colleges, pp.
657-659.
Zhejiang Water Conservancy &
Guan Xiaohui
Hydropower College
Zhou Zhimin
Zhejiang Water Conservancy &
ThC 5.13
25
Hydropower College
Yangmei Zheng
ThC 5.26
Practical Notes on Teaching Computer Basics in English to
International College Students in China, pp. 660-664.
Ken Chen
Ningbo Univ.
Rong Jiang
Ningbo Univ.
Qingnian Huang
Ningbo Univ.
Robert M. Randoy
O'Hare International Airport
Guangxi Youth Leaders College
ThC 5.38
Education Reform on Software Programming Courses for
Non-IT-Majoring Undergraduates, pp. 715-719.
Shaobing Song
Hangzhou Normal Univ.
Ge Yu
Hangzhou Normal Univ.
ThC 5.39
Network Education Platform Design of Space for Future Teacher,
pp. 720-722.
Ou Qizhong
Guangxi Teachers Education Univ.
Zhang Lanfang
Guangxi Normal Univ.
ThC 5.27
Design and Exploration of the English Website of the Course
Analog Electronic Technology, pp. 665-667.
Liang Likai
Shandong Univ.
Zheng Yamin
Shandong Univ.
Tong Qiang
Shandong Univ.
ThC 5.40
Mathematical Education (Computer Application) Professional
Facing Difficulties and Countermeasures, pp. 723-725.
Qiang Yi
Jiujiang Univ.
Li Xingnan
Jiujiang Univ.
Zhou Jingui
Jiujiang Univ.
ThC 5.28
Research on the Application of Video Cases in Computer
Education of College Students, pp. 668-670.
Hanrong Chen
Southwest Univ.
Tangtang Xie
Southwest Univ.
ThC 5.41
A Study on the Models of Teaching Computer Basic Course in
Social Computing Context, pp. 726-729.
Chunying Zhang
Hebei United Univ.
Jianjing Li
Hebei United Univ.
Xiao Chen
Hebei United Univ.
ThC 5.29
The Research of Teaching Methodology on Operating System
Process Control, pp. 671-674.
Zhengde Zhao
Shanghai Univ.
Genchang Zhao
Shanghai Univ.
ThC 5.42
Knowledge Representation and Algorithms Automatic Solving
Integral Problems, pp. 730-735.
Nhon Do
Ho Chi Minh City Univ. of Tech.
Thu_Le Pham
Ho Chi Minh City Univ. of Tech.
ThC 5.30
Perspective: Employment Conditions for Computer Engineering
Related College Graduates in China, pp. 675-680.
Ken Chen
Ningbo Univ.
Qingnian Huang
Ningbo Univ.
Ming Hu
Ningbo Univ.
Robert M. Randoy
O'Hare International Airport
ThC 5.43
Design and Research of Multimedia Teaching in Sports
Technique Class of University, pp. 736-739.
Wu Yajuan
Chang-an Univ.
ThC 5.31
ICT Education in Rual Areas of Southwest China: A Case Study
of Zhongxian County, Chongqing, pp. 681-685.
Lv Jiake
Southwest Univ.
ThC 5.44
Research on the Computer Teaching System for Talent
Cultivation Based on Kano’s Model, pp. 740-743.
Ping Yan
Shenyang Aerospace Univ.
Minghai Jiao
Northeastern Univ.
ThC 5.32
Wiki-based Collaborative Learning For Colleges Specialty
English Writing Education, pp. 686-690.
Tang Guoxiang
Southwest Univ.
Xie Deti
Southwest Univ.
Wang Xuan
Southwest Univ.
ThC 5.45
Open-ended Practical Project-based Instruction Mode Under
Netwrok Environment, pp. 744-747.
Gang Cen
Zhejiang Univ. of Sci. & Tech.
Xuefen Lin
Zhejiang Univ. of Sci. & Tech.
Junyan Luo
Zhejiang Univ. of Sci. & Tech.
ThC 5.33
Teacher Robot, A New Concept of Modern Teaching, pp.
691-696.
Aihua Zhang
Bohai Univ.
Zhongdang Yu
Bohai Univ.
ThC 5.46
The Exploration of the Teaching System of Operation System,
Enhancing the Comprehensive Quality of Students, pp. 748-750.
Tangtang Xie
Southwest China Univ.
Zhilin Ren
Southwest China Univ.
Hanrong Chen
Southwest China Univ.
Jun Li
Southwest China Univ.
ThC 5.34
An Intelligent Educational Software for Automatic Problem
Solving in Linear Algebra, pp. 697-702.
Nhon Do Van
Ho Chi Minh City Univ. of Tech.
Hung Chau Kim
Ho Chi Minh City Univ. of Tech.
Van Ho Long
Ho Chi Minh City Univ. of Tech.
ThC 5.47
Learning Outcomes of Programming Language Courses Based
on Peer Code Review Model, pp. 751-754.
Yanqing Wang
Harbin Inst. of Tech.
Li Hang
Harbin Inst. of Tech.
Sun Yanan
Harbin Inst. of Tech.
Jiang Yu
Harbin Inst. of Tech.
Yu Jie
Harbin Inst. of Tech.
ThC 5.35
Exploration and Practice of Software Engineering Core
Curriculum Construction, pp. 703-705.
Guangquan Zhang
Soochow Univ.
Mei Rong
Jinan Univ.
ThC 5.36
Collaboration of Online Educational Instruction: Analysis of the
Use of Online Teaching Tools for High School Students, pp.
706-709.
Floriana Falcinelli
Univ. of Perugia
Cristiana Brunelli
Univ. of Perugia
ThC 5.48
Exploration and Practice on Higher Mathematics Teaching
Reform under the Condition of Modern Information Technology,
pp. 755-757.
Xiongwei Liu
National Univ. of Defense Tech.
Jianping Li
National Univ. of Defense Tech.
ThC 5.37
Study on Teaching Strategies of “College Computer Foundation”,
pp. 710-714.
ThC 5.49
The Research on User Satisfaction of Easy Teaching Web of
26
Taipei Assessed via Information Quality, System Quality, and
Technology Acceptance Model, pp. 758-762.
Chien-Yun Dai
Taiwan Normal Univ.
Manting Kao
Taiwan Normal Univ.
Charng-Tzer Harn
Taiwan Normal Univ.
Yu-Hsi Yuan
Taiwan Normal Univ.
Wan-Fei Chen
Taiwan Normal Univ.
Li Wang
Hydropower College
Zhejiang Water Conservancy &
Hydropower College
ThC 5.61
Classroom Teaching Strategies Creative Abilities, pp. 808-810.
Jiang Daiyou
Chang'an Univ.
ThC 5.50
Study on Curriculum Design of System on Chip, pp. 763-765.
Jianfeng An
Northwestern Polytechnical Univ.
Xiaoya Fan
Northwestern Polytechnical Univ.
Shengbing Zhang
Northwestern Polytechnical Univ.
Wengxing Li
Northwestern Polytechnical Univ.
ThC 5.62
Research and Design CSCL Model Based on Ubiquitous
Learning Environments, pp. 811-814.
Qi Xinxing
Southwest Univ. of Sci. & Tech.
Liu Zhiqin
Southwest Univ. of Sci. & Tech.
ThC 5.63
Teaching Discrete Mathematics with the Constructivism Learning
Theory, pp. 815-816.
Hu Yahong
Zhejiang Univ. of Tech.
Wang Weihong
Zhejiang Univ. of Tech.
Jiang Li
Zhejiang Univ. of Tech.
ThC 5.51
On the Necessity of Distance Learning Courseware Building for
EFL Adult Learners, pp. 766-768.
Bi Huiying
Changchun Inst. of Tech.
ThC 5.52
Research on the Construction of Practical Teaching System for
Computer Majors, pp. 769-771.
Zhang Ping
Zhengzhou Info. Tech. Univ.
Han Lin
Zhengzhou Info. Tech. Univ.
Zeng Guangyu
Zhengzhou Info. Tech. Univ.
ThC 5.64
On Constructing Tridimensional Visual Teaching Resource
System for Informational Discipline Platform Courses, pp.
817-820.
Tongcheng Huang
Shaoyang Univ.
Liping Yin
Shaoyang Univ.
ThC 5.53
Using Cooperation Between University and Enterprise to Improve
the Comprehensive Competitiveness of Student in Computer
Science, pp. 772-775.
Liu Chengxia
Beijing Info. & Tech. Univ.
Cai Ying
Beijing Info. & Tech. Univ.
Shen Meie
Beijing Info. & Tech. Univ.
ThC 6
Computer Graphics
ThC 6.1
Overview of Video-Based Vehicle Detection Technologies, pp.
821-825.
Kun Wu
Xiamen Univ.
Haiyin Zhang
Xiamen Univ.
Tianmao Xu
Xiamen Univ.
Ju Song
Xiamen Univ.
ThC 5.54
How to Improving the Non-computer Science Students’ Computer
Ability, pp. 776-778.
Wang Zilan
Southwest Jiaotong Univ.
Xie Pan
Southwest Jiaotong Univ.
Lin Jing
Southwest Jiaotong Univ.
ThC 6.2
Fuzzy Clustering Application in Medical Image Segmentation, pp.
826-829.
Yang Gefeng
Guangxi Medical Univ.
Ou Xu
Guangxi Medical Univ.
Liang Zhisheng
Guangxi Medical Univ.
ThC 5.55
Multidimensional Teaching Research on University Computer
Foundation Course, pp. 779-782.
Dan Guo
Harbin Univ. of Commerce
ThC 5.56
General Education Extra-curricular Training Program for
Computer Major College Undergraduates: Practice and
Exploration, pp. 783-787.
Xin Mingjun
Shanghai Univ.
Wu Yue
Shanghai Univ.
ThC 6.3
A Spatio-temporal Filtering Method for Motion Estimation, pp.
830-834.
Wang Rui
Beihang Univ.
Zhao Yan
Beihang Univ.
Tang Yujun
Beihang Univ.
Yuan Yan
Beihang Univ.
ThC 5.57
ViSiMIPS: Visual Simulator of MIPS32 Pipelined Processor, pp.
788-793.
Md Tahsin Kabir
North South Univ.
Mohammad Tahmid Bari
North South Univ.
Abul L. Haque
North South Univ.
ThC 6.4
Measuring Thickness from 3D Gray-scale Image by Fuzzy
Distance Transform, pp. 835-838.
Qi Zhong
Xiamen Univ.
Hong Duan
Xiamen Univ.
Jiangui Wu
Xiamen Univ.
ThC 5.58
Information Capacity Training of College Students: Problems and
Solutions, pp. 794-798.
Bi Tingyan
Weifang Univ.
Xu Qiuhua
Weifang Univ.
ThC 6.5
A Photo Based 3D Garment Making System for Educational
Purpose in Style Reconstruction and Evaluation, pp. 839-842.
Yueqi Zhong
Donghua Univ.
ThC 5.59
Research on Construction of Information Literacy Curriculum
System in Colleges, pp. 799-803.
Bi Tingyan
Weifang Univ.
Liu Li
Weifang Univ.
ThC 6.6
A Novel Rate Control Algorithm of Video Coding Based on Visual
Perceptual Characteristic, pp. 843-846.
Ruan Ruolin
Wuhan Univ.
Hu Ruimin
Wuhan Univ.
Li Zhongming
Xianning Univ.
ThC 5.60
Research on Software Undergraduates Training
Countermeasures Based on the Competency Model, pp.
804-807.
Shihai Zhu
Zhejiang Water Conservancy &
ThC 6.7
A Video Coding Error Concealment Method for AVS-P2
Standard, pp. 847-851.
Ruan Ruolin
Wuhan Univ.
27
Hu Ruimin
Chen Hao
Li Zhongming
Wuhan Univ.
Wuhan Univ.
Xianning Univ.
The Fuzzy Decision and Simulation of Washer Control, pp.
891-896.
Yu Zhen
Xiamen Univ.
Xu Fang
Xiamen Univ.
ThC 6.8
Traffic Indication Symbols Recognition with Shape Context, pp.
852-855.
Kai Li
Xiamen Univ.
Weiyao Lan
Xiamen Univ.
ThC 7.6
Study on the Application of the Fuzzy RBF Neural Network in the
MIMO Furnace Control System, pp. 897-900.
Yun Zhang
Changchun Inst. of Tech.
Daofeng Zhou
Jinlin Univ.
Xuemei Chen
Jinlin Univ.
Mingshuang Bi
Water Resources Department
of the Jilin Province
ThC 6.9
Analysis of Regional Comparative Advantage and Spatial
Distribution of Jiaozuo Rehmannia, pp. 856-859.
Zhang Shengwu
Northwest Normal Univ.
Li Kongwen
West Anhui Univ.
Zhang Xiaozhou
Northwest Normal Univ.
ThC 7.7
An Adaptive Neural PID Controller for Torque Control of Hybrid
Electric Vehicle, pp. 901-903.
Yun Zhang
Changchun Inst. of Tech.
Mingshuang Bi
Water Resources Department
of the Jilin Province
Xiumin Yu
Jinlin Univ.
Sina Xu
Jinlin Univ.
ThC 6.10
A New Scheme for 3D Face Recognition Based on 2D Gabor
Wavelet Transform Plus LBP, pp. 860-865.
Yi Jin
Beijing Jiaotong Univ.
Yizhi Wang
Beijing Jiaotong Univ.
Qiuqi Ruan
Beijing Jiaotong Univ.
Xueqiao Wang
Beijing Jiaotong Univ.
ThC 7.8
Study on Direct Torque Control System of Switched Reluctance
Motor, pp. 904-908.
Ji Keyan
Changchun Inst. of Tech.
Zhang Zhuo
Changchun Inst. of Tech.
ThC 6.11
3D Surface Stagnography Using Geometry Images, pp. 866-870.
Qing Huang
Louisiana State Univ.
S. S. Iyengar
Louisiana State Univ.
Xin Li
Louisiana State Univ.
ThC 7.9
Research on Improved SIFT Feature Matching Arithmetic in the
SAR Vision Matching Aided Navigation, pp. 909-914.
Xiong Zhi
Nanjing Univ. of Aeronautics & Astronautics
Wang Dan
Nanjing Univ. of Aeronautics & Astronautics
Zhang Dan
Nanjing Univ. of Aeronautics & Astronautics
Liu Jianye
Nanjing Univ. of Aeronautics & Astronautics
ThC 6.12
Dynamic Harmonic Texture Mapping using Methods of
Fundamental Solutions, pp. 871-875.
Huanhuan Xu
Louisiana State Univ.
Xin Li
Louisiana State Univ.
ThC 7.10
Design of a Large Scale Wind Turbine Generator Set Yaw
System, pp. 915-918.
Liu Wenzhou
Changchun Inst. of Tech.
Cai Changqing
Changchun Inst. of Tech.
Zhang Zhuo
Changchun Inst. of Tech.
ThC 7
Control Technology
ThC 7.1
Research and Design of the New System Combined with Mine
and Torpedo, pp. 876-879.
Ye Binqiang
Chongqing Univ. of Tech.
Zhao Mingfu
Chongqing Univ. of Tech.
Deng Yiyuan
Chongqing Univ. of Tech.
Xu Zhongyu
Chongqing Univ. of Tech.
Wang Yi
Chongqing Univ. of Tech.
Liao Hao
Chongqing Univ. of Sci. & Tech.
ThC 7.11
Study on Vehicle Magnetic Particle Clutch Control and Bench
Test, pp. 919-922.
Shanzhen Xu
Huaiyin Inst. of Tech.
Cheng Wang
Huaiyin Inst. of Tech.
ThC 7.2
Studies on Wireless Data -collecting System of Thermodynamic
Properties of Steam Turbine, pp. 880-883.
Ji Pengwei
Changchun Inst. of Tech.
Cai Changqing
Changchun Inst. of Tech.
ThC 7.12
Fault-tolerant Control with Finite-time Stability for Switched Linear
Systems, pp. 923-927.
Shu Gao
Xiamen Univ.
Xiaoli Zhang
Xiamen Univ.
ThC 7.3
Research on Technology for Quality Regulation and Control of
Electrical Energy from Power Distribution Network, pp. 884-887.
Zhang Zhuo
Changchun Inst. of Tech.
Cai Changqing
Changchun Inst. of Tech.
Ji Xiu
Changchun Inst. of Tech.
Ao Ming
Electric Power Research Inst. of Jilin
Electric Power Co., Ltd
Liu Wenzhou
Changchun Inst. of Tech.
ThC 7.13
Robust Stablization for a Class of Large Envelope Flight Control
Systems, pp. 928-932.
Lixia Cheng
Xiamen Univ.
Yabin Yan
Xiamen Univ.
Jianping Zeng
Xiamen Univ.
ThC 7.14
Model Identification and Control of a Small-Scale Unmanned
Helicopter, pp. 933-937.
Guanlin Wang
Tsinghua Univ.
Jihong Zhu
Tsinghua Univ.
Hui Xia
Nanjing Univ. of Sci. & Tech.
ThC 7.4
The Research on Data Processing for Dynamic
Batching-weighing System, pp. 888-890.
Zhang Ying
Shenzhen Entry-Exit Inspection &
Quarantine Bureau
Hou Yunbin
Harbin Inst. of Tech. Shenzhen
Graduate School
Liu Min
Shenzhen Entry-Exit Inspection &
Quarantine Bureau
ThC 8
Database Technology
ThC 8.1
Research on the Visualization of Data Mining Results, pp.
938-941.
Chen Chen Chinese People's Armed Police Force Academy
ThC 7.5
28
Liang Zhisheng
Ou Xu
ThC 8.2
One-to-Many Data Conversions by Extending Relational Algebra,
pp. 942-945.
Wang Jianbo
Hunan Inst. of Humanities, Sci. & Tech.
Wu Jinqun
Loudi Vocational & Technical College
Chen Xinbo
Loudi Vocational & Technical College
Guangxi Medical Univ.
Guangxi Medical Univ.
ThC 9.5
Research on Student Support Model in M-Learning, pp. 991-994.
Zhizhen Yang
Shanghai Second Polytechnic Univ.
Shiming Zhang
Shanghai Second Polytechnic Univ.
ThC 8.3
LDA-based Model for Topic Evolution Mining on Text, pp.
946-949.
Qingqiang Wu
Xiamen Univ.
Caidong Zhang
Xiamen Univ.
Xiang Deng
Xiamen Univ.
Changlong Jiang
Xiamen Univ.
ThC 9.6
The Model of Networked Learning Environment for E-Learning
Based on Groupware Technology, pp. 995-998.
Yan Jun
Xi'an Univ. of Tech.
Li Suicheng
Xi'an Univ. of Tech.
Huang Rui
Xi'an Univ. of Tech.
ThC 9.7
Research on Computer Network Experiment Curricular System
Based on Network Technologies, pp. 999-1002.
Peng Hehuan
Tianmu College of Zhejiang A & F Univ.
Wang Huiting
Tianmu College of Zhejiang A & F Univ.
Ma Zeyun
Tianmu College of Zhejiang A & F Univ.
ThC 8.4
A Novel Lightweight Iteration Filtering Algorithm Research in
Wireless Sensor Networks, pp. 950-954.
Linghong Lv
Ningbo Univ.
Zhijun Xie
Ningbo Univ.
Jun Zheng
Ningbo Digital Televition CO.LTD
ThC 9.8
Oral Business English Network Course Design in Secondary
Vocational School, pp. 1003-1005.
Huang Xingyun
Mech. & Elec. Industry School
Ou Qizhong
Guangxi Teachers Education Univ.
ThC 8.5
Mining Group Correlations over Data Streams, pp. 955-959.
Zhijie Wang
Ningbo Univ.
Jiangbo Qian
Ningbo Univ.
Maochun Zhou
Ningbo Univ.
Yihong Dong
Ningbo Univ.
Huahui Chen
Ningbo Univ.
ThC 9.9
A Formal Model of Personalized Recommendation Systems in
Intelligent Tutoring Systems, pp. 1006-1009.
Li Zhiping
Yunnan Normal Univ.
Sun Yu
Yunnan Normal Univ.
Xu Tianwei
Yunnan Normal Univ.
ThC 8.6
Statistical Method Based Computer Fault Prediction Model for
Large Computer Centers, pp. 960-964.
Zhixin Tie
Zhejiang Sci-Tech Univ.
Hong Zhuang
Zhejiang Sci-Tech Univ.
Qiang Luo
Zhejiang Sci-Tech Univ.
Lingbing Tao
Zhejiang Sci-Tech Univ.
ThC 9.10
Survey Research on College Students’ English Learning Anxiety
in the Computer Network Environment, pp. 1010-1012.
Shen Lixia
Zhejiang A & F Univeristy
ThC 8.7
Wavelet Decomposition Algorithm for Uncertain Data Streams,
pp. 965-970.
Liao Kangli
Ningbo Univ.
Chen Huahui
Ningbo Univ.
Qian Jiangbo
Ningbo Univ.
Dong Yihong
Ningbo Univ.
ThC 9.11
Bulid A Laboratory Cloud for Computer Network Education, pp.
1013-1018.
Chenyang Yan
Ningbo City College of Vocational Tech.
ThC 9.12
Development Network Teaching Platform of Digital Image
Processing Course Based On J2EE, pp. 1019-1022.
Liu Qun
Shaoguan Univ.
ThC 8.8
The Research on Building a Global Customer Centered Data
Warehouse System, pp. 971-973.
Wei Xu
China Industrial Bank
Li Maoqing
Xiamen Univ.
ThC 9.13
Emprical Study on Online Interaction Based on Learning Style
Differences, pp. 1023-1026.
Zhou Jingwei
Taishan College
ThC 9
E-Learning
ThC 9.14
Incorporating Social Opinion in Content Selection for an
E-Learning Course, pp. 1027-1032.
Richa Sharma
Univ. of Delhi
Hema Banati
Univ. of Delhi
Punam Bedi
Univ. of Delhi
ThC 9.1
Online Experiment Mode of Computer Basic Courses Based on
ISM Method, pp. 974-977.
Ying Liang
Southwest Univ.
ThC 9.2
Learning on the Move----A Case Study of Mobile Learning
Assisted English Reading Instruction in Chinese Tertiary
Education, pp. 978-983.
Yu Li
Henan Univ. of Finance & Law
Ji Li
Zhengzhou Normal Univ.
ThC 9.15
Application of Innovative Technologies on the E-learning System,
pp. 1033-1036.
Jianxia Chen
Hubei Univ. of Tech.
Qianqian Li
Hubei Univ. of Tech.
Cleve Yeo Keng Lin
Temasek Polytechnic Singapore
Huapeng Chang
Temasek Polytechnic Singapore
Chunzhi Wang
Hubei Univ. of Tech.
ThC 9.3
Design and Development Based on PBL Online Course, pp.
984-987.
Zhao Yanyan
Helongjiang Inst. of Sci. & Tech.
ThC 9.16
The Research on the Applications of Information Technologies
for Distance Education, pp. 1037-1040.
Guangxi Economical Management
Li Yumei
College for Cadres
ThC 9.4
Technical Analysis of Mobile Learning Application in High
Education, pp. 988-990.
Gao Kun
Guangxi Medical Univ.
ThC 9.17
29
Exploration of a New Approach for Designing Online English
Language Learning Materials, pp. 1041-1046.
Jie Hu
Chongqing Univ.
Shi Jianghong
Zeng Zhihong
Zhang Dezhong
Zhou Liping
Chen Huihuang
ThC 10
Networking Technology
Xiamen Univ.
Xiamen Univ.
Xiamen Univ.
Xiamen Univ.
Xiamen Univ.
ThC 10.12
Transient Fingerprint Feature Extraction for WLAN Cards Based
on Polynomial Fitting, pp. 1099-1102.
Caidan Zhao
Xiamen Univ.
Lianfen Huang
Xiamen Univ.
Liting Hu
Xiamen Univ.
Yan Yao
Xiamen Univ.
ThC 10.1
A Dynamic Frame Partitioning Scheme for IEEE 802.16 Mesh
Networks, pp. 1047-1050.
Zhengbao Liu
Xiamen Univ.
Yi Jiang
Xiamen Univ.
Zhixiong Liu
Xiamen Univ.
Yuliang Tang
Xiamen Univ.
ThC 11
Software Engineering
ThC 10.2
Study on Digital Campus IT Infrastructure Virtualization, pp.
1051-1053.
Luo Guowei
Guangxi Teachers Education Univ.
ThC 11.1
Research on Growth Model Management System of Fruit Tree
Based on Modern Information Technology, pp. 1103-1106.
Song Jianwei
Shijiazhuang Univ.
Wu Shuomei
Shijiazhuang Univ.
Fan Yabin
Shijiazhuang Univ.
Du Xiaoning
China Nuclear Power Engineering Corporation
ThC 10.3
Reactive Power Optimization of Distribution Network Based on
GA with Simulated Annealing Selection, pp. 1054-1057.
Zhou Shan
Changchun Inst. of Tech.
Liu Wenzhou
Changchun Inst. of Tech.
Cai Changqing
Changchun Inst. of Tech.
Zhang Li
Base of Chinese People's Laberation
Army Air Force Aviation Univ.
ThC 11.2
Program Slicing Research Based on MSV in Software Security
Field, pp. 1107-1110.
Zhonglin Zhang
Lanzhoujiaotong Univ.
Muyu Lin
Lanzhoujiaotong Univ.
ThC 10.4
Research on Multiple Coverage and Connectivity for Wireless
Sensor Network, pp. 1058-1062.
Wang Jianzhen
Business College of Shanxi Univ.
Guan Zhiyan
Business College of Shanxi Univ.
ThC 11.3
Semantic Web Service Framework Based on Agent and Its
Logical Description, pp. 1111-1114.
Zou Jinan
Putian College
Lin Jianbing
Putian College
ThC 10.5
Achieving Operational Efficiency with Cloud Based Services, pp.
1063-1068.
Karthik V Bellur
National Inst. of Tech. Karnataka
Krupal M
National Inst. of Tech. Karnataka
Praveen Jain
National Inst. of Tech. Karnataka
Dr.Prakash Raghavendra
National Inst. of Tech. Karnataka
ThC 11.4
CiFeature: A Context-Independent Feature-Oriented Software
Development Approach, pp. 1115-1122.
Mehran Kavand
Payam Noor Univ.
Saeed Paarsa
Iran Univ. of Sci. & Tech.
Ahmad Faraahi
Payam Noor Univ.
ThC 10.6
A Beacon-based Handover Scanning Mechanism with QoS
Support in WiMAX FemtoCell Architecture, pp. 1069-1074.
Han-Jung Chueh
National Chung-Hsing Univ.
Fumin Chang
Chaoyang Univ. of Tech.
Shang-Juh Kao
National Chung-Hsing Univ.
ThC 11.5
Research on Anti-Interference Algorithm for Web Service Trust
Evaluation, pp. 1123-1126.
Jianbin Wu
Zhejiang Normal Univ.
ThC 10.7
An Anycast Routing Algorithm Based on Simplified Particle
Swarm Optimization and Diversity Strategy, pp. 1075-1079.
Taoshen Li
Guangxi Univ.
Zhigang Zhao
Guangxi Univ.
ThC 11.6
Verifying Web Services Composition Based on LTL and Colored
Petri Net, pp. 1127-1130.
Jihan Zhu
Soochow Univ.
Kan Zhang
Soochow Univ.
Guangquan Zhang
Soochow Univ.
ThC 10.8
Remote Monitoring of Indoor Environment Using Mobile Robot
Based Wireless Sensor Network , pp. 1080-1084.
Joshua D Freeman
Amrita Univ.
Simi S
Amrita Univ.
ThC 11.7
An Aspect-Oriented Extension to MiniJava and Its
Implementation, pp. 1131-1135.
Xuelian Hu
Anhui Univ.
Ying Zhang
Hefei Univ. of Tech.
ThC 10.9
A Research into The Latent Danger of WLAN, pp. 1085-1090.
Dongsheng Yin
Sun Yat-sen Univ.
Kai Cui
Sun Yat-sen Univ.
ThC 11.8
Counterexample Generation and Representation in Model
Checking for Probabilistic Timed Automata, pp. 1136-1141.
Jianfeng Wu
Soochow Univ.
Jin Wang
Soochow Univ.
Mei Rong
Jinan Univ.
Guangquan Zhang
Soochow Univ.
Jihan Zhu
Soochow Univ.
ThC 10.10
Research on the IPv6 Performance Analysis Based on
Dual-Protocol Stack and Tunnel Transition, pp. 1091-1093.
Yingjiao Wu
Women & Children's Central Hospital
Xiaoqing Zhou
Women & Children's Central Hospital
ThC 11.9
The Research and Implementation Based on OpenOffice.org
Uighur Office Suite Software, pp. 1142-1146.
Baoshe Yuan
Xinjiang Univ.
Wu Shouer
Xinjiang Univ.
ThC 10.11
Performance Evaluation of the IEEE 802.11 MAC for Mobile
Wireless Sensor Networks, pp. 1094-1098.
Zhong Ping
Xiamen Univ.
30
ThC 11.10
The Research on Collocation Networks of Relation Words In
Modern Chinese Language, pp. 1147-1150.
Hu Quan
Hua Zhong Normal Univ.
Jinzhu Hu
Hua Zhong Normal Univ.
Xie Fang
Hubei Univ. of Tech.
ThC 11.21
Supply Chains Longitudinal Competition-cooperation Games
Analysis Based on Reference Chain, pp. 1198-1203.
Hu Xianwu
City College Wenzhou Univ.
ThC 11.22
An Analysis and Simulation on Air Film of a Pneumatic Strip
Shape Measuring Roll, pp. 1204-1207.
Xiaoming Hu
Huaiyin Inst. of Tech.
ThC 11.11
A Library for Parallel Programming with Multi-core Computer, pp.
1151-1153.
Qing Li
Shanghai Univ.
Wu Zhang
Shanghai Univ.
ThC 11.23
Study on the Engine Test and Fault Diagnosis System Based on
the Information Fusion Technique, pp. 1208-1210.
Cheng Wang
Huaiyin Inst. of Tech.
Shanzhen Xu
Huaiyin Inst. of Tech.
ThC 11.12
Demo System of Amplitude Modulation Based on Java, pp.
1154-1158.
Zhang Shuiying
Zhejiang Sci-Tech Univ.
Du Jingjing
Zhejiang Sci-Tech Univ.
Jin Xuebo
Zhejiang Sci-Tech Univ.
Yang Runkai
Zhejiang Sci-Tech Univ.
ThC 11.24
An Empirical Study on Paying Rate of Basic Pension Insurance
based on Probabilistic Voting Model, pp. 1211-1216.
Rong Li
Beihang Univ.
Lin Jian
Tsinghua Univ.
ThC 11.13
Modeling Aspect-oriented Software Architecture Based on
ACME, pp. 1159-1164.
Mei Rong
Shenzhen Tourism College
Changlin Liu
Soochow Univ.
Guangquan Zhang
Soochow Univ.
ThC 11.25
Reliability Study of Complex Power Systems, pp. 1217-1222.
Zhang Ning
Xiamen Univ.
Lu Yanan
Southwest Univ. for Nationalities
Ye Tengfei
Xiamen Univ.
Zheng Siting
Xiamen Univ.
ThC 11.14
A Method for Detecting Mismatch of Time-Aware Web Services
Based on SMT, pp. 1165-1169.
Xiyan Wang
Soochow Univ.
Shenbiao Chen
Soochow Univ.
Guangquan Zhang
Soochow Univ.
Zhu Jihan
Soochow Univ.
Jianfeng Wu
Soochow Univ.
ThC 12
Teaching Mode
ThC 12.1
A Study on Profession Ability Structure and Teaching Mode
Reform, pp. 1223-1226.
Yadong Wang
Tianjin Univ. of Tech. & Education
Changzeng Wei
Tianjin Univ. of Tech. & Education
Zhixin Zhou
Tianjin Univ. of Tech. & Education
ThC 11.15
Modeling Equipment Campaign Based on MASON Platform , pp.
1170-1174.
Yuefeng Chen
66393 Units
63963 Units
Shunwang Xiao
63963 Units
Yefu Wang
63963 Units
Zhongyuan Zhang
63963 Units
ThC 12.2
Constructing Informal Learning Mode Based on Social Software,
pp. 1227-1230.
Yuan Jiugen
Jiangxi Sci. & Tech. Normal Univ.
Xing Ruonan
Jiangxi Normal Univ.
Hu Xiaoqiang
Jiangxi Sci. & Tech. Normal Univ.
ThC 11.16
An ANN Verifying Approach to Equipment Compaign Model, pp.
1175-1179.
Shunwang Xiao
63963 Units
Yuefeng Chen
66393 Units
63963 Units
Yuangsheng Dong
63963 Units
Feng Liu
63963 Units
ThC 12.3
The Practice of the Student-centered and Teacher-guided Data
Structure Teaching Mode, pp. 1231-1234.
Yue Chen
Zhengzhou Inst. of Info. Sci. & Tech.
Jing Cao
Zhengzhou Inst. of Info. Sci. & Tech.
Qing Dai
Zhengzhou Inst. of Info. Sci. & Tech.
Chengshi Gao
Zhengzhou Inst. of Info. Sci. & Tech.
ThC 11.17
Information Technologies, Organizational Cultures and
Knowledge Management, pp. 1180-1185.
Shumei Tseng
I-Shou Univ.
ThC 12.4
The Research and Reform Based on CDIO in Data Structure, pp.
1235-1238.
Huijuan Qi
Shiiazhuang Inst. of Railway Tech.
Lina Liu
Shiiazhuang Inst. of Railway Tech.
Dexiong Li
Shiiazhuang Inst. of Railway Tech.
ThC 11.18
Liveness Rules from Fairness Based on TLA, pp. 1186-1188.
Wan Liang
Guizhou Univ.
ThC 12.5
Concordance-based Learning and Teaching of Grammar, pp.
1239-1242.
Tang Xuemei
Anhui Polytechnic Univ.
ThC 11.19
Geometric Identification of Search States on (F~,F)-information,
pp. 1189-1193.
Yuying Li
Ningde Normal Univ.
Li Zhang
Shangdong Univ.
Shiliang Zhang
Ningde Normal Univ.
Qunsheng Ruan
Ningde Normal Univ.
ThC 12.6
Teaching Explorations of Basics of Computer Applications, pp.
1243-1245.
Zou Quan
Xiamen Univ.
Li Xubin
Xiamen Univ.
Lin Chen
Xiamen Univ.
ThC 11.20
The Construction and Development of School Practice Base, pp.
1194-1197.
Yuan Hongyan
Yantai Univ.
Liu Jiangxia
Yantai Univ.
Yu Bo
Yantai Univ.
ThC 12.7
The Design and Application of Geography Experimental
Simulation Platform, pp. 1246-1250.
31
Jiang Huixian
Lin Guangfa
Fujian Normal Univ.
Fujian Normal Univ.
ThC 12.19
A Qualitative Study in Middle School on Information Technology
Teaching Model, pp. 1296-1300.
Minhua Wu
Capital Normal Univ.
Weili Peng
Capital Normal Univ.
ThC 12.8
The Study of New Teaching Method in Dynamic Circuit Response
Analysis, pp. 1251-1254.
Sheng Guizhen
Changchun Inst. of Technolog
Cai Changqing
Changchun Inst. of Tech.
Zhao Yan
Univ. of Sci. & Tech. of China
ThC 12.20
Teaching Method Reform of the Drawing Course by Integrating
CDIO Mode, pp. 1301-1302.
Lina Yuan
Wuyi Univ.
Ling Wang
Wuyi Univ.
ThC 12.9
An Application-Driven Teaching Model for Series Curriculum, pp.
1255-1259.
Min Cao
Shanghai Univ.
Haiqiang Li
Shanghai Univ.
ThC 13
Web Application
ThC 13.1
A Novel Verification Code Technology to Make Your System
More Secure, pp. 1303-1306.
Dancheng Li
Northeastern Univ.
Qiang Wei
Northeastern Univ.
Liu Zhiliang
Northeastern Univ.
Binsheng Liu
Northeastern Univ.
ThC 12.10
Research of VB Programming Teaching Mode Based on the Core
of Computational Thinking Ability Training, pp. 1260-1263.
Chunying Zhang
Hebei United Univ.
Xiao Chen
Hebei United Univ.
Jianjing Li
Hebei United Univ.
ThC 12.11
CDIO in Websit Design Education, pp. 1264-1266.
Liu Yang
Shijiazhuang Inst. of Railway Tech.
Li Xiaonan
Shijiazhuang Inst. of Railway Tech.
Zheng Hua
Shijiazhuang Inst. of Railway Tech.
Liu Jia
Shijiazhuang Inst. of Railway Tech.
ThC 13.2
Investigation and Analysis and Optimizing Countermeasures of
Current Website Construction of Top Third-class Hospital in
Shandong Province, pp. 1307-1310.
Song Guojian
Jining Medical College
Wang Qianfei
Jining Medical College
Chu Hongrui
Jining Medical College
ThC 12.12
Reforming to Improve the Teaching Quality of Computer
Programming Language, pp. 1267-1269.
Rongfang Gao
Xi'an Shiyou Univ.
ThC 13.3
A Method of CAD/CAE Data Integration Based on XML, pp.
1311-1314.
Yi Zhang
Chongqing Univ.
Li Hua
Worcester Polytechnic Inst.
ThC 12.13
A Teaching Model Based on Schema Theory in Computer
Programming Curriculum, pp. 1270-1272.
Tiezheng Sun
Changchun Univ. of Sci. & Tech.
Chunyang Qiu
Jilin Univ. of Finance & Economics
Jianhua Jiang
Jilin Univ. of Finance & Economics
ThC 13.4
Design of LAN-export Flow Control Strategy Based on
Application Layer Channel, pp. 1315-1318.
Ni Sheng
Guangxi Medical Univ.
Tang Zhong
Guangxi Medical Univ.
ThC 12.14
The Exploration on Task-driving Teaching Mode of Network
Security Course Reformation and Construction, pp. 1273-1276.
Yu Han
Dalian Univ. of Tech.
Naigao Jin
Dalian Univ. of Tech.
Hong Yu
Dalian Univ. of Tech.
Zhenquan Qin
Dalian Univ. of Tech.
ThC 13.5
A Web Service QoS Prediction Approach Based on
Multi-Dimension QoS, pp. 1319-1322.
Lu Li
Suzhou Vocational Univ.
Mei Rong
Jinan Univ.
Guangquan Zhang
Soochow Univ.
ThC 12.15
Study and Practice on CDIO Innovative Education, pp.
1277-1281.
Jiang Fan
Guangzhou Univ.
Zhang Chunliang
Guangzhou Univ.
Wang Yijun
Guangzhou Univ.
Xiao Zhongmin
Guangzhou Univ.
ThC 13.6
On the Formalization of Aggregate Relation Based on Ontology
and Its Implement of OWL, pp. 1323-1326.
Zhao Bo
Yunnan Normal Univ.
Duan Chongjiang
Yunnan Normal Univ.
Zhang Jie
Yunnan Normal Univ.
ThC 13.7
Portal-based Design for SaaS System Presentation Layer
Configurability, pp. 1327-1330.
Dancheng Li
Northeastern Univ.
Wei Zhang
Northeastern Univ.
Shuangshuang Zhou
Northeastern Univ.
Cheng Liu
Northeastern Univ.
Weipeng Jin
Northeastern Univ.
ThC 12.16
The Construction of the Specialty of Information Management
and Information System Based on CDIO Mode, pp. 1282-1285.
Ying Hua
Suzhou Vocational Univ.
Min Xu
Suzhou Vocational Univ.
ThC 12.17
Computer Engineering Education Reform Based on CDIO, pp.
1286-1290.
Sun Jingdong
Southwest Jiaotong Univ.
Wang Zhengbin
Southwest Jiaotong Univ.
Zhang Yan
Southwest Jiaotong Univ.
Wang Yao
Southwest Jiaotong Univ.
ThC 13.8
The Relationship of Motivation and Self-Regulation in Web-
Based Autonomous English Learning, pp. 1331-1334.
Haiyan Li
North China Electric Power Univ.
ThC 13.9
The Three-dimensional Way to Describe and Build the Complex
Web Service Composition System, pp. 1335-1339.
Li Dancheng
Northeastern Univ.
Zhang Ming
Northeastern Univ.
Liu Cheng
Northeastern Univ.
ThC 12.18
Learning Effect for Students with Game-based Learning on
Meta-Analysis, pp. 1291-1295.
Tsungli Wang
Shu-Te Univ.
Yafen Tseng
Chung Hwa Univ. of Medical Tech.
32
Liu Binsheng
Northeastern Univ.
Chenghung Chuang
ThC 13.10
Personalized Recommendation Using Implicit Interaction
Information, pp. 1340-1345.
Liu Nancheng
Xianmen Univ.
Qingshan Jiang
Shenzhen Inst.s of Advanced Tech.
Chinese Academy of Sci.s
Haishan Chen
Xiamen Univ.
Beizhan Wang
Xiamen Univ.
Asia Univ.
FrA 1.9
Design of Representaiton Scheme towards Better Image Search,
pp. 1400-1403.
Shikui Wei
Beijing Jiaotong Univ.
Yao Zhao
Beijing Jiaotong Univ.
Zhenfeng Zhu
Beijing Jiaotong Univ.
FrA 1.10
Robust LMI Based Control of Wheeled Mobile Robots, pp.
1404-1409.
A.Dolly Mary
National Inst. of Tech., India
ThC 13.11
Optimization of Remote Monitoring of Cathodic Protection Power
Supply System Base on Four-tier Structure and B/S Model, pp.
1346-1350.
Liu Ting
Wuhan Univ. of Tech.
Zhao Xing
Wuhan Univ. of Tech.
FrA 1.11
An Efficient Uplink Scheduling Mechanism with enabling
Multi-device Transmission and Maximum Latency Fulfillment in
IEEE 802.16j Networks, pp. 1410-1415.
Fumin Chang
Chaoyang Univ. of Tech.
I-Ping Hsieh
National Chung-Hsing Univ.
Shang-Juh Kao
National Chung-Hsing Univ.
ThC 13.12
A Mobile Learning System Based on WAP, pp. 1351-1354.
Wei Ying
Zhejiang Univ.
FrA 1.12
Topic-special Information Extraction of Online Store, pp.
1416-1420.
Zheng Siting
Xiamen Univ.
Zhang Ning
Xiamen Univ.
Yang Fan
Xiamen Univ.
FrA 1
Artificial Intelligence
FrA 1.1
Multi-objective Optimization Using Genetic
Algorithm:Applications to Imperfect Preventive Maintenance
Model, pp. 1355-1360.
Chung-Ho Wang
National Defense Univ.
Sheng-Wang Tsai
National Defense Univ.
FrA 2
Computer Education
FrA 1.2
Margin Based Variable Importance for Random Forest, pp.
1361-1366.
Yang Fan
Xiamen Univ.
Li Xuan
Xiamen Univ.
Zhou Qifeng
Xiamen Univ.
Luo Linkai
Xiamen Univ.
FrA 2.1
The Research of Construction of the Diversified Training Mode to
Graduate Students, pp. 1421-1424.
Wang Chunzhi
Hubei Univ. of Tech.
Hong Li
Hubei Univ. of Tech.
Jiang Wei
Hubei Univ. of Tech.
FrA 2.2
Computer-Assisted Formative Assessment in Language
Classrooms: Focus and Forms, pp. 1425-1428.
Cheng Ke
Beijing Union Univ.
Wang Yingwei
Beijing Union Univ.
Hou Xiaoli
Beijing Union Univ.
Yang Yajun
Beijing Union Univ.
FrA 1.3
System-level Modeling and Performance Analysis of IEEE802.11
Wireless Communication Protocol, pp. 1367-1372.
Zhangqin Huang
Beijing Univ. of Tech.
Chunhua Xiao
Beijing Univ. of Tech.
Zhiqiang Wang
Beijing Univ. of Tech.
FrA 1.4
A Vertical Handover Scheme from WMAN to WLAN by Taking
into Account the Maximum Available Resource, pp. 1373-1378.
Hsiu-Lang Wang
National Chung-Hsing Univ.
Shang-Juh Kao
National Chung-Hsing Univ.
FrA 2.3
The Outline Plan of Beijing Open Learning System, pp.
1429-1432.
Ma Rong
Beijing open Univ.
FrA 2.4
Teaching Data Structures and Software Architecture while
Constructing Curriculum Platform, pp. 1433-1437.
Min Cao
Shanghai Univ.
Zhen Cao
Shanghai Univ.
FrA 1.5
APlag: A Plagiarism Checker for Arabic Texts, pp. 1379-1383.
Mohamed El Bachir Menai
King Saud Univ.
Manar Bagais
King Saud Univ.
FrA 1.6
A FPGA Based Digital Design Training Platform, pp. 1384-1389.
M.Serdar BASCIL
Sakarya Univ.
Irfan YAZICI
Sakarya Univ.
Feyzullah TEMURTAS
Bozok Univ.
FrA 2.5
The Design and Implementation of Routing and Switching
Platform and Applications in an Experiment Teaching, pp.
1438-1441.
Deng Beixing
Tsinghua Univ.
Xu Shuzhen
Tsinghua Univ.
FrA 1.7
A Survey of Topology Denoise Technologies, pp. 1390-1395.
Zhang Ning
Xiamen Univ.
Ye Tengfei
Xiamen Univ.
Wuyi Yu
Xiamen Univ.
Maoqing Li
Xiamen Univ.
Xin Li
Louisiana State Univ.
FrA 2.6
The Practice and Probe about Training Mode in Master of
Engineering of Computer Science, pp. 1442-1444.
Shiping Lin
Fuzhou Univ.
FrA 2.7
Higher Learning Institution - Industry Collaboration: A Necessity
to Improve Teaching and Learning Process, pp. 1445-1449.
Kalaimagal Ramakrishnan
Univ. Malaya
Norizan Mohd Yasin
Univ. Malaya
FrA 1.8
Detecting Frame Duplication Based on Spatial and Temporal
Analyses, pp. 1396-1399.
Guoshiang Lin
Da-Yeh Univ.
Jiefan Chang
Da-Yeh Univ.
FrA 2.8
33
Application of Mini Case Study in Computer Networks, pp.
1450-1453.
Ganlin Wang
Shanghai Ocean Univ.
Runyuan Yin
Shanghai Ocean Univ.
Xiaohua Yuan
Shanghai Ocean Univ.
FrA 2.11
Research on Teaching Reform of Computer Science and
Technology Speciality in General Education, pp. 1463-1467.
Shen Yunfu
Shanghai Univ.
Dong Xiaowen
Shanghai Univ.
FrA 2.9
Screen Education: Contemporary University Students’ Contexts
and Problems of Media Literacy, pp. 1454-1459.
Wu Zhibin
Nanjing Univ. of Aeronautics & Astronautics
Jiang Zhaojun
Nanjing Univ. of Aeronautics & Astronautics
FrA 2.12
ABMT-An Automated Support Based Rule Mining Technique, pp.
1468-1473.
Ashwin C S
Information Technology, India
Dinesh Kumar J
Information Technology, India
Gugan L
Information Technology, India
Harihar M V
Information Technology, India
Kousik M
Information Technology, India
Vijay Krishnan K
Information Technology, India
FrA 2.10
Teaching Reform and Practice of Database Principles, pp.
1460-1462.
Yu Zheng
Shanghai Univ.
Jianquan Dong
Shanghai Univ.
34
Book of Abstracts
35
This Page Intentionally Left Blank.
36
Zhejiang Inst. of Mechanical &
Feng Hanrong
Electrical Engineering
As the teaching reform of basic computer science grows, the
course requirements have become increasingly higher. This paper
analyzes the necessity for implementing individualized teaching
models and introduces the process of carrying out the
individualized teaching of basic computer in the past two years.
We have explored and experimented with a threescaled
individualized teaching model from the respects of teaching
syllabi, teaching methods, practical training and assessments.
After doing so, we have achieved some desired results, and
provided some references for the teaching reform of basic
computer science in vocational colleges.
MoA 1
Artificial Intelligence
MoA 1.1
The Calculation Approach of the Nearest Neighbor Distance of
Chaotic Time Series’s Reconstructed Space, pp. 1-5.
Gong Zhuping
South China Univ. of Tech.
Zhao Kuiling
South China Univ. of Tech.
For the rapid develop of computer speed, the small calculating
advantage of ∞-norm is gone when the nearest points of chaotic
time series’s reconstructed space are found by 2-norm or ∞-norm.
So the right method should be selected on the basis of
reconsidered the two methods. By theories analysis, the ratio
between ∞-norm distance and 2-norm distance is in an inherent
interval. Huanan Zhixin and Lorenz data are used for verified the
effect of finding the nearest points by the two norms. The nearest
points is partly the same by the two norms and the found same
point rate is different between two time series. And the nearest
distance calculating by 2-norm between the point pair finding by
∞-norm is equal or great than the point pair finding by 2-norm. So
the real nearest point is found by 2-norm.
MoA 1.6
The Design and Research Based on the Intrusion Detection Model
of Packet Filtering Technology, pp. 22-23.
Li Cuizhi
Business College of Shanxi Univ.
Zhang Hui
Business College of Shanxi Univ.
Wu Liping
Business College of Shanxi Univ.
This paper presents an efficient intrusion detection model for
packet processing. Packet capture device detect the network data
packets directly after capture them, instead of detecting them
after restructuring , thus the efficiency of detection can be
improved. Current products of intrusion detection use the packet
restructuring mechanism in order to reduce the false negative rate
of the system. The model process the packet restructuring
mechanism combined with the data packets .This model improve
the efficiency of detection system on the basis of ensuring the
detection to the integrity of the attacks.
MoA 1.2
Delay-Dependent Robust Stability and Stabilization for
Norm-Bounded Uncertain Systems with Time-Varying Delay, pp.
6-11.
Li Lee
National Sun Yat-Sen Univ.
Junshen Chen
National Sun Yat-Sen Univ.
The paper addresses robust stability and stabilization for
continuous time-delay systems with norm-bounded uncertainty.
The delay is assumed time-varying with both its value and
variation rate being bounded. Based on a new
Lyapunov-Krasovskii functional and the application of delay
partitioning and the free-weighting matrix techniques, a set of
sufficient LMI conditions is obtained to ensure asymptotical
stability of the nominal system. Since there is no product term of
Lyapunov matrix with any system matrix, the robust stabilization
problem of computing a state feedback gain to cope with the
norm-bounded uncertainty can be solved with reduced
conservativeness. Numerical examples are given to show the
effectiveness and the improvement of the derived results.
MoA 2
Computer Application
MoA 2.1
The Apply of ID3 in Stock Analysis, pp. 24-27.
Chen Chen
Chinese People's Armed Police Force Academy
For macroeconomic, the prosperity of the stock market has
promoted the reasonable allocation of social resources and
broaden the financing channels. For personal, the stock has
provided investors with an excellent investment management
approach. However, the investment of stock is the opportunity to
achieve high returns with great investment risks. And how to
avoid the disadvantages become the most concerned topics of
broad investor. Based on company intrinsic value, the paper
expounds the influence to share price according to company
financial fundamentals. Using machine learning theory, this paper
built a stock investment decision tree model through the ID3
algorithm. It can provide decision support for future investment
through analysis current financial of the company and market
situation.
MoA 1.3
Study on Power E-Commerce Network Security Technique and
Design Based on Firewall, pp. 12-15.
Yang Liuqing
Fuzhou Vocational & Technical Inst.
Hu Yu
Fuzhou Vocational & Technical Inst.
Huang Weimin
Fuzhou Vocational & Technical Inst.
This paper summarized applications of Fire Wall in e-Commerce
security system and have set forth choice principle on fire wall;
have studied e-Commerce network security technique on Fire
Wall; analysed constructing e-Commerce network security
technology and applied to actual e-Commerce system design on
power.
MoA 2.2
A New Approach for Noisy Iris Database Indexing Based on Color
Information, pp. 28-31.
Qin Zhao
Taiyuan Univ.
Effective iris indexing method will both reduce the computational
complexity and enhance the matching accuracy of iris recognition
systems. In this paper, a new noisy iris indexing approach based
on iris color information is proposed. After color correction, this
method utilizes normalized color components to index the noisy
iris images. Hit rate and penetration rate are used to measure the
indexing performance of the proposed method. The effectiveness
evaluation is performed based on the UBIRIS.v2 database, and the
results are analyzed and discussed.
MoA 1.4
The Research and Practice of Inquiry Learning Model Based on the
Network Environment, pp. 16-18.
Jihua Ye
Jiangxi Normal Univ.
Dengwen Gan
Jiangxi Normal Univ.
Pingliao Zhu
Jiangxi Normal Univ.
Chunlan Wang
Jiangxi Vocational & Technical
College of Electricity
Discussed method and process about how to develop inquiry
learning based on nerwork environment .Researched inquiry
learning from the beginning,core,way,key point ,independent
evaluation,and the resources construction.Constructed a inquiry
learning website,and does the effective practise. The results are
good.
MoA 2.3
The Development and Designation of Visual Experiments on
Demonstration and Assembly of Computers, pp. 32-34.
Yu
Hongtao
Inner Mongolia Univ. for Nationalities
Bo Jinli
Inner Mongolia Univ. for Nationalities
It is imperative to demonstrate to students the peripheral
equipments of computers and how to connect them appropriately
in the rudimental courses on computer application. However,
MoA 1.5
Application of Individualized Teaching Model for Basic Computer
Science at Vocational Colleges, pp. 19-21.
Zhou Zili
Zhejiang Inst. of Mechanical &
Electrical Engineering
37
because of the large number of students taking the courses, it is
difficult for students to have a good observation of the
experiments while visual experiments are vivid in manifestation
and versatile to implement. Accordingly, in order to meet the
needs of experimental education, we have designed the visual
experiments on Demonstration and Assembly of Computers,
whose implementation is conducted as per the Cult3D technique.
MoA 3.1
Optimization Research of Building Exports Positions based on the
Evacuating Movement, pp. 52-55.
Song Bingxue
Univ. of Sci. & Tech. Beijing
Wang Ziyang
Beijing Jiaotong Univ.
To master group rules pedestrian movement emerged is prior to
construct and plan the base of pedestrians design rightness. The
existing research focuses on the research of pedestrian movement
rules, especially for behavior in evacuation. But there is just lack of
engineering practical calculation method with respect to
infrastructure layout optimization according to the pedestrian
movement characteristics. This paper puts forward a method
based on the cellular automata method to simulate group
behavior in the cases of evacuation. On this basis, this paper gives
the optimization method of the building export position.
Meanwhile, the method in the paper also considering the
construction cost, showing a strong practicability.
MoA 2.4
Based on Excel and Macro Designing Standardization Self-test
System, pp. 35-37.
Zhou Minghong
Business College of Shanxi Univ.
This paper focuses on the standardization self-test system design
based on excel and macro. Because excel is a software of most
people familiar and easy-to-use. And the function is very strong.
The system can use function of function,cell cite,macros in excel to
add amount of question database,modify score, arbitrary
extraction test from question database, give a mark to result etc.
This system can be as students learning self-test system arbitrary
course.
MoA 3.2
Parameters Optimization of Mechanical Arm PID Controllers
Based on CLPSO Algorithm, pp. 56-60.
Li Xiaolong
Southwest Jiaotong Univ.
Chen Yanjie
Hunan Univ.
Yu Xiao
Xiamen Univ.
This paper presents an improved algorithm named
Comprehensive Learning Particle Swarm Optimization (CLPSO).
CLPSO utilizes a novel learning strategy which has achieved the
goal to accelerate the convergence of the classic PSO. And CLPSO
algorithm is more effective to optimize PID controller`s
parameters than empirical tuning methods and classic PSO. The
simulation results show its better performance than traditional
ways in the PID parameters optimization for PID controllers in
mechanical arm system.
MoA 2.5
Discrimination of Varieties of Rice Using Near Infrared Spectral by
PCA and MDA Model, pp. 38-40.
Zhou Zili
Zhejiang Inst. of Mechanical &
Electrical Engineering
Jing Chunfeng
Zhejiang Inst. of Mechanical &
Electrical Engineering
Wu Di
Zhejiang Univ.
Li Xiaoli
Zhejiang Univ.
Shao Yongni
Zhejiang Univ.
In this research, a new method for discrimination of varieties of
rice by means of near infrared spectroscopy (NIRS) was
developed. First, the characteristic spectrums of rice were got
through principal component analysis (PCA). The result of the
analysis suggests that the reliabilities of first 4 principal
components are more than 99.338%. The 2-dimontional plot was
drawn with first and second principal components, which
indicates that it is a good clustering analysis for classification
varieties of rice. The several variables compressed by PCA were
used as inputs of multiple discriminant analysis (MDA).150
samples from three varieties were selected randomly, then they
were used to build discriminated model, 30 unknown samples
were predicted by this model, the recognition rate is 100%.
MoA 3.3
The Robust H∞ Control for Discrete-time Switched Interval
System, pp. 61-65.
Zhang Damin
Zhejiang Univ.
Zhang Xiaoli
Xiamen Univ.
Lu Zhengyu
Zhejiang Univ.
This paper discusses the robust H∞ control problem for
discrete-time switched interval system. The multiple Lyapunov
function method is combined with the Finsler’s Lemma to
generate several new results which provide extra degree of
freedom for stability analysis and control synthesis. A new
sufficient condition is obtained for the unforced discrete-time
switched interval system. then, based on the above discussion, the
robust H∞ control synthesis via state feedback is studied for the
closed-loop switched interval system. Finally, two simulation
examples are given to illustrate the validity of the results.
MoA 2.6
Design of Transcutaneous Coupling Wireless Charger, pp. 41-46.
Li Ning
Xiamen Univ.
Yu Xiao
Xiamen Univ.
Zhang Ning
Xiamen Univ.
The design of the transcutaneous coupling wireless energy
transmission system to drive the medical equipment lithium
batteries within the human body is introduced in this paper. This
work is based on Micro Control Unit. Compared with the
traditional charger, this kind of transcutaneous coupling wireless
charger need not to penetrate human skin and meanwhile the
battery can be filled soon, which makes the patients avoid being
taken an operation to change the new battery. This design will
have much application value when applied to medical field.
MoA 3.4
Simulation of the Intelligent Control Circuit based on Petri Net, pp.
66-69.
Jihua Ye
Jiangxi Normal Univ.
Jianlian Li
Jiangxi Normal Univ.
Fangqi Deng
Jiangxi Normal Univ.
Chunlan Wang
Jiangxi Vocational & Technical
College of Electricity
Established a model of intelligent elevator group control based on
the timed-colored Petri nets (TCPN); Used simulation tools CPN
Tools to simulate intelligent control of elevator group; defined
various data collectors (monitor) to monitor the elevator running
states; analyzed the efficiency of the elevators with the data
collected by the monitors. The simulation results showed that the
improved strategy has improved the operating efficiency of the
elevators.
MoA 2.7
The Application of Pipeline Technology: An Overview, pp. 47-51.
Li Yizhen
Xiamen Univ.
Ling Lin
Xiamen Univ.
Wu Jun
Xiamen Univ.
Recently, pipeline technology has been widely used in various
fields of computer. After describing the principles and
classification of Pipeline technology, this paper introduces the
history of its development, and analyzes its application in both
aspects of hardware and software of computer, such as CPU, FPGA,
DSP calculation and parallel database query optimization. At last
predication is made on its prospects and future development
trends.
MoA 3.5
Design of Vertical Parking Monitor System, pp. 70-73.
Changqing Cai
Changchun Inst. of Tech.
Lixin Wang
Shenyang Univ. of Tech.
Yan Zhao
Univ. of Sci. & Tech. of China
In order to ease the issue of parking which is caused by the city's
rapid development, the text has adopted the programmable
controller of OMRON CQM1H, making use of the vehicle detector,
sense coil and camera to collect various messages, which are
MoA 3
Control Technology
38
related to the inner parking and the vehicle, designing a type of
eight layers vertical parking monitor system. On the basis of
functions and safety request, we need to complete the hardware
circuit design of the vertical parking monitor system, management
system design, PC software design and lower computer software
design. And adopting ladder to compile the PLC controlling
procedure, which will achieve the automatic control of vehicle
access. In the end, utilizing configuration software “Force Control”
to monitor the parking.
decision support. This paper analyzes the main problems, then
from the perspective of MDA creates a multidimensional data
model and builds a multidimensional data analysis system for
educational data warehousing and data mining. This system is
implemented by using J2EE architecture, and flash RIA technology,
which provides users with good visual modeling and data display
interfaces.
MoA 4.4
A Comparison of Multi-Tenant Data Storage Solutions for
Software-as-a-Service, pp. 95-98.
Shaoquan Fang
Tsinghua Univ.
Qiuli Tong
Tsinghua Univ.
Software-as-a-Service (SaaS) is now a hot issue in both academia
and business. Multi-tenant data storage as a fundamental
component of a SaaS system draws much attention.The need of
scalability and multi-tenant support in SaaS makes traditional
RDBMS unappealing and calls for a better data storage solution. In
this paper, we categorize some proposed solutions and evaluate
the performance of a Native XML Database (NXD) solution
implemented on Berkeley DB XML. Experimental results show
that the the opportunity of applying NXD in SaaS has not yet
arrived.
MoA 3.6
The Control Algorithm for a Photovoltaic Inverter to be Applied in
Weak Power Grid, pp. 74-77.
Shi Zhenyin
Gansu Electric Power Design Inst.
Zheng Xin
Gansu Electric Power Design Inst.
Wang Liping
Gansu Electric Power Design Inst.
The paper analyzes the power-grid connection for a large and
medium photovoltaic (PV) plant in details, and it creates a
mathematic model for PV inverter and a parameter model for
power distribution. The paper also does some research on the
grid-connected character between large PV generation system and
weak grid, and it focuses on output voltage and current harmonic
while connected. Depending on the simulation result and real
operating data of three-phase PV inverter, which founded on the
traditional controlling algorithm, the paper proposes a brand new
way. The method bases on the space-vector theory, and it can
validly decrease the PV grid-connected output voltage and current
harmonic, and improve the reliability. The theoretical analysis and
partial operation results have proved the correctness of
grid-connected features; also, it will provide the theory and
grid-connected instruction for Chinese new energy strategy as
well as the world.
MoA 4.5
A Design of Distributed Collaborative Intrusion Detection Model,
pp. 99-101.
Zhang Hui
Business College of Shanxi Univ.
The paper analyzes the current principle, classification and the
technology of Intrusion Detection in common use. Then, the paper
puts forward a kind of distributed and coordinated Intrusion
Detection System model. It can detect the security leak of network
in time and response rapidly and enhance the security of
network.
MoA 4
Artificial Intelligence
MoA 4.6
Research on M-learning supported by 3G/4G, pp. 102-106.
Zhizhen Yang
Shanghai Second Polytechnic Univ.
Zhihui Yang
North China Univ. of Tech.
With explosive immersion of mobile technology supported by
3G/4G, its characteristic of being portable and online have
injected new vitality to M-learning, people become to explore its
potential under the surrounding of M-learning. Based on the
technology predominance of 3G/4G, this paper first analyses
current situation of M-learning. Then it discusses the teaching
relations and learning surrounding of M-learning with support of
3G/4G technology. Then it expounds on the challenges which
3G/4G brings to M-learning. Wish this paper could play an active
role in actual research of M-learning.
MoA 4.1
Multi-objective Optimization in Dynamic Environment:A Review,
pp. 78-82.
Rui Chen
Xiamen Univ.
Wenhua Zeng
Xiamen Univ.
Dynamic multi-objective evolutionary algorithms (Dynamic
MOEAs) use the evolutionary algorithms to solve the dynamic
multi-objective optimization problems (DMOPs). It has become
one of the hot areas of research. The challenge of DMOPs is that
the objective functions, the constraints or the parameters may
change over time. This paper tries to provide a comprehensive
overview of the related work, which is organized by the common
process of Dynamic MOEAs, such as, the detection of change, the
maintenance of diversity, the prediction of change, the test
problems and the performance metrics. Finally, topics for further
research are suggested.
MoA 4.7
Implementation of Software Testing Course Based on CDIO, pp.
107-110.
Zhang Yinnan
Zhejiang Univ. of Sci. & Tech.
Wang Xiaochi
Zhejiang Univ. City College
The current state of Software Testing Course is first analyzed.
With the guidance of CDIO educational theory, it provides concrete
methods to reform the course, especially regarding the existing
issues. It applies various teaching methods, such as case teaching,
project-based learning, and inspired learning, to the reform of
undergraduate level Software Testing. It focuses on four different
aspects of the reform: teaching of the fundamentals, training of
professional attitude and capability, team collaboration and
communication, and implementation ability. It has been proved
that the reform produced positive results.
MoA 4.2
Design and Realization of SPI Interface in Lithium-ion Battery
Voltage Measuring System, pp. 83-87.
An Shiqi
Qingdao Univ. of Sci. & Tech.
Qi Anning
Qingdao Univ. of Sci. & Tech.
Zhu Yuwei
Qingdao Inst. of Bioenergy & Bioprocess Tech.
This paper presents a voltage measuring system, which based on
the AVR microcontroller AT90CAN32 and one or more multicell
battery monitoring integrate circuits LTC6802 used in
BMS(battery management system). Gives the hardware design and
the software design for serial peripheral interface(SPI)
communication. The use of iCoupler technology realizes the
high-speed SPI communication and its reliable isolation. The
off-line test shows that the system is compact in structure, ease to
expand and meet the requirements of stabilization and reliability.
MoA 5
Software Engineering
MoA 4.3
A Multidimensional Data Analysis System Based on MDA for
Educational Data Warehousing, pp. 88-94.
Xuejian Yan
Shandong Univ.
Xueqing Li
Shandong Univ.
The existing management information systems in universities are
often designed for specific management applications, and there
are still many problems and shortcomings on data analysis and
MoA 5.1
A Study on the Methods of Software Testing Based on the Design
Models, pp. 111-113.
Tangtang Xie
Southwest China Univ.
Jun Li
Southwest China Univ.
Hanrong Chen
Southwest China Univ.
Hailing Xiong
Southwest China Univ.
With the expanding range of computer applications, computer
39
applications is used more and more in key areas, so it requires
higher quality and reliability for software. As the most important
techniques for software quality and reliability, software testing
becomes more and more important in software development.
Though software engineering
technology development
continuously put forward new requirements for software test
technique, software test model and test case generation have
always been the core of the software testing, and it is important to
choose the better test models and test methods to improve the
efficiency of test cases. Considering that most of software errors
can be attributed to the difference between design and
implementation, this paper presents a software testing method
based on the design model by analyzing the design model and the
implement model extracted from design process and converting to
formal test models, and finally compare the design model and the
implement model to find out the difference between requirement
and implement.
This paper analyses the existing problems of computer Chinese
chess game, the structure and performance of computer Chinese
chess game platform and the latest progress in the field of
computer Chinese chess game. Additionally, it introduces the
superior self-made teaching experience instruments with high
practical value to combine education with recreation and improve
university innovative research atmosphere.
MoA 5.5
Research and Design of Network Behavior Management System
Based on B/S Architecture, pp. 129-132.
Deng Xinxin
Xiamen Univ.
Qiu Zhongpan
Xiamen Univ.
Yang Xiaofang
Xiamen Univ.
With the rapid development of Internet and information
technology, network office, network education, paperless office
has become increasingly popular. Computers and network have
become the effective and essential tools of schools, families and
enterprises. However, with the popularity of Internet behavior in a
work or study environment, the problem that students and
employees use the computer and network to do something
unrelated with study and work become more and more serious,
what’s more, children may be misled to visit junk websites. The
abuse of computers and network is widespread in enterprises as
well. Hence, it is important to build an effective network behavior
management system to monitor and manage the internal network
hosts behavior. We put forward a network behavior management
system based on B/S architecture. Our research facets are as
follows: According to the function of the system and architecture,
the system is divided into three layers: Client Management UI
layer, Sever layer, Data Memory layer. We have integrated a variety
of Monitoring and Management technology and Protocol Analysis
technology into the system. The paper first introduce the B/S
architecture and compare with the C/S architecture, then detail
the system construction, design of three modules, the work flow of
the system, and the main functions of the network behavior
management. At last, we conclude the prospect of the network
behavior management system based on B/S architecture with
HTML5 [1].
MoA 5.2
Design of Database Architecture in the SaaS-based Multi-tenant
Educational Information System, pp. 114-119.
Jiangman Xu
Shandong Univ.
Xueqing Li
Shandong Univ.
Xinxiao Zhao
Shandong Univ.
In traditional delivery mode of educational information systems,
applications and databases are established for each college in
universities independently. It not only causes resources to be
wasted, but also brings about a series of problems such as data
inconsistency, data redundancy, etc. In order to solve the problems
mentioned above perfectly, educational information system begins
to be constructed based on SaaS (Software as a service). In this
paper, a schema of distributed database architecture in the
SaaS-based multi-tenant educational information systems is
proposed and a distributed database access process module is
implemented based on J2EE technology. Through parsing and
adjusting database access language semantics in the system
architecture layer, the process module redirects the database
access target of every tenant. In this way, the process module
parses the query statement and processes the query results with
the whole process being transparent to tenants. In addition,
framework of application system with process module integrated
into is also given in this paper.
MoA 5.6
Application of Lightweight Software Framework Based on SSH, pp.
133-135.
Weixing Wang
Chongqing Univ.
The application system features in small or medium-sized
enterprise lie in the greater flexbility and speed,safety,high
performance-price ratio.Traditional J2EE framework can not
adapt to these needs,but the system applacation based on
SSH(Struts,Spring,Hibernate) technology can better satisfy such
needs.This papei analyses some intergration theroy and key
technologies about SSH,and according to the intergration
constructs a lightweight WEB framework, which has integrated
the three kinds of technology , forming the lightweight WEB
framework based on SSH and gaining good effects in practical
applications.
MoA 5.3
Design of a Multiple Modeling Language Supported Workflow
Architecture in Educational Information System, pp. 120-125.
Xinxiao Zhao
Shandong Univ.
Xueqing Li
Shandong Univ.
Jiangman Xu
Shandong Univ.
Using workflow system to manage some business processes is an
essential work to do in educational information system. In this
paper, the author bring forward a solution for building a
lightweight workflow component in some educational information
systems based on J2EE technology. This workflow component has
general function modules of workflow system such as workflow
engine, process manager, and application extensible interface. The
process modeling mechanism of this workflow component can
help us extend different process description languages to model
business processes in different domain. So, we can build some
specific modeling languages suitable for modeling business
processes in educational information system. All business process
models described by different modeling languages can be
translated into execution models owning a kind of unified
structure to be executed. Rollback operation of the business
process also can be supported by the way of backward resuming
the execution track of process.
MoA 6
Computer Education
MoA 6.1
S-T Analysis of Classroom Teaching, pp. 136-140.
Yuan Jun
Guangxi Teachers Education Univ.
Ou Huanghai
Guangxi Teachers Education Univ.
Teaching is a complicated social system with human’s actions and
thinking actions. To have specific cognition, understanding and
evaluation to teaching system, we must record, analyze, study the
teaching process efficiently to make the evaluation of teaching
process perfect. Based on some concrete cases, this paper
discusses the theory and methods on how to use S-T analyzing
methods of education information processing to collect, deal with
and analyze the teaching information in class.
MoA 5.4
The Construction of Chinese Chess Computer Game Platform, pp.
126-128.
Wei Zhou
Northeastern Univ.
Jianchang Liu
Northeastern Univ.
Yuanhe Zhao
Northeastern Univ.
The construction of computer Chinese chess game platform
creates favorable conditions for the development of discrete event
dynamic system theory and provides a good research platform for
solving dynamic countermeasure problems in discrete system.
MoA 6.2
Research and Practice on Higher Vacational “Photogrammetry and
Remote Sensing” Course Construction, pp. 141-144.
Tong Biao
Liaoning Provincial College of Communication
Wu Wenbo
Liaoning Provincial College of Communication
40
This paper introduces the basement of the course construction,
curriculum positioning and teaching content selection, and
teaching practice and summury. The overall ideology of this
reform is to change the traditional mode of Photogrammetry and
Remote Sensing education, and combined the entire contents of
the course into five projects, around which the knowledge points
was selected. All the projects are from actual production. Students’
grades is based mainly on regular performance, and
supplemented by a final exam. Through the practice of this reform,
students’ enthusiasm in learning has been markedly improved.
The main features of this course Construction is the "four
combination", namely, teaching projects combined with
production projects, classroom teaching combined with surveying
and mapping standards, teaching practice combined with
research, teaching methods combined with Google Earth.
important sections to be focused on, i.e., needs analysis, teaching
and summary. Firstly, real projects should be chosen adapted to
students, matching related course and covering all knowledge
points of syllabus. At the section of teaching, it includes
single-item
training,
integrated-project
training
and
innovated-project training, and the result of experiment shows
that students’ competence of career is increased spirally after the
training. During the final period, not only conclusions should be
made, but also be feedback to needs analysis for next better
teaching plan. It is proved that the ability-targeted mode works
well.
MoA 6.6
Improving Computing Undergraduates’ Entrepreneurial Abilities,
pp. 158-161.
Huang Lingli
China Jiliang Univ.
Huang Jun
China Jiliang Univ.
Integrating entrepreneurship education and activities in
computing curricula can have a significant effect on the creativity,
innovativeness, leadership and entrepreneurial intentions of
computing undergraduates. The paper examines the current
status of professional computing education for undergraduate
majors in regional universities of China. We describe our modus
operandi in integrating entrepreneurial education in our
discipline-related education by carrying out "entrepreneurship
education" program and the teaching effect on our students, and
we also discuss some exiting problems in developing computing
entrepreneurship education at China’s universities. Results from
our first 3 years indicate the program is effective for increasing
students’ interest in entrepreneurial intentions, which enable
students to be more proactive in improving their overall quality
and tapping their entrepreneurial potential.
MoA 6.3
Exploration of Visual Teaching for Digital Filter Design, pp.
145-148.
Yang Fulong
Lanzhou Univ. of Tech.
Zhang Aihua
Lanzhou Univ. of Tech.
Lin Dongmei
Lanzhou Univ. of Tech.
This paper presents a dynamic demonstration system based on
pulse and sound signal, which is to be used in the teaching of
digital filter design. What we can observe in the system are as
follows: the change of filtering performance as pole-zeros
changing; the frequency domain characteristics of filter and the
effects of amplitude frequency characteristics; phase frequency
characteristics effects on filtering performance; the effects of
filter’s order on the filtering performance. Stduents can feel the
effects of filter by observing the visual teaching system and
hearing the filtered sound signal, which can enhance students’
interest.
MoA 6.7
The Educational Modeling Languages in Instructional Design:
Towards a UML Applications, pp. 162-165.
Zhi Jiang
Jimei Univ.
Educational Modelling Languages (EMLs) are semantic
information model and design languages to create models of
educational units. EMLs and the some specification bring an
important innovation to the Instructional Design(ID). This paper
is introduces some basic concepts about of EMLs, namely
classifying existing major design Languages and presenting their
potential applications, The authors demonstrate how an
object-oriented approach in combination with UML can be used to
develop Instructional Design.
MoA 6.4
Base on Human-Computer Interaction Perspective to Analyze the
Factors of Technology Acceptance Model on IRSSP for Taiwan
Recommendatory Admission, pp. 149-153.
Chien-Yun Dai
National Taiwan Normal Univ.
Jin-Jung Jang
National Taiwan Normal Univ.
Tzu-Hao Lee
National Taiwan Normal Univ.
Yu-Tsang Chen
Chung Shan Industrial Commercial
High School
Yu-Hsi Yuan
National Taiwan Normal Univ.
The study purpose is aimed to explore the impact factors of
Perceived Ease of Use, Perceived Usefulness, and Attitude toward
Using in Technology Acceptance Model on internal rating system
for star plan in Taiwan based on the perspective of
Human-Computer Interaction. A twenty-six-item questionnaire
was developed according to literature review. Path analysis
approach was employed for data analysis. Total 235 valid samples
were selected from senior high school student at three grades. The
convenience sampling strategy was implemented. The result
support our hypothesis that Human-Computer Interaction can
predict Perceived Usefulness (β=0.253; p<0.01), Perceived Ease of
Use (β=0.160; p<0.01), and Attitude Toward Using (β=0.258;
p<0.01) positively, meanwhile, Perceived Ease of Use can predict
Perceived Usefulness (β=0.220; p<0.05) and Perceived Usefulness
can predict Perceived Ease of Use (β=0.112; p<0.05), moreover,
Perceived Ease of Use (β=0.254; p<0.05) and Perceived Usefulness
(β=0.716; p=0.000) can predict Attitude Toward Using.
Conclusions and suggestions were made dependent on our
research findings.
ThA 1
Computer Application
ThA 1.1
An Empirical Study of Consumer’s Repurchase Intention of Tablet
PC, pp. 166-171.
Yin-Tsuo Huang
Toko Univ.
Kuowei Lee
National Taichung Inst. of Tech.
Wenyuan Chan
Yunnan Univ.
Mobile technological products have now become part of people's
lives. As such, the tablet computer is really a new-generation PC
that is very popular among business people as well as students,
due to its comfort and mobility, and because it functions well. The
purpose of this explanatory and exploratory research survey was
to test a hypothesized model regarding customers’ perceptions of
brand image, the sacrifices involved in the purchase, value,
satisfaction, brand loyalty, and repurchase intention. Data was
collected from 818 responses via questionnaire survey, and all
scales were examined for reliability and construct validity. The
findings indicated that (a) customers’ positive perceptions of
brand image have a significant positive effect on brand loyalty;
and (b) customers’ perceived level of sacrifice has a significant
negative effect on customer satisfaction. The limitations and
recommendations for future research are also included in this
study.
MoA 6.5
A Mode of Ability-targeted Computer Curriculum Reform Based
on Projects in Engineering Education, pp. 154-157.
Yifang Zhang
Zhejiang Inst. of Mechanical & Electrical
Engineering
Binwei Yang
Zhejiang Inst. of Mechanical & Electrical
Engineering
Practical ability is always mentioned which is the most important
in higher vocational education. This paper discusses a kind of
ability-targeted mode based on projects in computer courses
teaching in China, such as Office Automation and Web Design.
When traditional teaching mode being reformed into
ability-targeted and project-based mode, there are three
ThA 1.2
Application of ICT in Human Machine Interface Design Course, pp.
172-175.
Liu Wenjie
Northwestern Polytechnical Univ.
41
Zhou Yuntao
Northwestern Polytechnical Univ.
Traditional educational methods often focus on the teacher’s role
and teaching form in the class is vary monotonous. This paper
proposed a method to apply ICT into the human machine interface
course, which can provoke the interests of students to this course.
ICT makes the educational method become variable and colorful
therefore promotes the quality of education. In addition, ICT is
applied into the practice section. Students were asked to choose a
new IT technology they are interested in and to form a developing
team, to use the theory they studied in the class to design a
software interface. By this way, they master the theory of this
course on the basis of practice and their developing abilities are
also enhanced.
diagnosis function of the experts, greatly improving the efficiency
of diagnosis.
ThC 1.2
Research on UAV Health Evaluation Based on PNN, pp. 189-190.
Northwestern Polytechnical
Kun Zhang
Univ.
Northwestern Polytechnical
Deyun Zhou
Univ.
In view of UAV system development and the need of the UAV
avionics system health evaluation, this paper establishes UAV
state evaluate model of avionics system based on
PNN(Probabilistic Neural Networks), designs and realizes UAV
avionics system evaluation software. Finally, the simulation result
indicates that this algorithm is reasonable and effective. This
method can help people to design the avionics system, evaluate
the UAV avionics system online, locate avionics system fault.
ThA 1.3
Improving University e-Learning with Exploratory Data Analysis
and Web Log Mining, pp. 176-179.
Chakarida Nukoolkit
King Mongkut's Univ. of
Tech. Thonburi
Praewphan Chansripiboon
King Mongkut's Univ. of
Tech. Thonburi
Satita Sopitsirikul
King Mongkut's Univ. of
Tech. Thonburi
The success of an e-Learning system depends on several factors: a
supportive infrastructure, high-quality content, effective format,
and high availability to satisfy ongoing user needs. In this paper,
we perform exploratory data analysis and data mining on an
e-Learning web log, which spans one academic year. The study
uncovers the e-Learning users’ usage behavior in accessing the
content. The study discovers e-Learning media popularity and
usage patterns, and helps the institution fine tune future
courseware, from strategic changes to the fine-grain of lesson
content improvement.
ThC 1.3
An Iterative Algorithm for Solving Complementarity Problems and
its Convergence, pp. 191-194.
Yalu Liu
Beijing Inst. of Petro-Chemical Tech.
Dandan Yang
Inner Mongolia Normal Univ.
In present paper, a novel smoothing function method for
nonlinear complementarity problems is proposed. Then the
property of the function is discussed. And the conditions of
convergences of this iteration algorithm are given, so that the
reference conclusions are extended. Theory analysis and primary
numerical results illustrate that this method is feasible and
effective.
ThC 1.4
Research on CPS Spatio-Temporal Event Model Based on the State,
pp. 195-198.
Chen Lina
National Univ. of Defense Tech.
Huang Hongbin
National Univ. of Defense Tech.
Deng Su
National Univ. of Defense Tech.
Cyber-Physical System (CPS) reflects the dynamic changes of
physical environment through the event, closely interacts with the
physical environment. CPS often involves a wide spectrum of
events, and CPS events reflect the environment changes in a
time-sensitive and/or spatial-sensitive manner. The event is an
effective way of mapping physical environment to cyber domain.
We analyzed the concept and features of CPS events, proposed the
spatio-temporal event model framework based on the physical
states. We proposed the compositive operation between the
different types of events, and then the environment state can be
distilled from the combined event. Finally, a smart house is
developed based on the event model, results show that the event
model can reflect the spatiotemporal features of CPS and the
dynamic changes of environment, is propitious to the decision
making of CPS.
ThA 1.4
Research on Distance Collaborative Activities for Teacher
Education based on Online Video and Cloud Computing
Environment, pp. 180-185.
Baocong Jiao
Capital Normal Univ.
Sufang An
Capital Normal Univ.
Hongyun Wang
Capital Normal Univ.
Haiguang Fang
Capital Normal Univ.
Socialization and virtualization of network, which provides
favorable context for distance teaching and research, promotes the
professional development of teachers. However, due to the lack of
systematic and successful pattern to extend, the utilization rate of
resources in distance education is very low, and the advantages of
context for network resources in teaching and research are not
fully played in China. The research is based on the development of
cloud computing technology and the application of online video
resources, analyzes the pattern of distance collaborative activities
for teacher education and the application case, and elaborates the
distance collaborative mechanism, in order to provide a
perspective and practical references for the distance collaborative
teaching and research in cloud computing environment.
ThC 1.5
Development of Particle Swarm Optimization Algorithm, pp.
199-204.
Yu Chen
Xiamen Univ.
Fan Yang
Xiamen Univ.
Quan Zou
Xiamen Univ.
Chen Lin
Xiamen Univ.
Particle swarm optimization (PSO) is a new stochastic
optimization technique based on swarm intelligence. In this paper,
we introduce the basic principles of PSO firstly. Then, the research
progress on PSO algorithm is summarized in several fields, such as
parameter selection and design, population topology, hybrid PSO
algorithm etc. Finally, some vital applications and aspects that
may be conducted in the future investigations are discussed.
ThC 1
Artificial Intelligence
ThC 1.1
Research on Expert System of Diseases and Insects of Jujube
Based on Neural Networks, pp. 186-188.
Song Jianwei
Shijiazhuang Univ.
Wu Shuomei
Shijiazhuang Univ.
Ren Ji
Shijiazhuang Television College
Yu Xiaohong
Hebei Taihang Machinery
Industries Corporation
The traditional expert system has shortcomings of poor
self-learning ability, then expert system of diagnosis of jujube
diseases and insects which is based on neural networks is
designed. The related symptoms of jujube diseases and insect are
collected and diagnosed by expert, the conclusion of the
diagnostic process is regarded as the input neurons and output
neurons of neural networks. After the learning of neural network,
the results are as the part of knowledge base, and an improved
neural network is designed, implementing the function of system
diagnosis. The field test has shown that the system fully mimic the
ThC 1.6
Text Cohesion Visualizer, pp. 205-209.
Chakarida Nukoolkit
Praewphan Chansripiboon
Pornchai Mongkolnam
Richard Watson Todd
42
King Mongkut's Univ. of
Tech. Thonburi
King Mongkut's Univ. of
Tech. Thonburi
King Mongkut's Univ. of
Tech. Thonburi
King Mongkut's Univ. of
Tech. Thonburi
In this paper, we describe the concept and design of a novel
visualization tool to aid in academic writing of English as a Second
Language students. The tool makes use of theory in classroom
discourse, WordNet API, and linguistics rules given by a linguistics
expert, by analyzing English language essays for their linguistic
bond counts and links within and between paragraphs. These
linguistic indicators reveal the structure and flow of essays,
clusters of main ideas, as well as incoherent sentences, which
obstruct essay unity. The lack of essay unity is one of the most
common writing errors of English as a Second Language learners.
The output of the system is shown as several kinds of
visualizations that provide writing feedback to users, as well as an
autocorrect functionality to improve essay unity. Novice English
learners may benefit greatly from this system.
class information words (SCIW). First, selecting five kinds of
Chinese Framenet features, and using SCIW to select features.
According to each category’s classification precision of features,
sorts them. Through the experiment of the combination of the
features, we select the combination of features. It improved the
accuracy of classification, reaching the feature reduction.
ThC 1.11
User Alias Authority Ranking Based on Email Communication
Relation Analysis, pp. 226-231.
Meijuan Yin
Zhengzhou Info. Sci. & Tech. Inst.
Junyong Luo
Zhengzhou Info. Sci. & Tech. Inst.
Xiaonan Liu
Zhengzhou Info. Sci. & Tech. Inst.
Xiao Li
Zhengzhou Info. Sci. & Tech. Inst.
Finding information about real identity of email users from Email
is one of the important topics in email mining. Existing methods
focus extracting name information of users from email datasets,
but not pay much attention to the research about aliases that
belong to the same user. That extracting user’s aliases and ranking
authority of the aliases is very significant to some network
researches and applications such as identity identifying,
important people finding and so on. This paper focuses on ranking
the authority of user’s aliases having been extracted from emails
and gives the most authoritative aliases of users. Based on the
facts that different aliases of a user take different positions in the
user’s email communicating relationship, we propose a novel
method to rank the authority of an alias for the email user by
analyzing email communication relationship. Results on the public
subset of the Enron corpus indicate that the approaches presented
in this paper can efficiently rank the authority of user’s aliases and
find the authoritative aliases of a user and the average precision of
the methods is more than 90%.
ThC 1.7
Improve VSM Text Classification by Title Vector Based Document
Representation Method, pp. 210-213.
Tian Xia
Shanghai Second Polytechnic Univ.
Yi Du
Shanghai Second Polytechnic Univ.
Text Classification is a daunting task because it is difficult to
extract the semantics of natural language texts. Many problems
must be resolved before natural-language processing techniques
can be effectively applied to a large collection of texts. A significant
one is to extract semantic information from corpus in plan text. In
Vector Space Model, a document is conceptually represented by a
vector of terms extracted from each document, with associated
weights representing the importance of each term in the
document and within the whole document collection. Likewise, an
unclassified document is also modeled as a list of terms with
associated weights representing the importance of the terms in it.
Many techniques introduces much statistical information of terms
to represent their semantic information. However, as always,
document title is not taken into special consideration, while it
obviously contains much semantic information. This paper
proposes Title Vector to address this issue.
ThC 1.12
DNA Computing Research Progress and Application, pp. 232-235.
Yanyan Huang
Xiamen Univ.
Ling He
Xiamen Univ.
In computer’s word, the basic idea of DNA computing is using
processing power of organic molecular information instead of
digital switch components. In recent years, DNA computing has
become one of the important researches which solve complex
problems. In this paper, in comparison with the analysis of the
development of DNA computing, we introduce the working
principle and mathematical model, and three branches of the
calculation model. At last, we discuss travel salesman problem for
example ,and put forward coding method of DNA sequence.
ThC 1.8
Formal Contexts in Ontologies, pp. 214-217.
Sun Yu
Yunnan Normal Univ.
Xia Youming
Yunnan Normal Univ.
Li Zhiping
Yunnan Normal Univ.
In this paper, an ontology is regarded as an information system in
formal concept analysis. Then, based on theories of concepts, a
formal context in ontologies defined by a set of properties is
conceptualized as a concept with the extent and the intent. There
are two kinds of properties implied by a formal context: one is the
set of properties in its intent and another is the set of default
properties. Then the features of formal contexts in ontologies are
discussed in detail.
ThC 1.13
P2P Caching Sequences Based on Partial Trust Negotiation Game,
pp. 236-239.
Chunzhi Wang
Hubei Univ. of Tech.
Ruoxi Wang
Huazhong Normal Univ.
Hong Li
Hubei Univ. of Tech.
Chen Hongwei
Hubei Univ. of Tech.
Trust negotiation is the process of revealing the certificates and
the strategy set of the resource requester and the resource
provider with each other, while after negotiation succeeding cache
selectively the sequence of revealing the certificates according to
the their use ratio and showing directly at the next time, which
can save plenty of time costing. This paper makes a split of the
negotiation process to many steps and cache part in order to
improve the whole performance. Via the mixed static game theory
to construct the model of the caching sequence, using the ratio as
a label, simulate the situation of part of caching sequence, and
then analyze to obtain the measure of optimal performance of the
system via adjust the use ratio of certificates. At last, the
simulation software, Gambit, checks the correctness of the model
of the game theory.
ThC 1.9
A New Method for Classification in DNA Sequence, pp. 218-221.
Qingda Zhou
Xiamen Univ.
Qingshan Jiang
Shenzhen Inst.s of Advanced Tech.,
Chinese Academy of Sci.s
Dan Wei
Xiamen Univ.
As an important part of biological sequence data, DNA sequence
determines the type and function of the DNA. Wiping off the
independent random background in the process of DNA sequence
feature extraction to solve the repeated computation in
information extraction, then using the k-means method to cluster
the dataset, and SVM algorithm in classification respectively, the
method in this paper finally determines the final result according
to voting, and experiment results show that the algorithm has
better search efficiency, and can get better research results.
ThC 1.10
Question Classification Oriented Chinese Framenet Feature
Selection, pp. 222-225.
Geng Yan
Business College of Shanxi Univ.
Wang Wenjing
Business College of Shanxi Univ.
For feature selection of the classification in Restricted-domain
Question Answering System, Chinese Net framework full
advantage of this Chinese characteristics in terms of semantic
expression, this paper presents feature selection called strong
ThC 1.14
The Automatic Detection Algorithm of Tongue Cancer Stem Cells
Based on Fuzzy Pattern Recognition, pp. 240-244.
Kehe Cai
Wuhan Univ.
Mengyi Liu
Wuhan Univ.
Yuyu Zhang
Wuhan Univ.
In this paper, we present a novel recognition algorithm for
detecting tongue cancer stem cells with respect to appropriate
43
scaling factors. Our method can be achieved by computer image
processing in the condition that the cancer cells are
undifferentiated or slightly differentiated, which is of important
research significance in the realm of oral medicine. According to
the biological natures of tongue cancer stem cells, we select the
curvature variance of cell contour, the nuclear-cytoplasmic area
ratio, and the average optical density of cytoplasm as the
measurement parameters. Using these three biological
parameters, the characteristics of cancerous tumor cells can be
described and thus classified. Therefore, those cells can be
categorized under the principle of maximum degree of
membership in fuzzy pattern recognition algorithms. In this way,
the tongue cancer stem cells can be automatically detected.
Desirable recognition results given by our experiments have
substantiated the efficiency of our algorithm.
Luo Delin
Xiamen Univ.
Zhao Lixiao
Xiamen Univ.
Xu Zhihui
95168 Military Unit
Traveling Salesman Problem (TSP) is a kind of hard problem in
the mathematic field. It is very hard to solve using deterministic
algorithms. So it often resorts to heuristic stochastic search
algorithms. In this paper, a Heuristic Simulated Genetic Algorithm
(HSGA) is presented to solve TSP problem, in which Genetic
Algorithm (GA) functions as global search strategy while the
designed Heuristic Simulated Annealing (HSA) algorithm acts as
local search strategy applied on partial optimal solutions at each
iteration. The function of HSA is to enhance the search
effectiveness over the solution space and to avoid getting stuck
into local optimal trap. Simulation results demonstrate that the
effectiveness of the presented algorithm.
ThC 1.15
A Novel Circle Covering Algorithm Based on Coulomb Force Model
for the Problem of Locating Repeaters, pp. 245-249.
Yuyu Zhang
Wuhan Univ.
Jiquan Yin
Wuhan Univ.
Peng Zhang
Wuhan Univ.
In this paper, we present a novel circle covering algorithm for the
problem of locating repeaters when users in a certain area need to
be covered. A fundamental issue is the circle covering problem,
where “single-layer covering” equals “covered”. However,
single-layer is not applicable anymore for the covering of
repeaters, because the service capacity of a single repeater is so
limited that it cannot accommodate all the users inside its service
area. Therefore, “multi-layer covering” should be taken into
consideration. To solve this multi-layer problem, we propose a
physical model - the Coulomb Force Model. In our method,
repeater node is regarded as positively charged particle; Areas
with insufficient and surplus covering of repeaters are
respectively regarded as negative electric particles and positive
ones. We simulate the movement of repeater nodes in this electric
field according to Coulomb’s Law, and finally they will reach a
dynamic balanced state. In this way, an optimal solution can be
obtained for the problem of locating repeaters.
ThC 1.19
Iterative Learning Control for Uncertain Time-delay Linear
System, pp. 265-268.
Jie Wu
Hubei Normal Univ.
Xisheng Zhan
Hubei Normal Univ.
In this note, a repetitive learning control (RLC) approach is
proposed to deal with periodic tracking tasks for uncertain
time-varying delay systems. The design of an open-close loop P
type iterative learning controller is studied for uncertain
time-varying delay systems. The design procedure is based upon
obtaining the sufficient condition of convergence by Lyapunov
theory, an iterative learning law is obtained by resolving linear
matrix inequalities (LMI)
ThC 1.20
Research on Intelligent Test Paper Generation Base on Improved
Genetic Algorithm, pp. 269-272.
Chen Xiumin
Hebei Normal Univ. of Sci. & Tech.
Wang Dengcai
Hebei Normal Univ. of Sci. & Tech.
Zhu Meining
Hebei Normal Univ. of Sci. & Tech.
Yang Yanping
Hebei Normal Univ. of Sci. & Tech.
In order to solve the problems such as blindfold search, slower
convergence, and sometimes unsuccessfully search in the present
genetic algorithms used for intelligent test paper generation, this
paper introduces an improved genetic algorithm for intelligent
test paper generation. This algorithm generate optimized initial
chromosome group and controlling crossing and variation
recurring to test paper parameters and randomization.
Consequently, it can avoid the problems of blind search and
slower convergence resulted by complete randomization
controlling adopted by the present genetic algorithms. At last, this
paper proves the improved genetic algorithm can better solve the
intelligent test paper generation problem compared to present
genetic algorithms mentioned in algorithm analysis section of this
paper.
ThC 1.16
Constructing the Representation Model of Arithmetic Word
Problems for Intelligent Tutoring System, pp. 250-255.
Yuhui Ma
Bohai Univ.
Kai Tan
Bohai Univ.
Limin Shao
Bohai Univ.
Xiaojing Shang
Bohai Univ.
The research of representation model has been concentrated on
by psychologists and education researchers for several decades. It
is also important for ITS in which the problem described by
natural language is solved and the level of comprehending is
diagnosed. We propose that problem solving and diagnosing will
be performed well depending on the representation. In this paper,
we first discuss the role of representation model in ITS. And then
how to construct the representation model of arithmetic word
problem is described. Some examples are given, too. We conclude
that the problem will be solved and diagnosis be performed upon
the representation model.
ThC 1.21
An Improved System Dynamics Model for China’s Ration Demand
System, pp. 273-277.
Yanhua Li
Henan Agricultural Univ.
Xiuxia Lu
Henan Agricultural Univ.
Bingjun Li
Henan Agricultural Univ.
Based on the System Dynamics approach, a forecasting model for
China's ration demand, named SDCRD, is developed. To further
improve the fitness for historical data of traditional System
Dynamics model, Support Vector Machine (SVM) technique is also
applied, which has the ability to increase the efficiency and
accuracy of SDCRD. Considering the ration demand system and
other influential factors, such as the urbanization rate, residents'
consumption habits, per capita income, and scientific-technical
progress, etc. as a holistic system, SDCRD makes a more objective
and accurate forecast for China’s future ration demand. The
prediction results indicate that the amount of overall ration
demand in China has a moderate increase from 228.935 million
tons in 2011 up to 230.65 million tons in 2020, with an average
annual growth rate of 0.075%. Furthermore, the proportion of
urban ration demand to total consumption steadily increases by
years, from 36.77% in 2011 to 43.02% in 2020, whereas the rural
ration demand descends gently from 144.754 million tons in 2011
to 134.062 million tons in 2020, which reflects the trend of
structural changes of China's ration demand in coming decade.
ThC 1.17
Design of Automated Course Scheduling System Based on Hybrid
Genetic Algorithm, pp. 256-259.
Yong Ouyang
Hubei Univ. of Tech.
Yi Chen
Hubei Univ. of Tech.
Course Scheduling problem is a constrained, multi-objective
optimization problem, and has proven to be a NP complete
problem, usually resolved by genetic algorithm, but the effect is
not satisfactory, the paper presents a genetic algorithm-based ,
combined with tabu search and the coloring principle to
automatically arrange more complete global search using genetic
algorithms, tabu search using local optimization, convergence
speed and avoid local optimization, the better solution for all hard
soft conditions constraints and satisfactory solution by the users.
ThC 1.18
Heuristic Simulated Annealing Genetic Algorithm for Traveling
Salesman Problem, pp. 260-264.
44
instruments to input information into brain, convert or control the
thinking patterns of brain. Current and future development of
such technology will make a great influence on law philosophy or
cause a range of positive or negative issues in legislation area or
the research of legal rationality or discipline and reform, or event
cause our anxiety, thought and response to relevant negative legal
issues or crisis.
ThC 1.22
A New Approach to Stability Analysis of Systems with State Delay,
pp. 278-280.
Jie Wu
Hubei Normal Univ.
The close loop P type iterative learning control is proposed for
systems with state delay in this paper. The design procedure is
based upon obtaining the sufficient condition of convergence by
Lyapunov theory, an iterative learning law is obtained by resolving
linear matrix inequalities (LMI). The proposed method is more
easily realized and strong practical. The scheme proposed
guarantees that the tracking error converges to a pre-specified
error bound after finite iterations. Finally the simulation results
show the effectiveness and feasibility of the proposed algorithm.
ThC 1.27
A Fast Adaptive Stream Cipher Algorithm and Expanded Search,
pp. 297-304.
Xiaojing Hu
Xiamen Univ.
Lizhao Liu
Xiamen Univ.
Ying Wang
Xiamen Univ.
Maoqing Li
Xiamen Univ.
Tianhua Zhang
Louisiana Tech Univ.
To solve the problem of traditional stream ciphers can not
transmit through the public channel and the construction of
high-strength cipher key generator, the paper presents the
minimum power clock function driven by a parallel clock-control
sequence and chaotic cascade function made of multiple Logistic
function, which are used to built the self-reference model and
chaotic module; it designs an adapt controller independent of the
key generator and encrypt module, achieve controlling encryption
and transmission process by multi-threaded code; it makes a
high-strength key generator with sure differential transformation
and pseudo-random horizontal level disturbance wheel key
method of AES and S-box of Camellia, which makes the sub-key
and uncertain within controlled area that does not depend on the
secret channel, the model achieves an exponential growth in the
key space and the same application scope of traditional stream
cipher model. The new protocol model features can be seen under
the actual operation of modifying RC4 and real-time RC5
algorithm.
ThC 1.23
Research of Optimal Placement of Active Reference Tags Based on
LANDMARC Algorithm, pp. 281-285.
Weiguang Shi
Tianjin Univ.
Kaihua Liu
Tianjin Univ.
Chunya Ni
Tianjin Univ.
Ge Yan
Tianjin Univ.
LANDMARC algorithm achieves satisfactory location accuracy
with less reader by introducing active reference tags, usually
placed in the form of regular grid and served as neighbors for the
tracking tags. However, the uniform arrangement of the reference
tags is not applicable in the case that the probability occurrence of
each area differs greatly, or obstacles like wall and partition exist.
The paper firstly establishes the objective function according to an
event-based occurrence probability model, and then proposes a
PSO-based optimizing mechanism. Comparing with an earlier
solution and the uniform arrangement, we come to the conclusion
that the proposed algorithm provides a better design with higher
accuracy and stability.
ThC 1.24
Diagonal Recurrent Neural Network with Output Feedback and its
Application, pp. 286-288.
Lisang Liu
Xiamen Univ.
Xiafu Peng
Xiamen Univ.
In this paper, a new diagonal recurrent neural network with
output feedback model was proposed and applied to ship rolling
time series prediction. On the basis of diagonal recurrent neural
network, the output was feedback to hidden layer to form a new
neural network structure. The new neural network and its
mathematical model were given at first. Second, the learning
algorithm and the update rule were presented in detail. Because of
internal self-feedback, the diagonal recurrent neural network with
output feedback can learn nonlinear dynamic system without
knowing system order. Finally, the simulation results proved that
the proposed model has good online prediction capability.
ThC 1.28
An Indoor Positioning Technology Based on GA-BP Neural
Network, pp. 305-309.
Miao Kehua
Xiamen Univ.
Chen Yaodong
Xiamen Univ.
Miao Xiao
Xiamen Univ.
With the development of wireless positioning technologies, indoor
positioning technologies are getting more and more noticeable.
RFID positioning technology reaches the goal of recognizing and
positioning by using radio frequency to transmit data through
non-contact two-way communication. This technology has the
advantages of long transmission effective range, low-cost,
non-contact, non-line-of-sight and so on. Using the technology, a
GA-BP Neural Network based indoor positioning algorithm is
proposed in this thesis, series of tests to it in practical setting are
also carried out. The result shows that the algorithm can solve the
problems caused by the complication and variation of indoor
environment at a certain degree.
ThC 1.25
Jurisprudence on New Developments of Brain Science, pp.
289-292.
Wu Xuyang
Xiamen Univ.
Zou Yuzhuo
Xiamen Univ.
In recent years, western countries have made great progresses in
the area of brain science, which provides advanced scientific and
technological supports to the physiological study of behavioral
decision. These progresses are not only of significance in natural
sciences, but also demonstrate strong basic significance in
humanities and social sciences. Meantime, they expanded the new
vision of legal studies and brought about new waves of problems
and thinking, and indicated an alternative approach of
development for the research methods and research areas of legal
studies.
ThC 2
Communication Technology
ThC 2.1
A Transient Signal Detection Technique Based on Flatness
Measure, pp. 310-312.
Xuemin Zhang
Changchun Inst. of Tech.
Changqing Cai
Changchun Inst. of Tech.
Jianhong Zhang
Changchun Inst. of Tech.
In perceptual audio coding, it is necessary to deal with the
transient signals in a frame. A reasonable transient detection is a
premise of the treatment. According to the characteristics of
transient signals in time domain and frequency domain, a
time-frequency transient detection method which uses flatness
measure is proposed in this paper. Comparing with existing
transient detection methods, transient signal detection technique
based on flatness measure not only has advantages to reduce
missed and misused detection, but also hardly produce redundant
detection in low-energy transient segment. Simultaneously, the
complexity of the algorithm adaptively changes with the apparent
extent of the transient signal. Simulation results show that this
method is high in detection accurancy and simple in algorithm
realization
ThC 1.26
Law Philosophy Analysis: Application of Medical Instruments for
Direct Reading and Influence of the Activities of Cranial Nerve, pp.
293-296.
Wu Xuyang
Xiamen Univ.
Zou Yuzhuo
Xiamen Univ.
Application of medical instruments for direct reading and
influence of the activities of cranial nerve is a great breakthrough
to medical research; its development direction may be use of
45
It is significant of applying error concealment in video
transmission in wireless network. This report compares the new
FMO (Flexible Macroblock Ordering) model based on H.264 to the
traditional FMO model in error concealment. The author test
different FMO model and make the contrast of results through
selection of different standard test video sequences. And the
testing result indicates that different FMO model selection for
different transmission environment can reach the best error
concealment effect, which provided a new concept of adaptive
error concealment.
ThC 2.2
An Improved Warped DFT Algorithm Based on Signal Sparse
Representation, pp. 313-315.
Jian Zhou
Anhui Univ.
Chenyang Cui
Anhui Univ.
Guofeng Zhu
Anhui Univ.
Yaguang Ding
Anhui Univ.
Liang Tao
Anhui Univ.
Warped Discrete Fourier Transform(WDFT) offers an alternative
to increase frequency resolution at any selected parts of spectral
axis without extending the number of sampling points. In order to
have a stable and robust spectrum, the warp coefficient must be
selected carefully, and this is not allowd in many applications,such
as speech processing,since the warp coefficient is computed by
human auditory principle. Inspired by sparse signal
representation theory, we propose a WDFT algorithm based on
matching pursuit methodology. The experimental results show
that a better warp spectrum representation and a better signal
reconstruction performance are got when the number of basic
signal is more than the length of signal. It is more suitable for
perceptual speech processing than ordinary WDFT.
ThC 2.7
Study on Digital Measurement Methods of Engine Transient Speed
and Corresponding Error, pp. 333-336.
Cheng Wang
Huaiyin Inst. of Tech.
Shanzhen Xu
Huaiyin Inst. of Tech.
It discussed the basic methods of measuring speed and
corresponding error. And it analyzed the relationship between
signal pulses per revolution and measurement accuracy, and it
analyzed the error of measuring frequency and measuring period
with a certain signal pulses per revolution. It presented the
corresponding relation curves and proposed a sub-optimal
solution of speed measurement.
ThC 2.3
Finite Element Analysis of Composite Leaf Spring, pp. 316-319.
Zheng Yinhuan
Wuhan Univ. of Tech.
Xue Ka
Wuhan Univ. of Tech.
Huang Zhigao
Wuhan Railway Vocational College of Tech.
This paper analyses the mechanics characteristic of a composite
leaf spring made from glass fiber reinforced plastics using the
ANSYS software. Considering interleaf contact, the stress
distribution and deformation are obtained. Taking the single
spring as an example, comparison between the performance of the
GFRP and the steel spring is presented. The comparison results
show that the composite spring has lower stresses and much
lower weight. Then the automotive dead weight is reduced
observably.
ThC 2.8
Power Design of 3G Wireless Data Terminal Based on USB Bus, pp.
337-339.
Liu Xiaochun
Chang-an Univ.
Hu Dongping
ZTE Corporation
This paper analyzes the design feature of USB-based wireless 3G
data terminal power supply and points out the defects of
traditional design methods. Focusing on the problems existing in
the traditional design, this paper proposes a new design plan of
the power supply for wireless 3G data terminal based on USB. The
practices have proved the feasibility of this plan, which well meets
the needs of miniaturization and low cost of wireless 3G data
terminal in the market.
ThC 2.4
Measurements and Analysis of Internet Physical Properties Based
on ICMP, pp. 320-323.
Jinjun Hu
Southwest Univ. of Sci. & Tech.
Ling Xing
Southwest Univ. of Sci. & Tech.
Jianguo Ma
Southwest Univ. of Sci. & Tech.
Qiang Ma
Southwest Univ. of Sci. & Tech.
As the Internet consists of a large number of nodes, measuring the
whole Chinese Mainland is a timeconsuming and demanding task.
This paper addresses this issue by tactically choosing small-scale
test sources and target IP address set and making a survey of
Internet physical properties in central cities and second-tier cities.
The research is focused on Internet diameter, degree distribution
and clustering coefficient. Results show that the Internet is a
complex network with “small world” phenomenon and
“scale-free” feature.
ThC 2.9
Spatial Sampling Criteria for Recognition of Structures, pp.
340-343.
Han Yueping
North Univ. of China
Li Ruihong
North Univ. of China
Han Yan
North Univ. of China
Spatial sampling criteria based on a single view X-ray imaging
system are proposed for recognition of the interior assembly
structures of complex products. There must be a maximal rotary
step for an object within which the least structural size to be
tested is ascertained in advance. Rotating the object by the step
and imaging it and so on until a turn is completed, an image
sequence is obtained that includes the full structural information
for recognition. The maximal rotary step is restricted by the least
structural size and the resolution of the imaging system. Based on
the criteria, the first domestic X-ray digital test system has been
developed and applied to the online inspection of objects
containing complicated assembly structures.
ThC 2.5
Improvement on Decoding of the (71, 36, 11) Quadratic Residue
Code, pp. 324-329.
Hungpeng Lee
Fortune Inst. of Tech.
Hsinchiu Chang
Fortune Inst. of Tech.
In this paper, a fast algebraic decoding algorithm (ADA) is
proposed to correct all patterns of five errors or less in the binary
systematic (71, 36, 11) quadratic residue (QR) code. The method
is based on the modification of the ADAs developed by Reed et al
and Lin et al. The new conditions and the errorlocator
polynomials for decoding this code will be derived. Besides, a
computer search shows that the minimum degree of the unknown
syndrome polynomial f(S7) in the five-error case is 2. Hence, the
computational complexity can be reduced in finite field.
Simulation result shows that the average decoding time of the
proposed ADA is superior to the ADA given by Chang et al.
ThC 2.10
Face Recognition Based on Singular Value and Feature-matrix, pp.
344-347.
Hu Hongping
North Univ. of China
Li Ruihong
North Univ. of China
Zhou Hanchang
North Univ. of China
The face recognition algorithms based on singular value
decomposition (SVD) have low recognition accuracy due to the
common essential defect which singular value vector of arbitrary
two face images have the different basis spaces in genera1.
According to this, a weighted adaptive algorithm based on some
important partial features is proposed. It normalizes different
faces and then locates the features of eyes, nose and mouth with
horizontal and vertical projections. Subsequently, local features of
the key parts of face are extracted and weighted respectively by
singular value to get the feature-matrix. Dynamic method of how
to choose the weights of local features and formula of how to
obtain the feature-matrix is given. Finally, the developed support
vector machine is utilized to recognize faces. Experiments show
that the proposed algorithm can not only calculate efficiently and
ThC 2.6
The Test and Analysis of FMO Model in Error Concealment Based
on H.264, pp. 330-332.
Du Li
Jiangxi Univ. of Sci. & Tech.
Junqin Wu
Jiangxi Univ. of Sci. & Tech.
46
work easily, but also deal with low recognition rate issues in SVD,
which shows a good potential of application.
ThC 3.5
Application Research of Fuzzy Clustering Approach in the New
Rural Cooperative Medical Insurance System Module, pp. 361-364.
Tang Zhong
Guangxi Medical Univ.
Yang Gefeng
Guangxi Medical Univ.
Ou Xu
Guangxi Medical Univ.
Liang Zhisheng
Guangxi Medical Univ.
Based on the analysis the advantages and disadvantages of
hierarchical clustering and fuzzy clustering methods, make
sample points within each subspace as similar as possible,
differences between sample points within different subspace as
large as possible, The essence is to find different data models
which hidden in different data. It is an unsupervised learning
process that enables the blind classification in the sample spaces.
Currently clustering data mining research is a very active field.t.
ThC 3
Computer Application
ThC 3.1
A New Study on the Integrating of Random Walk Process and
Multiple Point Geostatistics to Model the Fluvial Reservoir, pp.
348-350.
Yin Yanshu
Yangtze Univ.
Ding Hui
Yangtze Univ.
Shi Shuyuan
Yangtze Univ.
The multiple point geostatistics can not reproduce the continuous
shape of the channel due to the limitation of the algorithm with
random draw of the simulated value. A new method is proposed
which integrates the random walk process with multiple point
geostatistics. First the random walk process produces the channel
main streamline, then the draw of simulated value in multiple
point geostatistics is conducted by the streamline. The method
solves the continuities problem in channel. The real model is
constructed with both the new method and only the multiple
point geostatistics and the results show the new method can
reproduce the continuous sinuous channel. A cross-validation is
implemented and the result is also well, which proves the new
method is robust and can be put into real reservoir modeling.
ThC 3.6
Information Technology in Teacher's Professional Skill Training
Application, pp. 365-369.
Xilong Tan
Hubei Univ. of Education
Huiling Wang
Hubei Univ. of Education
Information society requires training school of the information
literacy of citizens. Teachers to be skilled in information
technology and information society of teachers ' professional
skills. In order to develop professional skills, able to adapt to the
education information needs of teachers, our school in the
teacher's training mode reform and practice conform to the trend
of teacher professionalization, teachers ' professional skills in
information technology education and training as the key point,
increase the proportion of information technology skills training
courses and professional courses, give full play to role of
information technology in the teachers ' professional skills,
improve the effectiveness of professional skills. To meet students
expertise learning and professional skills training of need, we
focus on information professional skills training laboratory
construction, strengthening information technology and teachers
professional skills training courses of integration, promote quality
teaching resources shared, application information technology
and modern management concept construction information
online teaching and management platform, for students of
independent learning and independent practice service,
construction online Exchange platform improve education
practice effect, measures, great to improve has students of
information technology level, professional skills training
effectiveness is significantly.
ThC 3.2
Integrating Data from Multiple Disciplines for Reservoir
Microfacies Forecasting, pp. 351-353.
Yin Yanshu
Yangtze Univ.
Feng Shu
Yangtze Univ.
A new method has been proposed for forecasting the distribution
of the microfacies, integrating the core data, logging data, seismic
data and testing data of multiple disciplines. The flowchart of this
method follows the basic idea of from points (well) to surfaces
(the 2-D maps) to zones (the 3-D maps). The recognition and
core-log response model has first been constructed by the analysis
of sedimentary environments of the region and core data; then,
the microfacies of non-core wells have been identified according
to the core-log response model; thirdly, the 2-D map of microfacies
is forecasted by the 2-D map of sandstone thickness and the
information from the analysis of seismic data. The shape
parameters of microfacies have been achieved by dissecting the
microfacies using the testing data. Finally, the 3-D distribution of
microfacies has been reproduced by reservoir stochastic modeling
methods. The 3-D microfacies distribution of the fluvial
environments has been accomplished in Gangdong exploitation
district of Dagang Oilfield. This high precise reservoir model can
give more information to the oil engineerings, and is a basis of
petrophysical properties forecasting and the reservoir numerical
simulating.
ThC 3.7
Scheduling Model of Access Requests in Open Storage
Architectures, pp. 370-374.
Xian Wu
Soochow Univ.
Jianxi Fan
Soochow Univ.
Jiwen Yang
Soochow Univ.
In cloud computing era, datacenter can be organized by resources
distributed geographically on demand into a dynamic logical
entity. All these virtualized datacenters (VDCs) migrate
transparently to another resources set for the best
cost-effectiveness. Open storage architecture is one of the basic
infrastructures in Cloud. This paper introduces a scheduling
model of access request in open storage architectures. This
scheduler runs during the migration of VDCs. We discuss the
environment model and scheduling criteria in detail. And then we
propose the objective functions and the scheduling function Ω. In
this model, all components including users, VDCs, and scheduler
cooperates with each other via associative broadcast. We expect
that this proposed scheduler will be used in nowadays cloud
computing environment and provide the ability of multiobjective
optimization scheduling in the future.
ThC 3.3
Research of Spatial Index & Caching for Power GIS, pp. 354-357.
Wang Xiaohui
North China Electric Power Univ.
Wu Kehe
North China Electric Power Univ.
Xu Xuerong
North China Electric Power Univ.
This paper researches the application status of the GIS platform in
power industry, against existing problems, proposes a spatial data
model of power facilities suitable for the power industry, the
method of Semantic-based clustering index and the multi-level
caching mechanism to speed up the response speed. And possible
problems and future prospects of the development of power GIS
platformin are broung forward in the article concludes.
ThC 3.4
A Research of Online Exam System Based on SSH Architecture, pp.
358-360.
Li Gengming
Xiamen Univ.
This paper describes a research of online exam system based on
the SSH (Struts+Spring+Hibernate)architecture. With the goal of
meeting the market’s needs of small-group tasks and high reliable,
suitable and extendable applications, we try in the research to
present a procedure of developing network system and give a
layout of a developing team. We illustrate the whole process and
key steps of system development with the real example.
ThC 3.8
High-cost-performance and Simple Moving Sticks Length
Measurement Device, pp. 375-379.
Du Bo
Changchun Inst. of Tech.
Cai Changqing
Changchun Inst. of Tech.
High-cost-performance and simple moving sticks length
measurement device uses AT89S51 as core, by means of the
infrared double diodes to measure the movement of the stick,
47
using the internal timer functions of Single Chip Microcontroller
calculate the moving speed of the stick. By the Single Chip
Microcontroller operation, obtain a single stick length, the number
and the cumulative length of the forward direction moving sticks.
The device has the functions of the opposite direction moving
measurement and data auto-playback, and voice broadcast and
display. The device structure is simple with low price.
Measurement error is less than or equal to 0.1 centimeter, which
has high cost performance and a wide range of practical value.
Make comparison and analysis for the stick moving speed and
measurement error, and provide measurement data.
C4.5 Algorithm, taking the library of Changchun Institute of
Technology as an example, by structuring decision tree and
mining the factors which restrain users from using the library
digital resource, the author gets some potential links among the
factors affacting the using of library digital resource, the needs of
university library users can be analyzed effectively with this
algorithm.
ThC 3.13
Analysis of Properties on Cargo Constrained System of Truck
Rollover Based on MATLAB/simulink, pp. 395-397.
Zhao Yan
Wuhan Univ. of Tech.
Wang Jun
Wuhan Univ. of Tech.
This paper set up a system which was made of truck, cargo and
constraint device. To model this system, the paper selected
EQ_1156W_3 truck as the research object, and used two TD_50B
as the cargo constraint device according to the mass of the cargo
and the American standard. Used lateral acceleration as rollover
index of vehicle-cargo-constraint system, and calculated the
rollover threshold in order to evaluate the anti-rollover
performance of the truck by fewer parameters, then got the
relationship between the mass of cargo and rollover threshold. On
the basis of analysis of rigid body vehicles, the influence of the
tyre and suspension to truck rollover was considered, and the
mathematical model of vehicle-cargoconstraint system was
established. The analysis on cargo constrained system of truck
rollover based on MATLAB/simulink was used.
ThC 3.9
Research Based on Real Time Monitoring System of Digitized
Agricultural Water Supply, pp. 380-383.
Yunchen Liu
Shandong Univ.
Yu Chen
Shandong Univ.
Yunpeng Zhang
Shandong Univ.
Jun Tong
Shandong Univ.
Real time monitoring system of digitized agricultural water supply
is a complex engineering. In this paper, the software and hardware
design principal of real time monitoring and management system
in water resources and the integrated characteristics of structure
are introduced. The general planning of real time monitoring
system in integrated system in agriculture water supply is
proposed. This system, which is based on info technology and
relies on computer technology, remote controlling and automatic
technology, collects, transports and processes the water resource
and its related info in the managed area in real time. The water
resources are dispatched and distributed using scientific decisive
mathematical model. The whole structure of the system can be
divided into three parts: central management system, wireless
communication net and enterprise subnet system.
ThC 3.14
Analysis of Swinging Angle Hydraulic Detection System of
Constant Velocity Universal Joints Based on MATLAB, pp. 398-401.
Wang Jun
Wuhan Univ. of Tech.
Zhao Yan
Wuhan Univ. of Tech.
The life-cycle test-bed of automotive constant velocity universal
joints is the major equipment that can realize assembly of
automotive constant velocity universal joints, the relevant
performance test of constant velocity universal joints and other
components like automotive semiaxle and so on. This paper
analyzed the problems of hysteresis quality and stuck caused by
rapid reversal brake exist in the original swinging angular
hydraulic detection system, and revised the design of swinging
angular hydraulic detection system based on the technology of
electro-hydraulic proportional
control.
Established
the
mathematical model of hydraulic system based on
MATLAB/Simulink, simulated the dynamic properties of the
system, then proved that the dynamic characteristics of the
hydraulic system based on the electro-hydraulic proportional
control technology has improved insignificantly.
ThC 3.10
How to Regulate Computer Crime in Germany Criminal Law, pp.
384-385.
Chunlin Wang
Jiangsu Univ.
Germany is one of the developed capitalist countries. Computers
per capita rate is very high, while computer crime is also very
serious in Germany. German computer crime laws are perfect as a
representative of the national civil law, which involves number of
crimes, protect a wide range of interests. All these have some
inspiration and reference to our country.
ThC 3.11
A Parameter Selection of Support Vector Machine with Genetic
Algorithm for Citrus Quality Classification, pp. 386-390.
Tang Guoxiang
Southwest Univ.
Qu Ming
Southwest Univ.
Wang Xuan
Southwest Univ.
Lv Jiake
Southwest Univ.
Citrus quality classification is an important and widely studied
topic since it has significant role in its market price determination.
Due to citrus quality indicators series nonlinearity and
no-stationary, the accuracy of conventional mostly used methods
including linear discriminant analysis, K-means clustering and
neural network has been limited. The use of support vector
machine (SVM) has been shown to be an effective technology to
solve classification problem of nonlinearity and small sample.
However, the practicability of SVM is effected due to the difficulty
of selecting appropriate SVM parameters. This paper presents a
hybrid approach of support vector machine with genetic
algorithm (GA) optimization to determine SVM free parameters
for developing the accuracy of classification. The approach is
applied to classify citrus quality of three gorges reservoir, China.
The results indicate that the approach can give a better quality
comprehensive evaluation, and has a high potential to become a
useful tool in agriculture.
ThC 3.15
Combined Water Seam Crystallizer’s Thermal Field Analysis and
Simulation , pp. 402-405.
Dachao Hu
Shanghai Inst. of Tech.
Junling Hu
Univ. of Bridgeport
According to the complexity of Crystallizer’s heat-transferring in
continuous casting engineering, it is very difficult to identify and
analyze the Crystallizer’s temperature field. Based on classical
theory, this paper’s aim is to seized the conditions which can
portrait the major factor in the problem, then, to establish
mathematical and physical models to explore and analysis the
mold’s heat transferring phenomenon. According to the actual
conditions, we can determine the relevant parameters, and give
two different models element simulation analysis. The results can
be used by the heat-transferring structure designer and can
provide some theoretical basis and reference materials for
Crystallizer’s monitoring.
ThC 3.16
The Inquiry in Hospital Beds Arrangement Based on Queuing
Theory, pp. 406-410.
Ou Yang
Guangxi Teachers Education Univ.
This paper, through examples, applied RSR method to analyze one
hospital beds arrangement ,then used queuing theory establishing
mathematical model have the right of priority service, then
worked out the sickbed distribution solutions about the shortest
average stay time using linear programming. The scheme maked
simulated analysis by M/M/N sorting method, then feasible, and
ThC 3.12
Application of Data Mining in the Analysis of Needs of University
Library Users, pp. 391-394.
Tingting Zhu
Changchun Inst. of Tech.
Lili Zhang
Changchun Inst. of Tech.
In order to provide decision and guidance for the future
development of libraries, based on the Data Mining Decision Tree
48
had been spread and applied in hospitals.
Yingying Liu
Northwest Normal Univ.
Peiji Shi
Northwest Normal Univ.
Chunyu Liu
Northwest Normal Univ.
Jinghu Pan
Northwest Normal Univ.
Starting from the improvement of the Holistic Land Use Planning
in Longnan City, Gansu Province, in this paper the objectives of
land use planning are researched, and the present situation of
land use in Longnan City is analyzed. An index system is
developed for the environmental impact assessment according to
the environmental impact identification and the present situation
in Longnan City. The index system is divided into three
hierarchies, i.e. the chief target hierarchy A, standard hierarchy B
and indicator hierarchy C. There are 20 assessment factors in the
indicator hierarchy. In the light of which, it is attempted to
calculate the weights of the indexes and provide a method for the
further research work of environmental impact assessment. The
result shows that there is a positive effect of the Holistic Land Use
Planning on the holistic ecological environment in Longnan City,
which is helpful for the holistic objectives of sustainable land use
and environmental protection in Longnan City.
ThC 3.17
Service Delivery Using Social Network Analysis in P2P Supportive
E-Learning Environment, pp. 411-415.
Ye Conghuan
Xiaogan Univ.
Along with the education informatization thorough development
there is no more difficulty to manage most of learning contents
and deliver learning service to learners in elearning system.
Nowadays, learners desire to receive his/her own learning
services and interact with ones who have same learning interest.
However, the current e-learning system couldn’t solve elearning
resource sharing among learners who have the same learning
interest. In this paper, we propose a learning service delivery
model in P2P supportive e-learning system with social network
analysis. The new framework has a growing interest in raise the
utilization rate of those learning resources in university, at the
same time, learners who have common learning interest could
ubiquitously access the learning service delivered and interact
with each other via P2P communication technology. In contrast to
the existing traditional solutions for e-learning service delivery,
our approach is interest-centric and can be used by the provider
to quickly deliver services with decrease of delivery costs.
ThC 3.22
Data Decoding of Flight Recorder Tape Based on Image
Recognition, pp. 433-436.
Yang Quanfa
Beihang Univ.
Ren Zhang
Beihang Univ.
Hu Shuzheng
Beijing Aeronautical Tech. Research Center
Wang Zheng
Beijing Aeronautical Tech. Research Center
Considering the difficult issues of data decoding of flight data
recorders using the metal magnetic tape as recording medium
which are easily damaged in the flight accident, a novel method
for data decoding of magnetic tape based on image recognition is
proposed. On the basis of analyzing the statistical characteristic of
track images, the coordinates of tracks are identified by using the
gray projection and image segmentation algorithm, and the
automatic recognition and data decoding of the information on
magnetic tape are realized. Application of the proposed method
for the data decoding of the track images produced in several
flight accident investigations, and achieved good results.
ThC 3.18
A Service Computing Model Based on Interaction Among Local
Campus Clouds, pp. 416-419.
Ye Conghuan
Xiaogan Univ.
With the increasing number of computers and experimental
apparatus, there is a growing interest in harnessing the unused
and inexpensive computational resources, educational resources
and teaching devices in universities. The quality of services of
resource sharing in university should be improved in order to
meet all kinds of service request of users. In this paper, we design
a service computing model based on interaction among local
Campus Cloud. In this model cloud service providers cloud
improve the performance of service delivery and increase level of
resources utilization. The service computing model could utilize
the interaction among local Campus Clouds to augment the
capacity of the local resources. In the end, users in universities
could request any cloud service from the local Campus Cloud.
ThC 3.23
Simulation and Experimental Study on Electromagnetic Field in
Magnetic Particle Clutch, pp. 437-440.
Shanzhen Xu
Huaiyin Inst. of Tech.
Cheng Wang
Huaiyin Inst. of Tech.
The working principle of magnetic particle clutch was deeply
analyzed and an analysis model electromagnetic field of magnetic
clutch was established. The finite element Method calculation of
electromagnetic field in magnetic particle clutch and experimental
verification was completed. Theoretical analysis anatomies with
test results, which shows that simulation method and theory is
reasonable and it can be used as the foundation of clutch
optimization.
ThC 3.19
The Forecasting of Shanghai Index Trend Based on Genetic
Algorithm and Back Propagation Artificial Neural Network
Algorithm, pp. 420-424.
Li Yizhen
Xiamen Univ.
Zeng Wenhua
Xiamen Univ.
Lin Ling
Xiamen Univ.
Wu Jun
Xiamen Univ.
Lu Gang
Xiamen Univ.
This thesis presents a BP Artificial neural network prediction
modeling method for forecasting the trend of Shanghai index, and
then uses the genetic algorithm to optimize the BP network
parameters, weight and structure. The forecasting results show
that the optimization algorithm not only avoids BP algorithm into
a local minimum point and the problems of slow convergence, but
also overcome the GA Shortcomings such as the search time too
long and search speed too slow caused by in a similar form of
exhaustive search for optimal solution. In the stock market of such
a complicated nonlinear stochastic system modeling, this
modeling method has high application value.
ThC 3.24
A Novel Method Based on Lines Clustering for Extracting
Multi-ROI in Images with Simple Background, pp. 441-444.
He Jun
Beijing Normal Univ.
Sun Bo
Beijing Normal Univ.
Yu Lejun
Beijing Normal Univ.
Since application of target recognition is mostly used in
multi-object images, extracting interested objects efficiently is
much necessary. Taking account of non-curve but regular-shaped
objects on simple background, the authors have proposed a novel
method based on lines clustering for extracting multi-ROI. Steps of
the method have been demonstrated in the article. Experimental
data have also given and proved the method effective and
practical.
ThC 3.20
Constructions on Disaster Tolerant Backup System of Management
Information System, pp. 425-427.
Liangping Zhang
Chongqing Tech. & Business Univ.
Weixing Wang
Beihai Vocational College
The Disaster Tolerant backup System is an important aspect of
constructing management information system security. In terms
of the analysis on management information system data, this
paper offer principles, steps and strategies to construct the
backup system.
ThC 3.25
Multi-objective Optimization Design of Multi-piece Leaf Springs
Based on Pareto, pp. 445-448.
Wu Yonghai
Huaiyin Inst. of Tech.
Fan Qinman
Huaiyin Inst. of Tech.
In allusion to the multi-piece leaf springs of a truck, its standard
multi-objective optimization model was established. Taking
multidisciplinary optimization software iSIGHT as a platform,
ThC 3.21
The Land Use Planning Environmental Impact Assessment in
Longnan City, pp. 428-432.
49
using the non-dominated Sorting Genetic Algorithm (NSGA-II)
based on Pareto optimal concepts, seek for the optimal structural
design scheme for multi-piece leaf springs of the minimum total
quality and minimum relative stiffness is found, and the Pareto
Optimal Solution set is obtained. The analysis method in the paper
can effectively solve the problems of multiparameter and
multi-objective optimization for complex structures.
automobile air flow in the rear and its turbulence on car
aerodynamics characteristics with or without a spoiler is
achieved.The simulation results are consistent with the test ones.
It is proved that the numerical simulation of automobile air flow
with dynamic grid in CFD software is feasible, and which provides
the references for the development of automotive products with
spoiler.
ThC 3.26
A New Improved Algorithm Applicated in NCO Based on Specific
Angle, pp. 449-451.
Liu Bin
Taiyuan Inst. of Tech.
He Qiusheng
Taiyuan Univ. of Sci. & Tech.
Considered the characteristic of the angles, used in the new
improved algorithm puts forward the formula of sine and cosine
values which compose of the discrete- sine and cosine wave. In
this algorithm, the theory of setting Renminbi notes which used to
selecting the basic angle sequence and the symmetry of
trigonometric function is used to calculate the sine and cosine
values of the basic angle and it is expressed as 2kπ/2N. Simulation
proves that the precision can reach 10^-6 under 5 iterations.
Compared with other algorithms, the computational complexity of
the algorithm is simple, and the precision is higher. Therefore, the
algorithm is feasible for the NCO.
ThC 3.30
Research of Ant Colony Algorithm and the Application of 0-1
Knapsack, pp. 464-467.
Ling He
Xiamen Univ.
Yanyan Huang
Xiamen Univ.
Among the different works inspired by ant colonies, the ant colony
algorithm (ACA) is probably the most successful and popular one.
ACA is a novel bio-inspired optimization algorithm, which
simulates the foraging behavior of ants for solving various
complex combinatorial optimization problems. In this paper, a
well-structured definition of basic ACA, detailed implementation
process and complexity analyses of basic ACA are presented. It is
also devoted to the explanation of improvement strategies of ACA
in discrete space optimization and in continuous space
optimization. In order to handle the 0/1 knapsack problem, it
revises the model of ant algorithm and use the computer to test
the modified algorithm. Finally, outlines some ongoing and most
promising research trends in ACA.
ThC 3.27
Modeling and Simulation of Truck with Random Vibration
Response, pp. 452-455.
Wu Yonghai
Huaiyin Inst. of Tech.
Fan Qinman
Huaiyin Inst. of Tech.
Taking a two-axle truck for research object, a mathematic model
and FEA model of 10 degrees of freedom finished automobile are
established to describe the vibration of the truck. Virtual
excitation of road is constructed through the basic theory of
virtual excitation method and its statistical properties of the
actual response are obtained. FEM theory is used in discrete the
truck vibration structure model and stiffness matrix and damping
matrix of each element are assembled in accordance with the
node degree of freedom. Taking forced displacement constraint
handling methods, truck vibration differential equations are
obtained. The research methods and results used in this paper
will provide a useful reference for vibration and ride comfort
design of trucks.
ThC 3.31
Research on the Strategy of Power Management for Submersible
Temperature Logger, pp. 468-471.
Dalei Song
Ocean Univ. of China
Bin Liu
Ocean Univ. of China
Fangjie Yu
Ocean Univ. of China
Bing Xue
Ocean Univ. of China
This paper introduces the basic components of submersible
temperature logger system and the relationships between the
various modules. According to the principle of low power, a Single
Chip Microcomputer with idle mode and stop mode is necessary.
Through the analysis of the temperature measurement and the
data storage, the optimal strategy for power management can be
found. For the purpose of energy-saving, specific measures on
hardware and software are proposed. Then the power
consumption of the system can be quantified by analyzing the
different working conditions of each module.
ThC 3.28
Numerical Analysis on the Pressure Waves in Tunnels, pp.
456-459.
Bao Haitao
Huaiyin Inst. of Tech.
Computational Fluid Dynamics (CFD) is used for the investigation
of the pressure wave. This paper analyzes the formation of
pressure wave . The simulation model of pressure wave is
established based on three-dimensional, unsteady, viscous
Reynolds averaged equations and the k-ε two-equation turbulence
model, by using dynamic grid finite volume method, the pressure
wave produced when train with different sizes and speed go
through the tunnel were simulated numerically. And the
simulation results were compared with similar experimental data.
The results showed that the conclusion and trends of the variation
is consistent with the experimental results , which verified the
reliability of the numerical simulation, so it can be used to predict
the fluctuation law of pressure waves when the train goes through
the tunnel, studying the factors that affect the pressure to
optimize the design parameters of the tunnel.
ThC 3.32
Community Mining in Dynamic Social Networks—Clustering
Based Improved Ant Colony Algorithm, pp. 472-476.
Zhang Nan
Jilin Univ.
Wang Zhe
Jilin Univ.
Community mining has been the focus of many recent researches
on dynamic social networks. In this paper, we propose a clustering
based improved ant colony algorithm (CIACA) for community
mining in social networks. The CIACA combines the local
pheromone update rule with the global update rule and utilizes
heuristic function to adjust the clustering solution dynamically,
assisted by decay coefficient of dynamic network model. In order
to improve clustering accuracy and convergence rate in the
process of ant migration, a structure tightness between nodes
based clustering centers initializing method is proposed, which
can provide us initial clustering centers with certain clustering
precision and high diversity. In addition, random number and
specific parameter are used in the ant transition probability,
which strengthens the search stochastic properties of CIACA
effectively. The proposed CIACA is tested on some benchmark
social networks, and is compared with current representative
algorithms in community mining. Experimental results show the
feasibility and validity of CIACA.
ThC 3.29
Study the Effect of Rear Spoiler on Car Aerodynamics
Characteristics, pp. 460-463.
Bao Haitao
Huaiyin Inst. of Tech.
Taking CFD software as the platform and the car as the research
object, the air,s resistance coefficients and speed are solved by
using RNG equations and dynamic mesh method. The finite
volume method is used to discrete the governing equations, the
second-order up wind difference scheme is adopted for the
convection term and the centric difference scheme for the
dissipation term. The discretion of time is carried out by a
full-implicit time integral scheme. PISO algorithm is adopted to
the transient numerical simulation. The influence law of
ThC 3.33
Cluster, Grid and Cloud Computing: A Detailed Comparison, pp.
477-482.
Naidila Sadashiv
Acharya Inst. of Tech.
S.M Dilip Kumar
Univ. Visvesvaraya College of Engineering
Cloud computing is rapidly growing as an alternative to
conventional computing. However, it is based on models like
cluster computing, distributed computing, utility computing and
50
grid computing in general. This paper presents an end-to-end
comparison between Cluster Computing, Grid Computing and
Cloud Computing, along with the challenges they face. This could
help in better understanding these models and to know how they
differ from its related concepts, all in one go. It also discusses the
ongoing projects and different applications that use these
computing models as a platform for execution. An insight into
some of the tools which can be used in the three computing
models to design and develop applications is given. This could
help in bringing out the innovative ideas in the field and can be
explored to the needs in the computing world.
To this end, we first compare different virtualization techniques
and analyze their performance and limitations in terms of
reliability, applicability, flexibility and cost. Then we design a
suitable virtualization scheme and develop a virtualized
management system by virtualizing the physical servers within
the environment. In this paper, the detailed design of the
virtualized management system is presented, and some salient
features of this system are carefully analyzed.
ThC 3.38
Health Care Fraud Detection Using Nonnegative Matrix
Factorization, pp. 499-503.
Shunzhi Zhu
Xiamen Univ. of Tech.
Yan Wang
Xiamen Univ. of Tech.
Yun Wu
Xiamen Univ. of Tech.
In a practical health care dataset, there are many patients with
different prescriptions. A methodology for automatically
identifying and clustering patients with similar symptoms is
needed for health care management department to judge whether
there are frauds in a large-scale clinic dataset. In this paper, we
encode the clinic data with a low rank nonnegative matrix
factorization algorithm to retain natural data non-negativity,
thereby eliminating the need to use subtractive basis vector and
encoding calculations presented in other techniques such as
principal component analysis for similar feature abstraction.
Result evaluations of the proposed method are conducted on a
practical dataset supplied by Health Insurance Management
Center of Xiamen. In our experiments, we have shown that this
method is useful for health care fraud detection.
ThC 3.34
Design and Optimization of Drip Irrigation Emitters Using Directly
of Sewage, pp. 483-488.
Jiang Fan
Guangzhou Univ.
Huang Chunman
Guangdong Baiyun Univ.
Xiang Jianghua
Guangzhou Univ.
Wang Yijun
Guangzhou Univ.
Based on the analysis the clogging mechanism of existing emitter,
pre-impact energy dissipation, pre-precipitation, maze energy
dissipation are used to overcome clogging of emitters, a new
emitters is designed by use of computer aided design technology
and is optimization analyzed by use of computer aided
engineering technology, reasonable structure and flow parameters
are obtained to provide the reference data for the design of
anti-clogging emitter.
ThC 3.35
Design of the USB Download Interface Based on Embedded POS,
pp. 489-491.
Zhu Zhengwei
Changzhou Univ.
Gu Hao
Changzhou Univ.
The embedded POS machine was widely applied by people for its
advantages like low power consumption, compact construction
and easy to maintenance. The internal date of previous POS
machine was generally transmission through the network to the
PC storage. This paper puts forward a kind of method that take
LPC1766 as the micro-controller to build a USB download
interface circuit. Through loading firmware procedures, drivers
and applications, when in the conditions that network was
interrupted or breakdown, users could download the data of POS
machine to the external storage through this interface for
preservation and management.
ThC 4
Computer Architecture
ThC 4.1
Voice for the Voiceless, pp. 504-507.
K.Rajeswari
Sri Sai Ram Engineering College
E.Jeevitha
Sri Sai Ram Engineering College
MR.Meenakshi
Sri Sai Ram Engineering College
V.K.G. Kalaiselvi
Sri Sai Ram Engineering College
Speech and spoken words have always played a big role in the
individual and collective lives of the people.Autistic is a possible
term for a person who can not speak or communicate. Autism is
when the person finds it hard to communicate and express
themselves. ‘Voice For The Voice less’ is a technology which aims
to track every movement of the lips and transform them into
voice , which could help communicationally challenged people to
speak, and allows them to communicate as the normal human
being. This technology makes use of six AG-500 Articulograph
sensors which is fixed over the lips of the user. When the user
moves his tongue to speak, the distance between the various
reference points assigned on the mouth is calculated using those
six sensors and feeds it to the software part of the device. The
distance is mapped with its equivalent SAMPA code. The SAMPA
code is fed as input to a voice generating software which produces
the final voice of the ‘communicationally challenged’ person. This
technology helps the dumb persons in overcoming their disability.
ThC 3.36
Practice and Application of Multisim in Digital Electronic
Experiment Teaching, pp. 492-494.
Yan Guohong
Zhejiang Sci-Tech Univ.
Zhang Shuiying
Zhejiang Sci-Tech Univ.
Du Jingjing
Zhejiang Sci-Tech Univ.
This paper introduces the functions and characteristics of
Multisim software, and describes the new methods of using the
software in digital circuit experiment teaching. Examples about
the experiment using Multisim are given in detail from three
aspects which are the basic experiment, the advanced experiment
and the integrated experiment.It believes that using Multisim in
experiment teaching makes effective complementarities to the
traditional experiment.This new method plays an important role
in improving experiment teaching effection, exploding student's
interest and cultivating innovative ability .
ThC 4.2
Research for Rotor Monitoring System Based on Virtual
Instrument Technology, pp. 508-511.
Huang Zhigao
Wuhan Railway Vocational College of Tech.
Xu Mingbao
The Maintenance Section of North Xiangfan
Zhou Xiaojun
The Maintenance Section of Jianan
This paper designs the rotor monitoring system based on
LabVIEW using virtual instrument technology with taking
multi-function rotor test-bed as monitoring object. The
monitoring system accomplishes the multi-channel data
acquisition of the rotor using sensors, which includes motor
speed, vibration and noise data. The results show that the
monitoring system realizes lots of functions, such as data
acquisition, signal analysis and processing, measurement result
display, data storage, auto-alarm. It provides the basis research for
the on-line monitoring system of large revolving machines.
ThC 3.37
Virtualization in Railway Datacenter Management Environment,
pp. 495-498.
Wei Wang
Beijing Jiaotong Univ.
Yu Zhao
Beijing Jiaotong Univ.
Virtualization is a common technology for improving the
utilization of existing physical computing resources, which
provides great opportunity for industry growth and research due
to its high flexibility and simplification. While various software
products are available for providing the infrastructure of
virtualization, the deploy for a specific industry area is still
challenging. We attempt to apply virtualization technique to the
railway datacenter environment so as to simplify the system
configuration and improve the utilization of computing resources.
ThC 4.3
A Hybird Hierarchical Architecture for 3D Multi-Cluster NoC, pp.
512-516.
51
Wang Jiawen
Nanjing Univ.
Li Li
Nanjing Univ.
Zhang Yuang
Nanjing Univ.
Pan Hongbing
Nanjing Univ.
He Shuzhuan
Nanjing Univ.
Zhang Rong
Nanjing Univ.
The pursuit of higher performance has driven the bus based
architecture toward network-on-chip (NoC). Meanwhile the three
dimensional (3D) IC technology was suggested as a promising
approach to reduce the wire length since the chip size became
larger and larger. Because of the trend of hundreds or even
thousands of processor cores integrated on one chip, it trigged a
quest for the amalgamation of these two technologies above. As a
result, 3D NoC emerged as a potent solution. In this paper, a
hybrid hierarchical architecture for 3D multi-cluster NoC is
proposed with the goal of optimizing the whole system
performance. Each cluster is built based on hierarchical buses
while global connections among clusters are formed with mesh
topologies. The memory system is also divided into several layers
and managed hierarchically. Both architectures and memory
systems are discussed in detail and an analytical comparison of
the average distance decreasing in the proposed architecture
versus a standard NoC is presented. Experimental results indicate
that the proposed architecture can improve the performance
sharply. For writing operations, it can save 54.7% execution time
in the best condition. While for reading operations, this value can
reach 63.6%. And in a real communication-intensive application,
42.7% time savings have been observed compared to the
conventional NoC.
feature extraction of mobile targets. On the basis of that above, a
mobile RFID localization algorithm based on instantaneous
frequency estimation is presented. By mining the function
relationship among Doppler frequency shift, speed and position of
reader, the evaluation of position and speed of mobile target has
been solved. The experiment results show that the location
algorithm is able to meet the requirement of low complexity, less
computation and real-time processing features required by mobile
RFID systems.
ThC 4.7
Flash Aging Prevention Technique (FAP) for Flash Based Solid
State Disks, pp. 531-536.
Anam Zaman
National Univ. of Sci. & Tech., Pakistan
Sumayya Shiraz
National Univ. of Sci. & Tech., Pakistan
Saba Zia
National Univ. of Sci. & Tech., Pakistan
Abdullah Mansoor
National Univ. of Sci. & Tech., Pakistan
Farooq Ahmed
National Univ. of Sci. & Tech., Pakistan
Solid State Disks (SSDs) are replacing hard disks due to
enhancement in speed and reduction in size, power and cost. It is
an obvious choice for many applications including personal
computers, embedded systems, medical and healthcare devices
etc. However, a lot of enhancement and research is required in
order to make it reliable. SSD uses Flash technology which is a
fast, efficient nonvolatile storage chip and offers costeffective
solution for SSDs. However, the feature of erase before write leads
flash towards wearing out therefore affecting the life of flash.
Many wearleveling policies were proposed in past to extend SSD
life time by ensuring even wearleveling of the blocks in a flash
memory. Several algorithms have been proposed to improve
wearleveling of SSD including Hot-Cold Swapping, Dual pool
Algorithm (DP), Kim and Lee algorithm (KL), Block aging
prevention technique (BAP) and Cost Age and Times Algorithm
(CAT) but these policies were for single flash memory. This paper
disuses a multiple flash wear leveling policy known as flash aging
prevention technique for flash memory array(FMA). This policy
reduces the variance in erasure count of multiple flash memories
by 24 % compared to DP, CAT and BAP.
ThC 4.4
Implementation Scheme for Capacitive Touch Sliding, pp. 517-520.
Bo Jiang
Wuhan Polytechnic Univ.
Long Zhou
Wuhan Polytechnic Univ.
The capacitive touch sensor measure the value changes of
capacitance. The changes were sent to MCU after they were
sensed by the analog hardware. Add periodic charging voltage to
RC network. The terminal voltage of capacitance in the RC
network will fall off in the settled charging time because of the
change of permittivity in the network caused by finger touching
activity. We can judge whether the finger touch the sensor by
measure the change of the terminal voltage value of capacitance in
the RC network. We can apply this theory to judge whether the
finger touch the slider to change the volume of the sound box.
ThC 4.8
Room Temperature and Humidity Monitoring and Energy-saving
System, pp. 537-540.
Xianzhe Hua
Guizhou Univ.
Using microcontroller C8051F020 as the core, based on fuzzy
control theory, this paper proposes a set of accurate and efficient,
energy-saving solutions to control the internal temperature and
humidity of the engine room. By acquiring the parameters of the
inside and outside temperature and humidity sensors and using
fuzzy control algorithm to analyze them, we can get series of
appropriate control signals to control air conditioning and fan
working, and ensure machines’ normal working environment.
This system can greatly reduce energy consumption and ensure
real-time monitoring of the room, having high commercial value
and research significance.
ThC 4.5
Performance Comparison of Single Board Computer: A Case Study
of Kernel on ARM Architecture, pp. 521-524.
Naufal Alee
Univ. Malaysia Perlis
Mostafijur Rahman
Univ. Malaysia Perlis
R. B Ahmad
Univ. Malaysia Perlis
Due to increase computer hardware technologies, software
developer are more focusing on to developing embedded
operating system. GNU/Linux becomes a common operating
system widely of embedded technologies. In this paper, we report
performance results on a TS-7800 Single Board Computer with
different version of kernel that has been released by hardware
provider. We compare the performance between operating system
with the latest kernel given by hardware provider, Linux kernel
(2.6.34), and the previous kernel (2.6.21) Our results indicate that
the new kernel has better performance in kernel benchmark,
more bandwidth and less latency. In other experiments we found
that the results are almost the same and in some cases the kernel
(2.6.21) has better performance than the kernel (2.6.34).
ThC 4.9
Optical Burst Switching for Many-Core Processor-to-Memory
Photonic Networks, pp. 541-546.
Quanyou Feng
National Univ. of Defense & Tech.
Dongsong Ban
National Univ. of Defense & Tech.
Huanzhong Li
National Univ. of Defense & Tech.
Wenhua Dou
National Univ. of Defense & Tech.
Existing electrical DRAM technologies are not expected to supply
sufficient bandwidth for many-core architecture as hundreds of
cores are integrated on a single chip in the near future. The
discrepancy of many-core processor-to-memory bandwidth will
continue to enlarge. In this paper, we introduced optical burst
switching to meet the many-core bandwidth challenge. Our optical
technology is enabled by the prosperity of silicon photonic
devices. Optical burst switching is a natural paradigm for bursty
traffic which is common found in on-chip slef-similar flows.
Memory access overhead is amortized by big burst length. Results
of performance simulation and analysis reveal its outstanding
advantages over electronic I/O signaling in terms of throughput,
latency and energy consumption.
ThC 4.6
A Mobile RFID Localization Algorithm Based on Instantaneous
Frequency Estimation, pp. 525-530.
Jiexiao Yu
Tianjin Univ.
Kaihua Liu
Tianjin Univ.
Peng Luo
Tianjin Univ.
In recent years, the application demand for mobile location
techniques have kept rising and the potential market is enormous.
In this paper, analysis on the characteristic of receiving signal of
mobile reader and time-frequency change caused by relative
movement between reader and tags are performed. Then, the
Doppler shift estimation method is introduced in RFID system for
ThC 4.10
52
A Research on Storage Performance Optimization of Virtual
Machine, pp. 547-551.
Dongsheng Yin
Sun Yat-sen Univ.
Jianan Liang
Sun Yat-sen Univ.
Nowadays, virtualization technology, which is one of the key
technology of cloud computing, is facing new challenges and
development opportunities with the rise of cloud computing. As a
typical application of virtualization, virtual machine can play the
role of the segmentation and reintegration of underlying physical
resources, improving the utilization of server hardware resources
and reducing energy consumption. However, the virtual machine
system using the traditional storage scheme leads to poor virtual
machine storage performance. It needs to pay more attention to
the poor virtual machine storage performance and optimize the
storage performance of it. In this paper, a deep research of how
traditional storage scheme leads to poor virtual machine storage
performance is done by an experiment, then a series of optimizing
solution based on SSD (Solid State Drive) and RAID technology is
proposed with related test.
Engineering R & D Center for Modern
Info. Tech. Application in Enterprise
Zhao Hongyi
Xi'an Univ. of Tech.
In this paper, firstly ,the network engineering(NE) training goal
are determined based on engineering capability, it is constructed
that the professional competence curriculum system based on the
“3DCC”. Then, the practices system of network systems
engineering based on the engineering capabilities are
implemented. Lastly, the “4331” innovative practice teaching
platform are constructed, and the basic idea and pattern for
cultivating Vocational NE‘s skilled professionals are probed into.
ThC 5.4
The Research of College Computer Courses Teaching Quality
Improvement, pp. 572-576.
Qing Ye
Jiangxi Univ. of Traditional Chinese Medicine
Minghai Jiao
Northeastern Univ.
This paper researches into Quality Function Deployment (QFD)
method based on fuzzy evaluation of teaching quality. The
student's demand for computer courses is transferred into the
importance weights of teaching element, combined with
evaluation of teaching, including teacher self-evaluation, peer
evaluation, peer assessment and supervision for computer
integrated assessment of teaching quality. An effective quality
method is proposed to determine the weight of evaluation
elements of teaching process in the paper. The comprehensive
score of the teaching elements is determined according to the
fuzzy evaluation method, which is used for the assessment of
teaching quality management. The course of computer hardware
technology is cited as a case for analyzing the weak link in
teaching content and improving the teaching quality of computer
courses.
ThC 4.11
The System MP3 on the Basis f SD Card Applied to the Elevator
Multimedia, pp. 552-556.
Zheng Xiaoyi
Xiamen Univ.
Li Suxun
Xiamen Univ.
Zhang Ning
Xiamen Univ.
Yan Lingjie
Xiamen Univ.
This paper taking development of the system of the elevator music
play and VONIC as the background, introduced the system MP3
which is based on ATmega8, FAT32 file system of SD card, and
decoding of VS1003b. With a small cost perfect realization of
elevator music voice stops and multimedia playback function.
ThC 5.5
Core Basic Course Group Construction in Computer Major, pp.
577-579.
Wang Zhixiao
China Univ. of Mining & Tech.
Meng Fanrong
China Univ. of Mining & Tech.
In order to change talent training situation in computer major, and
to meet the talent training goal, i.e. solid foundation, broad
knowledge, strong ability and high quality, a core basic course
group of computer major was established. The course group
includes advanced language programming, database principle,
operation system and related integrative practice as well. We
carried out comprehensive teaching reform within the course
group. After teaching reform, we established three platforms for
talent training: knowledge learning, engineering practice, and
research innovation. Also, a perfect talent training system
gradually formed which contains four levels: design-oriented,
application-oriented,
integration-oriented,
and
innovation-oriented.
ThC 5
Computer Education
ThC 5.1
The Study of Higher Education of the Disabled from the
Perspective of Human Capital Theory, pp. 557-561.
Xiaoyan Liu
Tianjin Univ. of Tech.
Han Tan
Tianjin Univ. of Tech.
Chengyin Zhang
Tianjin Univ. of Tech.
Xiaoqian Guo
Tianjin Univ. of Tech.
The present-day theorists study higher education of the disabled
particularly from the perspective of social welfare and social
justice. It is a new subject to carry out the study from the
perspective of human capital theory. The disabled who accept
higher education is an important part of the human resources, and
they can create more social value to society far beyond the
investment to them. That education policy-makers and society
think about higher education of the disabled from the perspective
of human capital has an important theoretical and practical
significance.
ThC 5.6
Analysis of Computer Teaching Reform from the Perspective of
Learning Psychology at Univeristy of Chinese Medicine, pp.
580-583.
Xiuju Zhan
Guangzhou Univ. of Chinese Medicine
Xiufeng Liu
Guangzhou Univ. of Chinese Medicine
This paper studies the computer teaching reform at Guangzhou
University of Chinese medicine and proposes the perspective of
the reforming influenced by the learning psychology at the new
information ear.In addition,some typical adverse attitudes of
student's computer learning are also investgatigated and
analyazed.Several recommendations given to encourage the
teaching reform in the computer science.
ThC 5.2
China-U.S. Educational Exchange in the History, pp. 562-567.
Yanxiang He
Wuhan Univ.
Ye Tian
Wuhan Univ.
Jie Deng
State Univ. of New York at Binghamton
As the educational exchange between the China and U.S. has
become more extensive, examining the history of this educational
exchange may provide us a better understanding of where we are
today and what we might do to make the exchange more mutually
beneficial. The author divides the exchange into three periods: the
19th century, the first half of the 20th century, and the second half
of the 20th century. Also examined are several challenges that the
China-U.S. educational exchange is facing now. In the conclusion
part, the author points out several aspects of the exchange that
might be improved.
ThC 5.7
Research on Web-based Teaching and Learning Self-directed
Platform, pp. 584-587.
Ping Yan
Shenyang Aerospace Univ.
Minghai Jiao
Northeastern Univ.
This paper researches into web-based teaching and learning
self-directed platform. It can be described as three aspects:
strategy analysis, infrastructural framework, and design method
and visualization technology. Firstly, the three kinds of strategy
relationship among different elements of web-based teaching and
learning self-directed platform is discussed for strategy analysis,
ThC 5.3
Teaching Pattern of Network Engineering Specialty Based on
Capability, pp. 568-571.
Liu Wenzhi
Jiangsu Province Support Software
Engineering R & D Center for Modern
Info. Tech. Application in Enterprise
Liu Zhaobin
Jiangsu Province Support Software
53
secondly, the infrastructural framework of curriculum internet
platform is provided according to the strategy model, thirdly, the
design visualization model of web-based platform is presented for
improving learning navigation. The curriculum platform of supply
chain management is cited as a case study for introducing the
platform website details of fifteen convenient functions. Finally,
the feature and evaluation of teaching and learning self-directed
platform are empirically given for the reference of application in
the paper.
The Computer Basic Education for Postgraduates in Colleges
under Network Teaching Auxiliary Platform Reform and
Exploration, pp. 602-604.
Boqin Liu
Southwest Univ.
Junmei He
Southwest Univ.
This article describes under Network teaching auxiliary platform,
The computer basic education for postgraduates in colleges
reform and exploration, Since 2007, our school developed under
different professional needs of the teaching aim and content, and
in the ongoing process of teaching of teaching methods, teaching
means of the reform exploration, and achieved some success. Put
forward case teaching and practice of task-driving teaching
combining new teaching model, and be applied in the actual
teaching, to improve the quality of teaching and teaching effect.
ThC 5.8
Analysis of Knowledge Based Graphical Password Authentication,
pp. 588-591.
Gaurav Agarwal
Invertis Univ.
Saurabh Singh
Invertis Univ.
Ajay Indian
Invertis Univ.
Security itself has unique usability challenges because the
requirements
of
security
often
standard
human-computer-interaction approaches cannot be directly
applied. An important usability goal for authentication systems is
to support users in selecting better passwords, thus increasing
security by expanding the effective password space. We examine
the security of knowledge based graphical passwords and their
techniques. In our analysis we present the results of an initial
users study which present the statically analysis of knowledge
technique.
ThC 5.13
Research and Practice on Teaching Computer Science
Undergraduates Based on Educational Games, pp. 605-608.
Feng Yang
Heilongjiang Univ.
Guangtian Zhou
Heilongjiang Univ.
With the development of computer technology and network
invasively and continuously, computer has already become a part
of our life. Computer could supply new teaching mode combined
education with game. Now college should be education between
oriented-student and oriented-society which cannot stick into
textbook, but can blend theory and practice. Therefore, animate
and visualized education mode is a necessary path to motive
students seeking knowledge continuously. This paper focuses on
computer science curriculum to discuss how to combine course
content with educational games. It suggests a novel heuristic
teaching mode of education with games melted into course to
train student search much more knowledge. And it describes the
basic theory, characteristics and process by showing a case named
GameAI course. Thus it would be an example to guide other
courses to change teaching mode.
ThC 5.9
Network Course Design for Secondary Vocational Education, pp.
592-594.
Huang Xingyun
Wuhan Univ. of Tech. Guangxi Mech.&
Elec. Industry School
Ou Qizhong
Guangxi Teachers Education Univ.
This paper describes the design of network course for secondary
vocational education on the aspects of the general design concept,
basic structure, modules design and technology application, to
explore the efficient use of the various teaching resources based
on websites, the implementation of the network learning, and
promote the comprehensive quality-oriented education in
secondary vocational school.
ThC 5.14
Surveying and Analyzing Graduate Students' Studying Satisfaction
Degree, pp. 609-613.
Qiaoyun Chen
Nanjing Normal Univ.
Yi Li
Nanjing Normal Univ.
With the large enrollment of postgraduate students, many
questions related with the students’ education has appeared. This
research takes X university as a case for the graduate satisfaction
survey. During the case study, we detect that graduate students
have low satisfaction in “tutor system”, “curriculum system”,
“teaching situation” and “academic environment”. Therefore, we
propose that instruction of postgraduate students should in
accordance with the rules and characteristics of them while
expanding the enrollment scale.
ThC 5.10
Exploration of Education Reform Based on 32-bit Assembly
Language Programming, pp. 595-599.
Lin Shan
Hubei Univ. of Tech.
Assembly language programming is a fundamental and required
course for students majoring in computer science. The teaching
content and practice training based on 16-bit have seriously fallen
behind the current computer technology. This paper makes an
intensive research on the classroom teaching, practice teaching
and teaching methods of assembly language programming.
Moreover, it proposes an effective reform scheme based on 32-bit
assembly language including the improvement of course content,
the incremental of comprehensive experiment, and the
development of curriculum group. Experimental results reveal
that the education reform can bring a positive effect on enhancing
students' learning interests, improving teaching quality, training
student's research ability, and augmenting teachers’ professional
qualities.
ThC 5.15
Analysis on the Difference between Public Education and Social
Security in Regulating Income Distribution, pp. 614-618.
Zeng Yi
Wuhan Univ.
This paper has adopted an OLG Model to study the regulatory
mechanism of public education and social security on income
distribution. According to the research, public education can
effectively narrow the gap in educational investment among
families, and thereby reduce income disparity. Social security can
bring down income disparity by reducing the labor supply and
increasing effective family instructional time of low-income
families. According to numerical simulation, at the same
expenditure level, the capability of public education in regulating
income disparity is much stronger than social security. When
budget scale is relatively small, the priority shall be given to public
education expenditure to reduce income disparity; when the
budget scale is relatively large, the balance shall be established
between expenditure on public education and social security.
ThC 5.11
Exploration of Ternary Training Mode on Continuing Education,
pp. 600-601.
Liu Baobin
Jiangsu Economic & Trade Tech. Inst.
Zhou Wei
Zhejiang Univ.
In today's society, science and technology develop rapidly.
Technology professionals need to constantly improve their
knowledge and skills structure. It is imperative to explore the new
mode of continuing education, and the purpose of continuing
education reform is to implement theory and practice integration
and develop technology professionals’ innovation. At present, the
ternary system that is put into practice in our institute of
continuing education includes theory study, practicein-school and
comprehensiveness. Feasibility of ternary system has been proved
by theory and practice.
ThC 5.16
Research and Implement of the Virtual Laboratory of Power
Electronics Based on LabVIEW, pp. 619-622.
Qiong Cheng
Hubei Univ. of Tech.
Bo Fu
Hubei Univ. of Tech.
Now using virtual laboratories in experimental teaching in higher
school has become a tendency. Combined with the teaching
ThC 5.12
54
practice of higher school, we use LabVIEW software of NI
Company with MATLAB to construct the virtual laboratory of
power electronics. For the current situation of virtual laboratory,
we described in detail the construction process and method of the
virtual laboratory of power electronics, and further stated that the
virtual laboratory of power electronics will become an important
way and method to future experiment teaching.
Maria Banari
Mazandaran Univ. of Sci. & Tech.
Narges Yousefnezhad
Mazandaran Univ. of Sci. & Tech.
The current undergraduate software engineering curriculum in
Iran was approved by MSRT in October 1998. However, software
industry faces the fastest growth rate among science and
technology areas. Considering that, this article aims at revising
this curriculum from the viewpoint of users of its output, the
managers of software industry. To achieve this goal, the courses of
MSRT's and high-ranked universities' curricula plus nontechnical
skills and potential future needed knowledge, collected from
literature, were presented to the software managers, and they
were asked to choose it as essential or elective course, or remove
it from the curriculum. At the end, a list of essential and elective
courses was presented, and it was compared with the literature.
ThC 5.17
Research on Multi-purpose Training-based Curriculum System of
Computer Concept, pp. 623-626.
Wei Yuanyuan
Wuhan Textile Univ.
Wei Min
Wuhan Univ. of Tech.
This paper mainly analyzes the current situation of computer
concept teaching, and proposes a multi-purpose training system
for the diversified personnel training structure. In addition, the
issues of construction of curriculum system of computer concept
and the problems that are encountered during multi-purpose
training for computer concept are tried to solve. Based on
practical experiences of student teaching in Wuhan Textile
University, a detailed graded-teaching and categorized-teaching
method and related teaching mode are presented, and the
potential difficulties or troubles that may be encountered in
teaching are considered. Finally, the possible detailed solutions
are given, which may provide certain references for similar
teaching in relative universities.
ThC 5.22
Kill Two Birds with One Stone: Boosting Graduate Students’
Abilities in Simulation by Realization Dynamic Demonstration
Experiments, pp. 645-648.
Wang Rui
Beihang Univ.
Liu Yuming
Beihang Univ.
Zhao Yan
Beihang Univ.
The question of how to promote the graduate student’s simulation
ability and achieve the purposes of visualizing the principles in
signal processing course is addressed in this paper; In pursuit of
this objective the design and realization for several virtual
instrument modules based on the platform LabWindows/CVI with
graph user interfaces (GUI) which provides users the functions of
flexible data acquisition, signal analysis and processing, signal
output and display on the windows platform are presented. The
project of the simulation not only realizes the idea ’The software is
the instrument’ which achieves the Dynamic Demonstrating
Experiment Teaching in the classroom, but also as a context of
tacit knowledge utilization make the acquisition and sharing
practical know-how take place between project team members. It
is really to kill two birds with one stone.
ThC 5.18
Study on the Coordinated Development between Higher
Vocational & Technical Education, pp. 627-630.
Wang Yudong
Jiangmen Polytechnic
Chen Yao
Jiangmen Polytechnic
T Vocational education is viewed as the foundation of
industrialization and modern manufacturing development, thus
higher vocational education plays a key role in improving
advanced manufacturing and industrialization levels. As a
combination ofindustry and education, vocational education
originates from the need of industrial development, and functions
in industrial progress in return. The two are intertwined by
employment, manifested in the alternative and spiral
development led mainly by industry. Trade and industrial
development serveas the guide, basis and ground of higher
vocational education construction and reformation. As a
consequencethe variety of industrial development determines a
diverse subject design of higher vocational education. meanwhile,
the mature development of the industry extends the space for
subject construction in higher vocarional education. An interactive
system involving government, school and enterprise is the
guarantee for coordinated development between higher
vocational education and industry.
ThC 5.23
Ideas Transforming in the Public Arts Education of Virtual
Museum, pp. 649-653.
Jiang Zhaojun
Nanjing Univ. of Aeronautics & Astronautics
Wu Zhibin
Nanjing Univ. of Aeronautics & Astronautics
The purpose of this study is to investigate how virtual museum
efficiently utilize virtual platform to carry out public arts
education. In order to give a full understanding of the issue of
public arts education of virtual museum, three concepts need to
be changed. The first concept is tansforming the purpose of public
arts education for Virtual Museum: from training the masses’
artistic accomplishment to developing the masses’ creativity.
Through comparing the difference between Westen and Chinese
arts education concepts, it is found that in the context of
post-industrial society, the domestic public arts education
function should be turned. The second concept is tansforming the
construction idea of public arts education for virtual museum:
from focusing on virtual reality technology to creating virtual
reality products. The problem of Chinese virtual museum is too
much emphasis on virtual reality technology. I believe that virtual
museum should utilize virtual reality technology to design logic
architecture and navigation system. On this basis, taking
advantage of virtual network platform to exhibit the richer
information of collection, simutaneously designing the display
mode of collection and exhibiton, virtual museum finally will show
virtual reality products with good human-computer interaction.
The third concept is tansforming the communication idea of
public arts education for virtual museum: from emphasizing
knowledge communication to establishing the experiential
dissemination field. It firstly needs try to choose widly concerned
and influential collection, secondly needs to construct open
dissemination field which integrates the family, school,
community and virtual museum. In summary, it is urgent to
tansform the concept of public arts education for virtual museum.
ThC 5.19
A Practical Teaching Approach to Management Information
System Course, pp. 631-633.
Haihe Shi
Jiangxi Normal Univ.
Management Information System (MIS) is a core course of
business administration major. However it is hard for students to
grasp and practice in real life. The existing problems of current
teaching are analyzed in the paper, and a practical teaching
approach is proposed to address the existing problems. The
approach emphasizes active rational participation of all students
and laying equal stress on the perceptual knowledge and rational
knowledge.
ThC 5.20
The Thinking of Computer Language Courses in China, pp.
634-637.
Yu He
Beijing Tech. & Business Univ.
Computer Language Courses are one kind of computer course that
is very important to foster Chinese computer talents. The paper
discusses author’s some puzzle and thinking about courses
offered, teaching and contents of textbooks in China.
ThC 5.24
Research on Talent-training Mode of Modern Computer Hardware
Design, pp. 654-656.
Wei Yuanyuan
Wuhan Textile Univ.
Wei Min
Wuhan Univ. of Tech.
ThC 5.21
An Investigation of Undergraduate Software Engineering
Curriculum: Iranian Universities Case Study, pp. 638-644.
Amin Khodabandeh Amiri
Mazandaran Univ. of Sci. & Tech.
55
This paper is mainly concerned with talent-training mode,
method, together with the harmonization and combination of
related curriculum teaching in modern computer hardware
design. It is found that the innovations of teaching contents,
teaching materials, experiment-based innovative curriculum are
strongly required in practical teaching. Of course, the contents and
forms of the teaching contents should be timely updated and
diversely distributed to meet social need. Based on the innovation
base of School of Computer Science and Technology, Wuhan
Textile University, the talents are trained independently, which is
implemented through practical projects, self-learning cultivation,
innovative spirits and innovation ability to meet the needs of
computer hardware design.
video cases, and explores how to apply video cases into classroom
teaching.
ThC 5.29
The Research of Teaching Methodology on Operating System
Process Control, pp. 671-674.
Zhengde Zhao
Shanghai Univ.
Genchang Zhao
Shanghai Univ.
Process control is the important and difficult part of CPU
management education in operating system. In this paper, we
discuss a teaching methodology which is based on “theory and
practice, basic and promotion” according to the characteristics of
the teaching contents. The teaching contents can be transformed
from abstraction and simplicity into concreteness and integration
by this methodology. The practice proves this methodology is
effective.
ThC 5.25
Construction of Curriculum System on Webpage Design and
Website Development in Higher Vocational Colleges, pp. 657-659.
Guan Xiaohui
Zhejiang Water Conservancy &
Hydropower College
Zhou Zhimin
Zhejiang Water Conservancy &
Hydropower College
With the numerous applications based on web technique widely
distributed over Internet, the current demands for webpage
designer and website developer are increasing dramatically. In
this paper we firstly discuss about the requirement of skills and
knowledge needed by webpage designer and website developer.
The construction of curriculum system is depicted in detail by
several dimensions which include teaching content, teaching
methods and evaluation methods basing on authors’ teaching
practice and experience. The curriculum system is now being
applied to current teaching process, and some perfect effects are
achieved.
ThC 5.30
Perspective: Employment Conditions for Computer Engineering
Related College Graduates in China, pp. 675-680.
Ken Chen
Ningbo Univ.
Qingnian Huang
Ningbo Univ.
Ming Hu
Ningbo Univ.
Robert M. Randoy
O'Hare International Airport
Engineering majored college graduates in China have been facing
more and more challenges and competitions in the employment
markets since the national higher education enrollment expansion
was put in practice a decade ago. Generally, there are three factors
contributing to today’s status in quo: ten year college enrollment
expansion, degrading quality of college recruits, and staggering
teaching quality of college faculties. In this paper, for engineering
specialized college graduates, the overall employment concerns
are addressed and status in quo is analyzed, and two case-studies
are conducted investigating the employment conditions for the
information engineering majored college graduates based on the
first-hand dataset pooled from the author’s college. In the end,
some suggestions are proposed for the undergraduates’
employmentoriented solutions.
ThC 5.26
Practical Notes on Teaching Computer Basics in English to
International College Students in China, pp. 660-664.
Ken Chen
Ningbo Univ.
Rong Jiang
Ningbo Univ.
Qingnian Huang
Ningbo Univ.
Robert M. Randoy
O'Hare International Airport
With fast pace taken towards globalization in higher education in
China, recent years have witnessed the steadily growing number
of foreign students coming to China pursuing for their advanced
academic degrees. Based on the firsthand teaching and
administering experience, the authors deliver this paper aiming at
sharing some points in teaching basic computer course including
curriculum design and teaching methods, etc., and recognizing the
characteristics of foreign students distinctive from that of their
Chinese peers. It is expected that this work may render some
practical notes for course construction of international students
and facilitating the process of China’s ongoing higher education
internationalization.
ThC 5.31
ICT Education in Rual Areas of Southwest China: A Case Study of
Zhongxian County, Chongqing, pp. 681-685.
Lv Jiake
Southwest Univ.
Information and technologies are believed to be able to promote
China’s rural education and bridge the digital divides between
rural and urban areas. Although they have been utilized into china
education for more than decade, However, little attention is given
to examine the development situation of ICT education of
southwest China rural areas where is one of the poorest parts in
this nation. Taking the Zhongxian County of Chongqing as a case,
this paper illustrates the current development of ICT education in
rural area of southwest China and examines the major problems
that rural ICT education is facing. After detailed discussion, this
paper proposes optimal strategies for rural ICT development and
holds that only the combination of equipments, instruction
contents, teachers training and funds can provide a steady and
sustainable solution for southwest China rural ICT education.
ThC 5.27
Design and Exploration of the English Website of the Course
Analog Electronic Technology, pp. 665-667.
Liang Likai
Shandong Univ.
Zheng Yamin
Shandong Univ.
Tong Qiang
Shandong Univ.
This paper firstly indicates the designing aim and process of the
English Internet Course of Analog Electronic Technology, based on
which the author sets forth detailed the information of homepage,
cyber education, experimental teaching, self-testing exercises and
the distinguishing design of message board. The Web design has
well navigating, communicating and independent property.
ThC 5.32
Wiki-based Collaborative Learning For Colleges Specialty English
Writing Education, pp. 686-690.
Tang Guoxiang
Southwest Univ.
Xie Deti
Southwest Univ.
Wang Xuan
Southwest Univ.
Specialty English writing education, which aims to help students
to train and develop students literacies and skills required for
successful communication in English academic and professional
contexts, is very important in china university students’ academic
studies. As witnessed by the popularity of sociocultural and
constructivist approaches in language teaching, collaboration can
play a vital role in helping learners to build knowledge and
acquire skills. Over past decades although a lot of advanced
technologies and learning platforms have been introduced to this
field, most of them however just focused on interactive,
personalized instruction effectiveness and little attention has
been given to examine how collaborative writing can be offered,
coordinated and assessed. As one of the most popular web2.0
ThC 5.28
Research on the Application of Video Cases in Computer
Education of College Students, pp. 668-670.
Hanrong Chen
Southwest Univ.
Tangtang Xie
Southwest Univ.
The cultivation of computer capability plays a very important role
in computer education of college students. The video case based
instruction can promote the reformation of college students’
computer skill training. This paper mainly introduces the
advantages of video case based instruction used in computer
education of college students, illustrates the design methods of
56
technologies, wiki is believed to have large potential for fostering
collaborative group work and creating learning resources. In this
study, a Wiki-based collaborative writing environment for one
college specialty English course entitled “E-Commerce Specialty
English” was present and practiced. Three important learning
strategies including collaboration and knowledge sharing, peer
assessment and learning process monitoring were adopted to
assist the development of a collaborative writing community.
Evaluation results showed that Wiki-based collaborative writing
can effectively contribute to students writing participants,
facilitate group work and make students pay more attention to
readers.
collaborative work among students performing online activities.
About one hundred students from three high schools, in the
suburbs and outlying areas of Perugia, were involved in an
experiment based on a software system that we have called
Talenet. This tool was developed to test the effectiveness of an
interactive environment that allows students and teachers to
share the analysis of a collection of Romantic ballads. Twelve
Italian Romantic ballads were chosen within four themes:
patriotic, sentimental, social, and historical & legendary. The
results of this experimental study are: an increase in learning
literature in this particular case by building a bridge between the
classroom experience and the informal network learning, an
increase in the students’ motivation to study and to boost their
creativity and their experience in network sharing with members
of their and other classes. Opinions, emotions, and materials from
other websites, basically any thoughts the students wished to
share with their friends. were among the shared things.
ThC 5.33
Teacher Robot, A New Concept of Modern Teaching, pp. 691-696.
Aihua Zhang
Bohai Univ.
Zhongdang Yu
Bohai Univ.
Nowadays, facing massive amount of information from various
sources, the traditional education concepts and architectures have
reached their limits to meet people’s requirements for an
intelligent education system. Based upon more than 10 years’
practice in university education, the authors developed a new
concept of Teacher Robots by analyzing and refining the general
definitions and capabilities of robots. In this paper, the authors
also described the subject foundation, functions and absolute
features of the Teacher Robots in details. Among all these optimal
features of Teacher Robots, the independent operational
capabilities were especially essential for the design of an
intelligent teaching tool. This new concept of Teacher Robots
suggested a potential approach to develop a systematic
framework of modern educational system.
ThC 5.37
Study on Teaching Strategies of “College Computer Foundation”,
pp. 710-714.
Yangmei Zheng
Guangxi Youth Leaders College
“College Computer Foundation” is an important public basic
course in the university. It plays an important role in
undergraduates’ computer education. In this paper, a brief
description is made for “College Computer Foundation” from its
development, its goal, its characteristics and its contents in the
beginning. And then the facing problems in teaching are analyzed.
To solve these problems, some strategies are proposed from the
following aspects, teaching objects, teaching contents, teaching
organization, extension after class and course assessment.
ThC 5.34
An Intelligent Educational Software for Automatic Problem
Solving in Linear Algebra, pp. 697-702.
Nhon Do Van
Ho Chi Minh City Univ. of Tech.
Hung Chau Kim
Ho Chi Minh City Univ. of Tech.
Van Ho Long
Ho Chi Minh City Univ. of Tech.
Systems of automatic problem solving based on knowledge base
play an important role in application of artificial intelligent;
especially in education, those systems support effectively to
students and teachers in learning and teaching mathematics.
Linear algebra is an important basic knowledge for all students in
most of disciplines, particularly in information technology. In this
paper, a knowledge representation model and inference algorithm
are presented; and they have been used to design and implement
a system of automatic solving for Linear algebra, as a result that
its solutions are suitable with thinking and writing of human. The
system is implemented by the algebraic computation system of
Maple and C# programming language through connecting
technique between Maple and C#. This program has been tested
and appreciated completely.
ThC 5.38
Education Reform on Software Programming Courses for
Non-IT-Majoring Undergraduates, pp. 715-719.
Shaobing Song
Hangzhou Normal Univ.
Ge Yu
Hangzhou Normal Univ.
Software programming skills becomes more and more important
in the information times for up-to date students. The article
describes the essential thoughts and discusses the basic practices
in education reform on software programming courses for
non-IT-majoring undergraduates. Main concerns include
project-driven thinking, textbook revising, teaching model
reforming, student demand orientating, initiative arousing,
interests compelling, knowledge transferring, project-driven case
studying, adversity environment teaching, teaching procedure
designing and team work conducting. And also analyzes the
effects of the reform practices.
ThC 5.39
Network Education Platform Design of Space for Future Teacher,
pp. 720-722.
Ou Qizhong
Guangxi Teachers Education Univ.
Zhang Lanfang
Guangxi Normal Univ.
Space for Future Teacher integrates IT with teacher education,
creates 4 innovative teachers' education labs including a teacher
professional development lab, an interactive lab of learning
community, a remote teachers’ lab of rural primary and secondary
schools, and a development lab of education network resources,
and offers a new network education platform for training qualified
teachers of primary and secondary schools and outstanding
serving teachers.
ThC 5.35
Exploration and Practice of Software Engineering Core Curriculum
Construction, pp. 703-705.
Guangquan Zhang
Soochow Univ.
Mei Rong
Jinan Univ.
"Software Architecture” and “Formal Methods” are two important
core courses of Software Engineering. Their teaching quality and
effectiveness will have an important influence on cultivating
Software Engineering talents with high quality and innovation. At
present, the teaching quality and effectiveness of these two
undergraduate courses are unsatisfactory and have more
problems in the domestic universities. Against these problems,
this paper explores in the aspects of teaching content, teaching
models, teaching methods and means, teacher resources and so
on, in order to improve teaching quality, strive high-level elaborate
courses and train qualified software engineering high level talents.
ThC 5.40
Mathematical Education (Computer Application) Professional
Facing Difficulties and Countermeasures, pp. 723-725.
Qiang Yi
Jiujiang Univ.
Li Xingnan
Jiujiang Univ.
Zhou Jingui
Jiujiang Univ.
In the background of the new curriculum reform how to cultivate
the mathematical education(computer application) professional
students is our main issues now. Through the investigation , we
specific analysis the mathematical education (computer
application)professional
facing
the
general
difficulties.
Determinate the local colleges education of mathematics
professional own unique difficulties, and gives the solution
difficult key initial assumption.
ThC 5.36
Collaboration of Online Educational Instruction: Analysis of the
Use of Online Teaching Tools for High School Students, pp.
706-709.
Floriana Falcinelli
Univ. of Perugia
Cristiana Brunelli
Univ. of Perugia
This paper presents the results of a research project on a
57
many teaching method reforms have also been stimulated.
Drawing on the experience of German project instruction and
combining years of teaching experiences, the authors introduced
an open-ended project instruction mode based on network. This
article demonstrates its contents, characteristics and practical
results in detail. We pay particular attention to the sources,
organization, and effectiveness of instruction. We come to the
conclusion that the characteristics of projects lies in its openness
which makes it be free to choose teachers, partners, projects and
high quality learning environment. This instruction mode has
achieved fruitful results and good social effects.
ThC 5.41
A Study on the Models of Teaching Computer Basic Course in
Social Computing Context, pp. 726-729.
Chunying Zhang
Hebei United Univ.
Jianjing Li
Hebei United Univ.
Xiao Chen
Hebei United Univ.
Social computing, the direction of network development in the
future, has exerted a profound influence on our life and work. This
paper, based on the presentation of social computing and its
impact on education, explores the models of teaching computer
basic course at college in the social computing context, with its
focus on teaching contents and activities, experimental teaching
and network teaching.
ThC 5.46
The Exploration of the Teaching System of Operation System,
Enhancing the Comprehensive Quality of Students, pp. 748-750.
Tangtang Xie
Southwest China Univ.
Zhilin Ren
Southwest China Univ.
Hanrong Chen
Southwest China Univ.
Jun Li
Southwest China Univ.
This paper analyzed the status and the characteristics of
“Operating System”, the existing problems on the current teaching
of “Operating System” for undergraduates majoring in computer
sciences. According to the teaching requirements and objectives of
the operating system, this paper put forward the “incremental”
teaching system. The key links of the teaching system is
formulated in four aspects as follows: optimizing the teaching
content and refining the instructional structure, innovating
teaching modes and carrying out the threedimensional
instruction, setting up a “chain of practice teaching” and
enhancing the innovative ability of students, constructing teaching
aids resource library and promoting independent learning. This
teaching system proves to be able to meet the teaching
requirements of the “Operating System”, enriching the students'
knowledge, and cultivating the comprehensive quality of the
students.
ThC 5.42
Knowledge Representation and Algorithms Automatic Solving
Integral Problems, pp. 730-735.
Nhon Do
Ho Chi Minh City Univ. of Tech.
Thu_Le Pham
Ho Chi Minh City Univ. of Tech.
Integral of single variable functions is an important issue in
calculus. This problem is widely applied in many fields such as
physics, economics, etc. Systems for automatic solving integral
problems are necessary tools in education. They support students
and teachers in learning and teaching mathematics. Current
computer algebra systems such as Maple, Mathematica, etc can
solve integral problems. However, they output the result only or
are limited to give the complete solution. This paper presents a
model for representing knowledge about single variable functions
and proposes some algorithms for solving integral problem
automatically. These algorithms mimic the human way of thinking
and produce the solution that explains the calculus process.
ThC 5.43
Design and Research of Multimedia Teaching in Sports Technique
Class of University, pp. 736-739.
Wu Yajuan
Chang-an Univ.
Multimedia in class of university has become much popular. But it
is clearly not enough attention taken in the sports ,so that method
of the teaching is backward ,the way is simplex and traditional ,the
content is old and boring ,the approaches are all in the same
key .But when we use multimedia teaching in sports technique
class of university, we will find that it could improve the method,
enhance the way, guide students' interest ,we would also find that
multimedia teaching could not only make the process of teaching
colorful, but also improve the effect of bilateral activities of
teaching and learning.
ThC 5.47
Learning Outcomes of Programming Language Courses Based on
Peer Code Review Model, pp. 751-754.
Yanqing Wang
Harbin Inst. of Tech.
Li Hang
Harbin Inst. of Tech.
Sun Yanan
Harbin Inst. of Tech.
Jiang Yu
Harbin Inst. of Tech.
Yu Jie
Harbin Inst. of Tech.
Software quality assurance at source code level has drawn
pressing concerns because of the increasing complexity and size
of software projects. Based on the updated peer code review
process model, an information system was constructed. After
several academic years’ implementation, questionnaire is made
and data is analyzed. Some charming learning outcomes are
recognized. Peer code review model is further proved vital in the
pedagogy and evaluating of programming language although it
can still be improved.
ThC 5.44
Research on the Computer Teaching System for Talent Cultivation
Based on Kano’s Model, pp. 740-743.
Ping Yan
Shenyang Aerospace Univ.
Minghai Jiao
Northeastern Univ.
This paper aims to the talent cultivation problem in higher
education, analyzes the five categories of customer satisfaction
according to Kano’s model, assesses the student satisfactory
computer curriculum according to Kano’s evaluation table, and
then provides the computer teaching system model and computer
courses setting. The model includes three dimensions: Subject
program (x-axis), Teaching level (y-axis), and Experiment type
(z-axis), which enhances student quality and satisfactory. The
subject program includes Arts, and Science. The teaching level
includes Introduction, Elementary, Professional, and Innovation.
The experiment type includes Basic, Synthetic, Design, and
Innovation. Computer courses are arranged in corresponding
hierarchy for talent cultivation. Experiment type also is integrated
into aforementioned layers. The presented model is effective for
student quality cultivation.
ThC 5.48
Exploration and Practice on Higher Mathematics Teaching Reform
under the Condition of Modern Information Technology, pp.
755-757.
Xiongwei Liu
National Univ. of Defense Tech.
Jianping Li
National Univ. of Defense Tech.
Under the condition of modern information tech-nology, various
universities in China have been exploring how to reform the
teaching content, teaching method, teaching means and teaching
mode of higher mathematics. In recent years, according to the
talent training goal of our university, we have carried out a series
of beneficial exploration and practice such as updating the
corresponding teaching content and curriculum system, reforming
the teaching mode, perfecting the supporting course resources
and expanding the interactive teaching mode. In this way, we have
made some achievements in higher mathematics teaching
efficiency and talent training quality.
ThC 5.45
Open-ended Practical Project-based Instruction Mode Under
Netwrok Environment, pp. 744-747.
Gang Cen
Zhejiang Univ. of Sci. & Tech.
Xuefen Lin
Zhejiang Univ. of Sci. & Tech.
Junyan Luo
Zhejiang Univ. of Sci. & Tech.
With the improvement of network environment, learning concept
under network environment becomes more and more popular and
ThC 5.49
The Research on User Satisfaction of Easy Teaching Web of Taipei
Assessed via Information Quality, System Quality, and Technology
Acceptance Model, pp. 758-762.
Chien-Yun Dai
Taiwan Normal Univ.
58
Manting Kao
Taiwan Normal Univ.
Charng-Tzer Harn
Taiwan Normal Univ.
Yu-Hsi Yuan
Taiwan Normal Univ.
Wan-Fei Chen
Taiwan Normal Univ.
In the digital era, using information technology to search for
valuable information has been one of the skills are important.
Taipei City Government set up Easy Teaching Web of Taipei,
integrate scattered knowledge in the field of education and human
resources, and build a knowledge-sharing platform for teachers.
However, it is still important to understand how to improve the
usage of Easy Teaching Web of Taipei of teachers. This research
applied the Technology Acceptance Model as research foundation,
and the Information Systems Success Model was also considered
as impact factor in this research, to understand the teachers to the
satisfaction of the digital platform. There are 318 valid samples by
random selected from members to fill out a developed
pencil-paper questionnaire. The multiple-regression was used for
data analysis, the empirical results lead to four conclusions. First,
Information Quality (IQ) can predict Perceived Usefulness (PU)
and Perceived Ease of Use (PEOU). Second, System Quality (SQ)
can predict PU and PEOU. Third, PEOU can predict PU and Attitude
toward using (ATU). Fourth, ATU can predict User Satisfaction
(US). According to research finding that Easy Teaching Web can
promote the user satisfaction by improve easy use of the system.
Science, pp. 772-775.
Liu Chengxia
Beijing Info. & Tech. Univ.
Cai Ying
Beijing Info. & Tech. Univ.
Shen Meie
Beijing Info. & Tech. Univ.
The competition at present is more and more intense, how to
improve students' comprehensive competitiveness is one of the
important targets of students cultivation. The importance and
necessity of the cooperation between university and enterprise is
discussed in this paper and how to make the student majored in
computer science more professional is studied. Make reference to
some universities’ successful experience the method of
cooperation is listed and the University-Enterprise be united to
develop combined cultivation program in practice part is given.
From some examples we can obtain better application effect than
before by the new cooperation method. The problems need to do a
further study in cooperation are discussed in the end of the paper.
ThC 5.54
How to Improving the Non-computer Science Students’ Computer
Ability, pp. 776-778.
Wang Zilan
Southwest Jiaotong Univ.
Xie Pan
Southwest Jiaotong Univ.
Lin Jing
Southwest Jiaotong Univ.
With the rapid development of the computer and applied
technology, universities increasingly focus on cultivating
non-computer science students’computer application skills. This
paper analyzes the teaching status and problems of non-computer
major in universities, then explore the way to improve the
computer application skills of the non-computer science students
from the improvement of teaching resources, teaching and
learning methods, the mental attitude towards to the computer
education respectively. Propose appropriate measures to improve
students’ capacity of using computer to analyze and solve practical
problems and to cultivate the compound talents with both
computer skills and expertise.
ThC 5.50
Study on Curriculum Design of System on Chip, pp. 763-765.
Jianfeng An
Northwestern Polytechnical Univ.
Xiaoya Fan
Northwestern Polytechnical Univ.
Shengbing Zhang
Northwestern Polytechnical Univ.
Wengxing Li
Northwestern Polytechnical Univ.
Besides application opportunities due to billions of transistors
and GHz frequencies, the last ten years witnessed a major shift in
the traditional design of VLSI to a more modem approach which is
SoC. Universities are recently updating their digital design
education offerings to include the recent SoC design approaches.
This paper discusses curriculum design of SoC in universities. We
suggest SoC courses should place extra emphasis on experiments.
We compare our FPGA based SoPC experimental method with
IMEC. This analysis would be helpful to construct a more
reasonable SoC course under current available conditions.
ThC 5.55
Multidimensional Teaching Research on University Computer
Foundation Course, pp. 779-782.
Dan Guo
Harbin Univ. of Commerce
This paper studies the current teaching mode of university
computer foundation course. and on this basis puts forward
multidimensional teaching mode, which enriched the single
traditional teaching mode. This research has important
significance for similar course features teaching construction of all
national universities. It can be extended to other same based on
the characteristics of the course teaching, which helps to improve
the teaching effect of various disciplines, to cultivate students the
comprehensive utilization ability and the ability to adapt for
employment.
ThC 5.51
On the Necessity of Distance Learning Courseware Building for
EFL Adult Learners, pp. 766-768.
Bi Huiying
Changchun Inst. of Tech.
The author firstly analyzes the background and current situation
of distance English learning for EFL adult students and points out
the necessity of building distance learning courseware to update
the teaching concepts and to improve teaching efficiency. The
theoretical foundations for distance learning courseware
construction are Independent Learning Theory and Interest
Principle. In this paper, the author gives a perspective on the
contents and the specific requirements of English courseware
building. And then the author analyzes the advantages of building
such a project to prove its necessity and significance.
ThC 5.56
General Education Extra-curricular Training Program for
Computer Major College Undergraduates: Practice and
Exploration, pp. 783-787.
Xin Mingjun
Shanghai Univ.
Wu Yue
Shanghai Univ.
On the basis of analyzing market demand of talent positioning for
computer professionals, it proposes the reform of the general
education for the freshman of computer professionals and the
curricular and extra-curricular training program of professional
education in the last three years. Furthermore, according to the
general education curriculum system will be executed from this
year in Shanghai University, it focuses on the key evaluation
methods of extra-curricular training program with comprehensive
cultivation of talents, which is named as a core approach both in
learning outcomes based general education and in practice based
professional teaching and learning. Thus, it provides a dependable
practice and exploration platform and brings a new foundation for
the creative talents’ training under the teaching and learning
background for general education.
ThC 5.52
Research on the Construction of Practical Teaching System for
Computer Majors, pp. 769-771.
Zhang Ping
Zhengzhou Info. Tech. Univ.
Han Lin
Zhengzhou Info. Tech. Univ.
Zeng Guangyu
Zhengzhou Info. Tech. Univ.
The purpose of practical teaching is to help students master basic
experiment skills and methods, deepen the understanding of
theoretical knowledge and develop their sense of innovation. To
improve the practical ability of students is the mainline of the
practical teaching. The construction of practical teaching system is
beneficial to normalize the training process of practical teaching,
and arrange the experiment courses scientifically and
systematically. Based on the experience of practical teaching, this
paper focuses on discussing thoughts and ideas on construction of
teaching system for computer majors.
ThC 5.57
ViSiMIPS: Visual Simulator of MIPS32 Pipelined Processor, pp.
788-793.
Md Tahsin Kabir
North South Univ.
Mohammad Tahmid Bari
North South Univ.
ThC 5.53
Using Cooperation Between University and Enterprise to Improve
the Comprehensive Competitiveness of Student in Computer
59
Abul L. Haque
North South Univ.
Pipelining is very important implemention technique in computer
architecture which permits several instructions to be esecuted
simultaneously ,each of them in a different stage of the
datapath.Students of computer since need to aquire this
fundamental concept clearly but most of them find it
unfathomable.Moreover it is diffcute for an instructor to teach
these concept on a paper and pencil basis.In this paper we present
VISIMIPS,which simulates and dynamically visualizes the
processing of instructions by MIPS32 pipelined processor to assist
in teaching such concepts. In addition, it describes details of the
basics of MIPS instruction set and pipelining, also designates
ViSiMIPS, its main components and functionalities. Its graphical
user interface (GUI) illustrates the register-transfer level and
expedites students to comprehend the different stages of
pipelining.
Jiang Daiyou
Chang'an Univ.
Innovation is the soul of a nation's progress. How to train a large
number of people with creative ability, has become a top priority
to education, and classroom instruction in the students ability to
innovate is particularly important. This article from the update
teaching concepts, teaching content, innovative teaching methods
to stimulate creative thinking and other aspects described.
ThC 5.62
Research and Design CSCL Model Based on Ubiquitous Learning
Environments, pp. 811-814.
Qi Xinxing
Southwest Univ. of Sci. & Tech.
Liu Zhiqin
Southwest Univ. of Sci. & Tech.
Ubiquitous learning is a new educational model which is based on
the development of Ubiquitous Computing applying in the field of
education. According to the analysis of Ubiquitous learning’s
connotation, features and technological support, combining the
original common model of CSCL, this paper is trying to construct a
brand-new model for computer-supported cooperative learning.
The author analyses the elements of the model in detail, and then
expounds the strategies of promoting CSCL and advantages of
CSCL based on the ubiquitous learning environment.
ThC 5.58
Information Capacity Training of College Students: Problems and
Solutions, pp. 794-798.
Bi Tingyan
Weifang Univ.
Xu Qiuhua
Weifang Univ.
Through the literature search, the paper summarizes the
experience of information capacity training of European and other
developed countries. Combining the fact that information
awareness of college students in China is not strong and the actual
information capacity is not high, the paper looks for the existing
problems and shortcomings, and conducts in-depth analysis and
discussion. On this basis, countermeasures and suggestions of the
process of designing and building model are put forward to help
train information capacity of college students.
ThC 5.63
Teaching Discrete Mathematics with the Constructivism Learning
Theory, pp. 815-816.
Hu Yahong
Zhejiang Univ. of Tech.
Wang Weihong
Zhejiang Univ. of Tech.
Jiang Li
Zhejiang Univ. of Tech.
Constructivism theory reveals the regularity of human cognition.
According to constructivism theory, students will learn best by
trying to make sense of something on their own with the teacher
as a guide to help them along the way. Discrete mathematics is a
very important course for computer majors. As discrete
mathematics has quite rich contents and it is very abstract, it is
not easy for students to master its spirit. In this paper, we propose
applying constructivism theory to the teaching of discrete
mathematics. During all the teaching phases(including teachers’
preparation before class, teaching during class and students’
review after class), constructivism theory is used. Our practices
show that constructivism theory based teaching method can raise
students’learning interests, and also can help them to understand
the course better.
ThC 5.59
Research on Construction of Information Literacy Curriculum
System in Colleges, pp. 799-803.
Bi Tingyan
Weifang Univ.
Liu Li
Weifang Univ.
In modern society, to train students with higher information
literacy is one of the important goals of higher education in the
world. Compared with Europe and America and other developed
countries, China started late in the education of college
information literacy and the effect of information literacy
education is not ideal. This study analyzes the content of
information literacy education and development status and finds
the relevant constraints. Based on the advanced experience from
abroad, the paper proposes some suggestions on the system
construction of information literacy curriculums in Chinese
colleges. Namely, by rational design of curriculum system and
training path, to enhance the students’ information, knowledge,
ability, awareness and moral construction, and promote the
comprehensive improvement of information literacy of college
students.
ThC 5.64
On Constructing Tridimensional Visual Teaching Resource System
for Informational Discipline Platform Courses, pp. 817-820.
Tongcheng Huang
Shaoyang Univ.
Liping Yin
Shaoyang Univ.
In this paper, the tridimensional visual teaching resource system
for platform courses of informational discipline was described. It
has promoted IT personnel training quality greatly by our real
teaching application in Shaoyang University.
ThC 5.60
Research on Software Undergraduates Training Countermeasures
Based on the Competency Model, pp. 804-807.
Shihai Zhu
Zhejiang Water Conservancy &
Hydropower College
Li Wang
Zhejiang Water Conservancy &
Hydropower College
Competency is able to drive a person to have good performance at
work and is an objective measure of a person's collection of
various personality traits. The key competency factors of software
professionals can be divided into the following five groups:
professional knowledge, application skills, initial capacity, quality
characteristics and perception capability. On such basis we can
construct the software professional competency model. After that
we can take the following training countermeasures for software
undergraduates: First we should pay more attention to the
training of their professional knowledge and application skills;
Second, college-enterprise cooperation should be strengthened to
improve their initial capacity; Third, we should improve their
quality characteristics and perception capability through the
activities inside and outside class education.
ThC 6
Computer Graphics
ThC 6.1
Overview of Video-Based Vehicle Detection Technologies, pp.
821-825.
Kun Wu
Xiamen Univ.
Haiyin Zhang
Xiamen Univ.
Tianmao Xu
Xiamen Univ.
Ju Song
Xiamen Univ.
In this paper, we first reviewed different kinds of vehicle detection
methods and pointed out that the video based detection technique
is the most advantageous method. Then we introduced several of
video based vehicle detection algorithms in detail and compared
their performance. Finally, the difficulties and development trends
of the video based vehicle detection algorithm research were
presented.
ThC 6.2
Fuzzy Clustering Application in Medical Image Segmentation, pp.
826-829.
Yang Gefeng
Guangxi Medical Univ.
Ou Xu
Guangxi Medical Univ.
ThC 5.61
Classroom Teaching Strategies Creative Abilities, pp. 808-810.
60
Liang Zhisheng
Guangxi Medical Univ.
The purpose of medical image segmentation is to divides the
lesions image with a special meaning and background regional.
The characteristics of medical images are generally more complex.
There is often overlap between different regions, the edge of the
area is vague. Research based on fuzzy clustering method for
medical image segmentation, fuzzy C-means clustering and fuzzy
kernel clustering methods were studied and discussed fully
considered the spatial information, the single objective problem
conversion into multi-objective problem. The experimental results
show that the method use in medical image segmentation
achieved good results.
activities.However,the current videl coding standards remove the
spatial-temporal redundency based on the signal satisetical
correlation.Therefore to reach higher compression efficency
without perceptually degrading of the reconstructed video signal,
the properties of the human visual system need to be better
exploited. Research effort has been dedicated to modeling the
spatial saliency map based on the properties of HVS. The
importance of video image varied with the regions, and human
visual attention too varied with the importance of region of video
image, so using the attention selectivity properties of the human
visual system, the paper proposed video coding rate control
method based human visual saliency map in H.264/AVC. For each
frame, target bits are allocated through the correction of attention
region size between the current frame and previous frame, and for
each MB, MB’s complexity are modified through the saliency and
MAD value of MB. At last, the algorithm was implemented in
reference software JM12.2. Simulation results showed that,
comparing with traditional algorithm, the proposed reduced the
coding bit rate, at the same time, and it also improved the
subjective quality of reconstructed video in visual attention
region.
ThC 6.3
A Spatio-temporal Filtering Method for Motion Estimation, pp.
830-834.
Wang Rui
Beihang Univ.
Zhao Yan
Beihang Univ.
Tang Yujun
Beihang Univ.
Yuan Yan
Beihang Univ.
Motion estimation (ME) from image sequences is of primary
importance for applications like target tracking, velocity
measurement and vision guidance. By the fact that the wavelet
transform has the ability to handle the signals with the
nonstationary, time-varying properties, a novel spatio-temporal
filtering approach based on the Continuous Wavelet Transform
(CWT) to realize the motion selectivity is presented. The Fourier
analysis of the signal in one dimension of space and time as well
as the wavenumber-frequency domain coverage of the Morlet
wavelet for different parameters are adopted to provide the
strategy for motion estimation and tracking target which moves in
a relatively simple mode. Experiments take place with real video
sequences to demonstrate that our method has the advantage of
being robust to illumination variations, noise, and being
computationally efficient.
ThC 6.7
A Video Coding Error Concealment Method for AVS-P2 Standard,
pp. 847-851.
Ruan Ruolin
Wuhan Univ.
Hu Ruimin
Wuhan Univ.
Chen Hao
Wuhan Univ.
Li Zhongming
Xianning Univ.
The error concealment is an important technique in the video
transmission that can assure the reconstruction video quality and
can efficiently recovery the data loss and the data errors in the
transmission process caused by the transmission environment,
thus improve the subjective quality of the video received in the
end. In order to enhance the error resilience of AVS-P2, in this
paper, we propose a novel adaptive temporal-spatial error
concealment method based on the redundancy motion vectors. To
conceal a lost block, we use the spatial error concealment for the
I-frame macroblocks, and use the temporal error concealment for
the non-I-frame macroblocks. At the same time, according to the
motion intensity of the macroblocks, we use the default error
concealment and based on redundancy motion vectors error
concealment method, respectively. Lastly, we realize the algorithm
on the platform of the AVS-P2 RM52; the simulations results show
that the proposed method is significantly better than the existing
techniques in terms of both objective and subjective quality of
reconstruction video.
ThC 6.4
Measuring Thickness from 3D Gray-scale Image by Fuzzy Distance
Transform, pp. 835-838.
Qi Zhong
Xiamen Univ.
Hong Duan
Xiamen Univ.
Jiangui Wu
Xiamen Univ.
Thickness is one of useful parameters in analyzing object
morphology and shape. This paper is concerned with a method for
quantifying thickness of a 3D fuzzy object using fuzzy distance
transform (FDT). In this way, thickness is obtained by analyzing
FDT values along the medial axis which was generated by a
desirable skeleton algorithm described in [1].
ThC 6.8
Traffic Indication Symbols Recognition with Shape Context, pp.
852-855.
Kai Li
Xiamen Univ.
Weiyao Lan
Xiamen Univ.
A novel traffic indication symbol detection and recognition
method is introduced in this paper. We firstly apply color
detection and shape detection on the real-time image to locate
and extract the symbol region. Then the traffic indication sign is
matched and recognized by using shape context. Experimental
result demonstrates the proposed algorithm has good
performance on recognition and more robustness to the
disturbances.
ThC 6.5
A Photo Based 3D Garment Making System for Educational
Purpose in Style Reconstruction and Evaluation, pp. 839-842.
Yueqi Zhong
Donghua Univ.
Both industrial and educational applications require fast
prototyping of garment design. The traditional way of generating
3D garment model is to sew 2D patterns together. However, there
is no feasible approach to generate the 3D garment without
providing the 2D patterns for sewing, which is commonly
encountered in aforementioned contexts. In this paper, we
propose a novel approach in making 3D counterpart of the real
garment via the photos of the front view and the back view of the
target garment respectively. The original photos are triangulated
for constructing a corresponding mass-spring system. The final 3D
garment is made by virtual sewing and draping. The experimental
results prove that our system is an effective approach in making
3D garment with satisfied visual effects.
ThC 6.9
Analysis of Regional Comparative Advantage and Spatial
Distribution of Jiaozuo Rehmannia, pp. 856-859.
Zhang Shengwu
Northwest Normal Univ.
Li Kongwen
West Anhui Univ.
Zhang Xiaozhou
Northwest Normal Univ.
Using the method of aggregated advantage index, this paper
analyzes the comparative advantage of Rehmannia areas in
Jiaozuo, which are then expressed in the map by GIS software. The
results show that there are significant regional differences of
Rehmannia production, and the townships of production
advantages are mainly located in the central and southern parts of
Jiaozuo. According to the principle of comparative advantage, it is
suggested that Rehmannia production areas be adjusted, and the
rational distribution and specialized production for the
ThC 6.6
A Novel Rate Control Algorithm of Video Coding Based on Visual
Perceptual Characteristic, pp. 843-846.
Ruan Ruolin
Wuhan Univ.
Hu Ruimin
Wuhan Univ.
Li Zhongming
Xianning Univ.
The rate control plays a very important role in video streaming
applacations.The current rate control scheme in the advance video
coding standard H.264/AVC still results in a relatively large
quailty fluctuation for frame-level with higher motion
61
Rehmannia production be implemented. At last, reasonable
measures and suggestions for the Rehmannia development are
proposed.
Wang Yi
Chongqing Univ. of Tech.
Liao Hao
Chongqing Univ. of Sci. & Tech.
The new system combined with mine and torpedo is an ideal
new weapons system, which has a lot of advantages, including of
good hidden characteristic, strong anti-sweep characteristic, high
survival rate, big regional control, large dosage and good attack
effect. It is a kind of good weapon in the water based on higher
cost-effective and strategic value. The deep submarine of
torpedoes and the scope of using mines are expanded. The power
of the mines is expanded and the combat radius is increased.
Times and number of mines can be significantly reduced, losses
of ships and planes also be reduced. In modern high-tech part
war with the conditions of the blockade and anti-blockade on the
coastland, in particular the intervention of the enemy, an
important role of the system would be played. A series functions
as automatically activate, real-time hot tracking and targeting,
automatically detonating of the new system combined with mine
and torpedo were introduced in this paper. Two principles of
ultrasonic distance measurement and “see back” effect based on
hot tracking and targeting were adopted. The new system with
the function of tracking and automatic offensive was researched
and designed. The system was used in the underwater depths of
10 meters (good hidden capability, timely solar charge). It also
can be considered as the ideal environment for the system, so it
has corresponding practical value. However,the system is only
applicable to lethal weapons for large area because of the
difficulty in the use of precision on the lock attack mode.
ThC 6.10
A New Scheme for 3D Face Recognition Based on 2D Gabor
Wavelet Transform Plus LBP, pp. 860-865.
Yi Jin
Beijing Jiaotong Univ.
Yizhi Wang
Beijing Jiaotong Univ.
Qiuqi Ruan
Beijing Jiaotong Univ.
Xueqiao Wang
Beijing Jiaotong Univ.
In this paper, a novel method based on Gabor Wavelet Transform
plus Local Binary Pattern is proposed for feature representation in
3D face recognition. Firstly, to enable the application of the new
feature representation of the framework, Iterative Closet Point
(ICP) is utilized as preprocessing to detect the nose tip by aligning
a pair of symmetrical 3D face models of the same person, crop the
interest of region, and then generate the corresponding depth
images. Secondly, multi-scales and multi-orientations Gabor
Wavelet Transform is proposed for feature representation. Then,
LBP operator is used to describe the local features future. For each
face region, the statistical histogram is utilized to represent the 3D
face accordingly. Finally, LSDA based strategy is presented to
address the recognition task. The new algorithm benefits mostly
from two aspects: One aspect is that Gabor wavelets are promoted
for their useful properties, such as invariance to illumination,
rotation, scale and translations, in feature extraction. The other is
that the LBP operator not only describe the local features which
have been demonstrated to be quite considerable in recognition
task, but also reduces more coefficients for image representation.
Experiments based on the FRGC 3D face database demonstrate the
effectiveness and efficiency of the new method. Results show that
our new algorithm outperforms the other popular approaches
reported in the literature and achieves a much higher verification
rate at 0.1 FAR.
ThC 7.2
Studies on Wireless Data -collecting System of Thermodynamic
Properties of Steam Turbine, pp. 880-883.
Ji Pengwei
Changchun Inst. of Tech.
Cai Changqing
Changchun Inst. of Tech.
Tests of thermodynamic properties will be needed before and
after overhaul of steam turbine units, in order to assess the
economical conditions of the equipment, and to provide
directions for operation of Electricity Plant and maintenance
tasks in a power plant, to guarantee coal- and electricity-saving,
more generation and supplies to offer indispensable
preconditions under which an economic dispatching solution
and operation of the plant and the system. The existing tests
most adopt wired data collecting manner, require complicated
testing means and longer cycles. This document raises a set of
complete wireless data collecting system based on NRF9E5
Data-collecting Modules for measurements of thermodynamic
properties of a steam turbine. This system possesses advantages
such as multiple test points, ease of extension, perfect
interference resistance.
ThC 6.11
3D Surface Stagnography Using Geometry Images, pp. 866-870.
Qing Huang
Louisiana State Univ.
S. S. Iyengar
Louisiana State Univ.
Xin Li
Louisiana State Univ.
This paper presents a new 3-d data hiding scheme. By using
geometry images, we transform the 3-d data hiding problem into
the 2-d image data hiding problem where efficient algorithms can
be applied. A modified LSB embedding approach is proposed to
embed payload in geometry images. Experimental results show
that a large amount of payload can be embedded in the 3-d model
without causing too much deformation of the 3-d model. In the
end of the paper, we propose a completely new representation of
3-d model as an application of our data hiding method.
ThC 7.3
Research on Technology for Quality Regulation and Control of
Electrical Energy from Power Distribution Network, pp. 884-887.
Zhang Zhuo
Changchun Inst. of Tech.
Cai Changqing
Changchun Inst. of Tech.
Ji Xiu
Changchun Inst. of Tech.
Ao Ming
Electric Power Research Inst.
of Jilin Electric Power Co., Ltd
Liu Wenzhou
Changchun Inst. of Tech.
As China national economy and technology are under rapid
development, all industries are requesting better and better
quality of electrical energy. Therefore, research on technology for
quality regulation and control of electrical energy of power
distribution network becomes first priority. The optimized
algorithm of controller as stated in this article for quality
regulation and control of electrical energy is optimized double
closed-loop control algorithm which enables system to have
better stability and control accuracy while ensuring quick
dynamic response. During test, an optimized d-p detection
algorithm is adopted. Such new algorithm is also applied for
detecting harmonic in power distribution network. Then general
detection accuracy is efficiently improved.
ThC 6.12
Dynamic Harmonic Texture Mapping using Methods of
Fundamental Solutions, pp. 871-875.
Huanhuan Xu
Louisiana State Univ.
Xin Li
Louisiana State Univ.
Feature-aligned surface mapping improves the effect of texture
mapping by enforcing feature correspondence between 3D
meshes and images. We present a novel constrained texture
mapping computation framework based on the method of
fundamental solution (MFS). We first flatten the surface onto
planar domain, then compose a 2D harmonic map with user
specified features aligned with corresponding texels in the texture
image. We demonstrate that our framework can efficiently
conduct feature-aligned texture mapping with dynamic deforming
meshes or texture images.
ThC 7
Control Technology
ThC 7.1
Research and Design of the New System Combined with Mine
and Torpedo, pp. 876-879.
Ye Binqiang
Chongqing Univ. of Tech.
Zhao Mingfu
Chongqing Univ. of Tech.
Deng Yiyuan
Chongqing Univ. of Tech.
Xu Zhongyu
Chongqing Univ. of Tech.
ThC 7.4
The Research on Data Processing for Dynamic Batching-weighing
System, pp. 888-890.
Zhang Ying
Shenzhen Entry-Exit Inspection
& Quarantine Bureau
62
Hou Yunbin
Harbin Inst. of Tech. Shenzhen
Graduate School
Liu Min
Shenzhen Entry-Exit Inspection
& Quarantine Bureau
In the area of dynamic weighing system, the accuracy of
measurement and speed of dynamic response are the key
performance indexes. This paper made some research on the
method of data processing, includes the design of FIR filter and
IIR filter, then analyzed their characteristic and found shortages.
Furthermore, according to the condition of batching-weighing
system, realized the Kalman filter, the results showed that
Kalman filter can provide accurate measurement and excellent
dynamic response.
makes it very difficult to apply ordinary controls to switched
reluctance motor. However, direct torque control technology as
stated in this article will directly consider the torque as
controlled objective. It emphasizes the effects of direct control of
torque. This will eliminate complex transformation of vector and
simplifies the process of mathematic motor model so that control
structure is simple and control procedure is direct. In this article,
direct torque control technology is applied for the control of
switched reluctance motor so that speed governing can take
place quickly and steadily while the motor is suppressing torque
ripple effectively.
ThC 7.9
Research on Improved SIFT Feature Matching Arithmetic in the
SAR Vision Matching Aided Navigation, pp. 909-914.
Xiong Zhi
Nanjing Univ. of Aeronautics & Astronautics
Wang Dan
Nanjing Univ. of Aeronautics & Astronautics
Zhang Dan
Nanjing Univ. of Aeronautics & Astronautics
Liu Jianye
Nanjing Univ. of Aeronautics & Astronautics
The performance of the image matching arithmetic will affect the
precision and dependability of the SAR vision matching aided
navigation system. When the real-time SAR image is influenced
by the noise badly, the image matching result will be affected
greatly. In order to improve the performance of the image
matching arithmetic, improved SIFT feature matching arithmetic
based on the wavelet transform is researched in this paper. The
improved arithmetic adopted wavelet transform to restrain the
noise of the real-time SAR image. At the same time, the paper
utilized the multi-resolution analysis of wavelet transform to
minish the realtime image’s size. Consequently, it enhanced the
precision and the rapidity of the matching arithmetic a lot. The
simulation result and contrastive analysis conclusion made it
clear that, compared to the basic SIFT matching arithmetic; the
arithmetic proposed in this paper shows the better
predominance in the matching positioning precision and speed.
ThC 7.5
The Fuzzy Decision and Simulation of Washer Control, pp.
891-896.
Yu Zhen
Xiamen Univ.
Xu Fang
Xiamen Univ.
The fuzzy control is an intelligent control method relying upon
the fuzzy set theory, fuzzy variables, and logic deduction. It can
imitate the process of human decision inference in behavior, so it
is more consistent with the fuzziness and human awareness,
understanding, decision of objective thing. This paper selects the
washing machine as the control object, bases on the washer
control principle, introduces the fuzzy decision process,
especially studies the fuzzy control theory with three inputs and
two outputs and sets up the fuzzy rules, at last, gives the fuzzy
decision of the control and the results of simulation.
ThC 7.6
Study on the Application of the Fuzzy RBF Neural Network in the
MIMO Furnace Control System, pp. 897-900.
Yun Zhang
Changchun Inst. of Tech.
Daofeng Zhou
Jinlin Univ.
Xuemei Chen
Jinlin Univ.
Mingshuang Bi
Water Resources Department
of the Jilin Province
A multi-input/multi-output (MIMO) furnace control system
based on the PID control and the fuzzy radical basis functions
neural network(FRBFNN) control is presented, in this paper. In
addition, the structure models and relative learning algorithms
of the FRBFNN controller are gived. At last, simulation and
experiment results based on an application of the MIMO furnace
control system are provided to show that FRBFNN-control
system has more robustness than the PIDcontrol system
especially in reducing noise and overcoming non linearities.
ThC 7.10
Design of a Large Scale Wind Turbine Generator Set Yaw System,
pp. 915-918.
Liu Wenzhou
Changchun Inst. of Tech.
Cai Changqing
Changchun Inst. of Tech.
Zhang Zhuo
Changchun Inst. of Tech.
PID-fuzzy adaptive yaw control algorithm is used and complete
wind wheel position adjustment in 0rder to automatically track
the changes of wind direction. Input to the change of wind
direction and wind direction, the output is kp、ki and kd, its fuzzy
adaptive controller are designed. The simulation software used
in this paper is Matlab-Simulink 7.0. Wind turbine to follow
changes in wind direction changes, improve wind energy
efficiency, implementing agencies to avoid the frequent
movement, optimize unit performance, verify the effectiveness of
the yaw control algorithm.
ThC 7.7
An Adaptive Neural PID Controller for Torque Control of Hybrid
Electric Vehicle, pp. 901-903.
Yun Zhang
Changchun Inst. of Tech.
Mingshuang Bi
Water Resources Department of
the Jilin Province
Xiumin Yu
Jinlin Univ.
Sina Xu
Jinlin Univ.
An adaptive neural PID controller for torque control of hybrid
electric vehicle is presented in this paper. In this controller the
PID gains are tuned automatically by the neural network in an
on-line way. In addition, the relative learning algorithms of the
neural PID controller are gived. At last, simulation and
experiment results based on an application of the torque control
system are provided.The experimental results are compared to
those of a conventional PID controller,it can be observed that the
error has been reduced significantly using the neural PID
controller.
ThC 7.11
Study on Vehicle Magnetic Particle Clutch Control and Bench
Test, pp. 919-922.
Shanzhen Xu
Huaiyin Inst. of Tech.
Cheng Wang
Huaiyin Inst. of Tech.
Magnetic particle clutch is a new type car power transfer
components. Based on the study of the magnetic particle clutch
working characteristic, the mathematical model of clutch
working characteristics was established. The Magnetic particle
clutch driving controller was designed using pulse width
modulation (PWM). Its control performance was analyzed and an
experimental verification was completed. The experimental
results showed that the controller designed for magnetic particle
clutch meets the requirement for use.
ThC 7.8
Study on Direct Torque Control System of Switched Reluctance
Motor, pp. 904-908.
Ji Keyan
Changchun Inst. of Tech.
Zhang Zhuo
Changchun Inst. of Tech.
Switched reluctance motor is featured with more advantages like
reliable operation and simple construction. However, it
demonstrates especially large torque ripple while running, which
restricts its massive use. As drive system of switched reluctance
motor is a complex time-varying and non-linear system, this
ThC 7.12
Fault-tolerant Control with Finite-time Stability for Switched
Linear Systems, pp. 923-927.
Shu Gao
Xiamen Univ.
Xiaoli Zhang
Xiamen Univ.
For switched linear systems, the fault-tolerant control with
finite-time stability is studied in this paper. Firstly, the satisfied
conditions that actuators failed in actual operation are purposed
within the permission of fault-tolerant control. Furthermore, by
63
the linear matrix inequality (LMI) approach, the stabilizing state
feedback controllers and a class of switching signals are
designed, which can guarantee the finite-time stable of the
switched linear systems under arbitrary switching satisfying the
average dwell-time condition. Finally, an example is employed to
verify the efficiency of the proposed method in this paper.
Caidong Zhang
Xiamen Univ.
Xiang Deng
Xiamen Univ.
Changlong Jiang
Xiamen Univ.
A text mining model for topical evolutionary analysis was
proposed through a text latent semantic analysis process on
textual data. Analyzing topic evolution through tracking the topic
different trends over time. Using the LDA model for the corpus
and text to get the topics, and then using Clarity algorithm to
measure the similarity of topics in order to identify topic mutation
and discover the topic hidden in the text. Experiments show that
the proposed model can discover meaningful topical evolution.
ThC 7.13
Robust Stablization for a Class of Large Envelope Flight Control
Systems, pp. 928-932.
Lixia Cheng
Xiamen Univ.
Yabin Yan
Xiamen Univ.
Jianping Zeng
Xiamen Univ.
This paper deals with robust control problems for large envelope
flight control systems. Based on data fitting, a class of uncertainty
model is improved to describe the flight control systems with
wide operation range. The uncertainty model can reflect both the
time-varying characteristic and the fitting error. Robust stability
criterion and stabilizers design method via state feedback are
proposed for flight control systems with the class of uncertainty.
Moreover, a convex optimization method is provided to estimate
the parameter perturbation range. Finally, a simulation example
is given to illustrate that the method is feasible.
ThC 8.4
A Novel Lightweight Iteration Filtering Algorithm Research in
Wireless Sensor Networks, pp. 950-954.
Linghong Lv
Ningbo Univ.
Zhijun Xie
Ningbo Univ.
Jun Zheng
Ningbo Digital Televition CO.LTD
In this paper, we propose a novel skyline query algorithm in
wireless sensor networks, according to the data’s dominate ability
progressively return the sensor data to construct the filter. At the
same time, in order to reduce the overhead of the filter
construction and broadcasting, we adopt mapping strategy to
further eliminate the filtering cost. Theoretical analysis and
experimental results all show that it can effectively reduce the
communication cost, and eventually prolong the lifetime of the
network.
ThC 7.14
Model Identification and Control of a Small-Scale Unmanned
Helicopter, pp. 933-937.
Guanlin Wang
Tsinghua Univ.
Jihong Zhu
Tsinghua Univ.
Hui Xia
Nanjing Univ. of Sci. & Tech.
Modeling is the basis of flight control for unmanned helicopters.
In this paper, modes partition method and structure traversal
(MPM/ST) method is applied to derive the dynamic models of a
small-scale unmanned helicopter, and thereby afford improved
accuracy for flight controller design. Increment proportional
integral derivative (IPID) controller is applied to each channel to
compose the core-dynamic controller, which used to follow an
outer-loop hover command. The simulation results showed
significant benefits of the proposed approach in flight-control
design for unmanned helicopters.
ThC 8.5
Mining Group Correlations over Data Streams, pp. 955-959.
Zhijie Wang
Ningbo Univ.
Jiangbo Qian
Ningbo Univ.
Maochun Zhou
Ningbo Univ.
Yihong Dong
Ningbo Univ.
Huahui Chen
Ningbo Univ.
Mining correlation over steams attracts a lot of attentions recently.
However, group correlation analysis over data streams is relatively
few. Moreover, existing literatures are mainly focused on a single
time window, with large space and time complexity. This paper
proposes an online canonical correlation analysis algorithm called
MGDS (Mining Group Data Streams). Based on base-window, the
MGDS algorithm dynamically maintains a few statistics from raw
data to calculate correlation. The mining range is not limited in a
single window, but can be changed according to queries.
Theoretical analysis and experimental results show that the
algorithm is accurate and efficient with space and time overhead
reduced greatly.
ThC 8
Database Technology
ThC 8.1
Research on the Visualization of Data Mining Results, pp. 938-941.
Chen Chen
Chinese People's Armed Police Force Academy
Since there aren’t successful Visualization of Data Mining cases in
the Exit-Entry system, this paper proposes a new more perfect
system. The paper establishes the system according to the
characteristic of the data. The system mines the rules and visual
results of the Exit-Entry data to realize the genuine Visualization
of Data Mining.
ThC 8.6
Statistical Method Based Computer Fault Prediction Model for
Large Computer Centers, pp. 960-964.
Zhixin Tie
Zhejiang Sci-Tech Univ.
Hong Zhuang
Zhejiang Sci-Tech Univ.
Qiang Luo
Zhejiang Sci-Tech Univ.
Lingbing Tao
Zhejiang Sci-Tech Univ.
Computer laboratories in large computer centers play an
important role for the computing education in higher education
institutions. Due to heavy usage, there are often hardware or
software problems on these computers. Thus computer
laboratories management and maintenance is a very important
and long-term task. For a computer laboratory, the computers’
monthly used time follows the normal distribution, which is
verified by the chi-square goodness-of-fit hypothesis test.
According to probability distributions based on the normal
distribution, a statistical method based computer fault prediction
model for public computer laboratories is presented. Computers’
health state is divided into four classes: the Normal state, the
Concerning state, the Warning state, and the Fault state. For
different levels of computer fault, different methods are used to
maintain it. The experiment and application was conducted in a
university computer center with hundreds of computers in 9
computer laboratories. The experiment and application results
show that it is an effective way for finding fault computers. It can
be used to guide computer maintenance. Computers maintenance
workload is greatly reduced by using this fault prediction model.
ThC 8.2
One-to-Many Data Conversions by Extending Relational Algebra,
pp. 942-945.
Wang Jianbo
Hunan Inst. of Humanities, Sci. & Tech.
Wu Jinqun
Loudi Vocational & Technical College
Chen Xinbo
Loudi Vocational & Technical College
This paper expresses one-to-many transformations by extending
relational algebra to resolve the problem that relational
expressions are difficult to execute one-to-many data
transformations, the recursive query and the table function should
be employed to realize unbounded one-to-many transformations
for producing one or several output tuples over every input tuples.
Recursive queries create original results to obtain result sets by
recursion and return final result sets. Table functions declare
variable sets and employ a procedure body and cursor to access
tables, iterative output tuples. Experimental analysis different
bounded and unbounded data transformations under different
reference influencing factor, results show that the extension
method improves performance observably.
ThC 8.3
LDA-based Model for Topic Evolution Mining on Text, pp. 946-949.
Qingqiang Wu
Xiamen Univ.
ThC 8.7
64
Wavelet Decomposition Algorithm for Uncertain Data Streams, pp.
965-970.
Liao Kangli
Ningbo Univ.
Chen Huahui
Ningbo Univ.
Qian Jiangbo
Ningbo Univ.
Dong Yihong
Ningbo Univ.
Recently,data mining over uncertain data streams has attracted a
lot of attentions because of the widely existed imprecise data
generated from a variety of streaming applications. Many
applications have endless uncertain data streams which have a
huge amount of data so that it is infeasible to reserve all data in
memory to be visited. Therefore, we need a new technology to
effectively compress uncertain data streams. Among different data
compression technology, the Haar wavelet decomposition is the
most popular one, but the traditional wavelet decomposition is no
longer applicable on uncertain data streams. Although a
significant amount of previous research explore various data
reduction techniques on data streams, data reduction techniques
on uncertain data streams have seldom been investigated. In this
paper, we try to resolve the problem of the wavelet decomposition
over uncertain data streams and propose U-HWT(Uncertain Haar
Wavelet Transform),a new algorithm for compressing the
uncertain data streams. U-HWT uses discrete Haar wavelet
transform and emphasis on the impact of the tuple uncertainty on
the decomposition. Experimental results show that U-HWT can
effectively compress the uncertain data streams.
By analyzing the many problems of today’s online courses, this
paper introduces the concept and meaning of PBL (project
management) online courses, the constitution of PBL and the
characteristics of online courses. By making analysis of these
concepts in simple terms, we conclude the methods and principles
of online course teaching based on PBL study and make practical
demonstration by applying the methods of design of PBL online
courses and cases.
ThC 8.8
The Research on Building a Global Customer Centered Data
Warehouse System, pp. 971-973.
Wei Xu
China Industrial Bank
Li Maoqing
Xiamen Univ.
Benefits abound for a company that builds and maintains a CRM
based data warehouse system correctly. This article will introduce
the technical architecture of an e-commerce company’s CRM/Data
warehouses project which is able to increase revenue based on
delivering the data reporting service to subscriber. These reports
will cover a wide variety of individual sales metrics, marketplace
comparables, popular searches, and hot categories. The
experience in this article allows us to identify successful design
practices and develop recommendations for organizations that are
interested in deploying a similar system.
ThC 9.5
Research on Student Support Model in M-Learning, pp. 991-994.
Zhizhen Yang
Shanghai Second Polytechnic Univ.
Shiming Zhang
Shanghai Second Polytechnic Univ.
Flying developments of mobile technology bring new
opportunities to teaching, people begin to exert themselves to
integrate the predominance of mobile technology into
curriculums. This paper first discusses the classification of mobile
technology and its influences on education domain, then it
analyses the learning surrounding of mobile device. Based on it,
this paper expounds on the technology selection for mobile device
applications. In the end, it explores the student support model in
M-learning.
ThC 9.4
Technical Analysis of Mobile Learning Application in High
Education, pp. 988-990.
Gao Kun
Guangxi Medical Univ.
Liang Zhisheng
Guangxi Medical Univ.
Ou Xu
Guangxi Medical Univ.
Under the opportunity of the government greatly promote
Education information in China, guide the high education with
modern educational philosophy and support it with modern
information technology, Mobile learning would inevitably arouse
the education sector’s Attention then mobile learning will be an
importance complement way to traditional education. However,
there are still many difficulties in application mobile learning to
high education teaching, only to break through these difficulties
can mobile learning integrated into the traditional education
better, so that high education more conducive to fostering
high-quality personnel.
ThC 9.6
The Model of Networked Learning Environment for E-Learning
Based on Groupware Technology, pp. 995-998.
Yan Jun
Xi'an Univ. of Tech.
Li Suicheng
Xi'an Univ. of Tech.
Huang Rui
Xi'an Univ. of Tech.
E-learning is the model of learning which come along with the
increasing popularity of the Internet and the continuous
development of the communication technology. On the basis of the
brief introduction to the groupware technology and the
networked learning environment, this paper bring forward a
model of networked learning environment for Elearning which
based on groupware technology, and makes detail description to
the system’s structure, mainly function module and its
characteristic.
ThC 9
E-Learning
ThC 9.1
Online Experiment Mode of Computer Basic Courses Based on ISM
Method, pp. 974-977.
Ying Liang
Southwest Univ.
In this paper, I analyze the factor of Web-based computer basic
courses experimental mode, and construct a corresponding online
test model , provide the reformation of teaching basic computer
experiments with reference of theoretical basis.
ThC 9.2
Learning on the Move----A Case Study of Mobile Learning Assisted
English Reading Instruction in Chinese Tertiary Education, pp.
978-983.
Yu Li
Henan Univ. of Finance & Law
Ji Li
Zhengzhou Normal Univ.
The rapid development in information and communication
technologies has enabled learners to learn flexibly both in place
and time. This paper reports on a case study of mobile learning
assisted English reading instruction in Chinese tertiary education,
presents results of a questionnaire survey as well as answers of
interviews, and discusses some key considerations in the
development of mobile learning assisted instruction in China.
Finally, some suggestions are proposed to promote mobile
learning assisted English reading instruction in a better and faster
way.
ThC 9.7
Research on Computer Network Experiment Curricular System
Based on Network Technologies, pp. 999-1002.
Peng Hehuan
Tianmu College of Zhejiang A & F Univ.
Wang Huiting
Tianmu College of Zhejiang A & F Univ.
Ma Zeyun
Tianmu College of Zhejiang A & F Univ.
Application oriented and comprehensive experiment platform
shall be established under the guidance of computer network
technologies. The paper illustrates the establishment of the
courses as well as contents of the computer experiment curricular
based on such platform. With experiment courses system, the
handson skills and innovation abilities of students will be
improved, the quality of computer experiment education will be
refined and talents for the development of the society will be
cultivated.
ThC 9.3
Design and Development Based on PBL Online Course, pp.
984-987.
Zhao Yanyan
Helongjiang Inst. of Sci. & Tech.
ThC 9.8
Oral Business English Network Course Design in Secondary
Vocational School, pp. 1003-1005.
Huang Xingyun
Mech. & Elec. Industry School
65
Ou Qizhong
Guangxi Teachers Education Univ.
Oral Business English is a required course for Ecommerce major
students of secondary vocational school. This paper describes the
design of Oral Business English network course of secondary
vocational school on the aspects of the general design concept,
basic structure, modules design and technology application, to
explore the efficient use of the various teaching resources based
on websites, the implementation of the network learning, and
promote the English teaching in secondary vocational school.
With the development of computer and network technology, in the
E-learning environment, what efforts will learning styles bring to
learing result , has raised concerns among researchers. By
classifying the learners according to the Kolb’s learning style
inventory, and then tracing their online realtime interaction, this
article analyzed the degree of participation, the depth of
interaction and the different learning reults of students who
belongs to different learning styles.
ThC 9.14
Incorporating Social Opinion in Content Selection for an
E-Learning Course, pp. 1027-1032.
Richa Sharma
Univ. of Delhi
Hema Banati
Univ. of Delhi
Punam Bedi
Univ. of Delhi
Acceptability of an e-learning course is influenced by various
factors. Prominent amongst them is identification of appropriate
learning content for the course. Such identification is benefited
through the inputs from different strata of the society. Gathering
and aggregating opinions from various representatives of the
society is a complex task. This paper utilizes analytic hierarchy
process (AHP) to design content for an online computing course
by considering the opinion of various social clusters, viz. academicians, researchers, students, alumni and industry. The
preferences of these clusters on various criteria and alternatives
are elicited and priority weight vectors are calculated.
Appropriate weights are assigned to each of the clusters
depending on the target group for which the course is designed.
The collective priority vector for the alternatives is obtained by
aggregating individual weights using aggregation of individual
priorities (AIP) method. The e-learning courses thus designed
have higher prospects of receiving approval from the society.
ThC 9.9
A Formal Model of Personalized Recommendation Systems in
Intelligent Tutoring Systems, pp. 1006-1009.
Li Zhiping
Yunnan Normal Univ.
Sun Yu
Yunnan Normal Univ.
Xu Tianwei
Yunnan Normal Univ.
A formal model of a personalized recommendation system in
intelligent tutoring systems is presented in this paper. Users’
queries, domain knowledge, user models and teaching knowledge
extraction processes are four key factors that support a
personalized recommendation system. After introducing the
construction of domain knowledge and user models, the formal
model of our personalized recommendation system is presented
and discussed in detail to show that it is practicable.
ThC 9.10
Survey Research on College Students’ English Learning Anxiety in
the Computer Network Environment, pp. 1010-1012.
Shen Lixia
Zhejiang A & F Univeristy
Anxiety is one of the important factors that affect the effect in
foreign language learning. This survey research on non-English
major students has found that students’ anxiety directly affects
their learning outcomes in the computer network environment,
resolving anxiety is conducive to the improvement of English
learning effect. Teachers should constantly perfect computer
network environment of teaching mode, give full play to the
advantage of the mode to reduce students’ anxiety of English
learning and enhance their self-confidence, and help them
improve English learning.
ThC 9.15
Application of Innovative Technologies on the E-learning System,
pp. 1033-1036.
Jianxia Chen
Hubei Univ. of Tech.
Qianqian Li
Hubei Univ. of Tech.
Cleve Yeo Keng Lin
Temasek Polytechnic Singapore
Huapeng Chang
Temasek Polytechnic Singapore
Chunzhi Wang
Hubei Univ. of Tech.
Many e-learning systems are proposed and used practically due to
the rich opportunities provided by the Internet. In particular,
technology implementation in a positive learning experience can
be one of the strongest influencing factors in stimulating learners’
motivation. From the perspective of positive learning, the paper
designed and implemented a new e-learning system, which
incorporated three innovative internet technologies into a
well-known open e-learning system named Chamilo. The
technologies were: easy knowledge search and classification,
instant chat system and Ideone online compiler system. The new
e-learning system offers richer learning resource and different
forms of communication for learners, and particular various
programming language practices online. Therefore, the results
demonstrate the proposed system improves learning efficiencies
in a flexible and advanced way.
ThC 9.11
Bulid A Laboratory Cloud for Computer Network Education, pp.
1013-1018.
Chenyang Yan
Ningbo City College of Vocational Tech.
Hands-on practical experience through lab work has long been
recognized as an important part of the computer network
education. Successful computer network hands-on activities
require a full range of related devices with actively maintaining.
This paper presents prototype architecture of a Xen-based
Networks Laboratory Service Cloud (NLS-Cloud,original CLESP)
that can provide an entire computer networks hands-on practical
environment with uniformed deployment and management as an
online service to learners and instructors. The prototype
NLS-Cloud has been investigated by introducing a series of
surveys. The instructor survey results showed that the prototype
NLS-Cloud exerted a certain positive effect on the hands-on
pedagogical activities while the learner survey results indicated
that students had a favorable view of the NLS-Cloud and regarded
it as a useful learning tool.
ThC 9.16
The Research on the Applications of Information Technologies for
Distance Education, pp. 1037-1040.
Li Yumei
Guangxi Economical
Management College for Cadres
With the development of information technology, distance
education has became the trend of learning. How many kinds of
broad information technologies can use for distance education?
The answerer is three. The applications of information
technologies today are so widely and frequently, as an example,
here we consider the applications of information technology for
Distance Education only. The appropriate applications of
information technology can facilitate teaching and learning. And
what are the advantage and the limitations of the applications of
information technologies for distance education? What are the
problems and pitfalls of the applications of information
technology? We can find the answer about these questions in this
article.
ThC 9.12
Development Network Teaching Platform of Digital Image
Processing Course Based On J2EE, pp. 1019-1022.
Liu Qun
Shaoguan Univ.
Based on digital, interactive, multimedia computer network
teaching platform, which has become an important application of
contemporary education means. Digital image processing
technology curriculum for teaching the practical requirements of
the network was designed and developed based on J2EE
architecture, digital image processing technology course online
teaching platform, the overall structure and function of each
subsystem.
ThC 9.13
Emprical Study on Online Interaction Based on Learning Style
Differences, pp. 1023-1026.
Zhou Jingwei
Taishan College
ThC 9.17
66
Exploration of a New Approach for Designing Online English
Language Learning Materials, pp. 1041-1046.
Jie Hu
Chongqing Univ.
This paper presents the process of using a new approach to design
online language learning materials in the context of small scale
projects (n=45) within Higher Education in the UK. It starts with
the motivation and research aims. Then three general and relevant
software design approaches are explored. After it, my own design
approach is stated which may be suitable to language learning.
Finally, principles of my new approach are disucced. The case
exemplifies the strength of producing courseware in a real context
in depth.
Guan Zhiyan
Business College of Shanxi Univ.
Coverage and connectivity are the key research questions in
wireless sensor networks, the relationship of which is very closely.
One of the traditional methods for solving Coverage and
connectivity is integer programming algorithm, whose research
background is homogeneous wireless sensor networks and single
coverage. The method can not satisfy the requirements in actual
high-precision target detection. This paper establishes one kind of
network model randomly generated and abstract the
mathematical structure the from the model. In addition, achieved
a lot of simulation experiments, and obtained the relationship
between sensor probability and the number of nodes and the
probability curve of simply connectivity, reconnectivity. This
paper can provide a reference value for the arrangement of the
nodes.
ThC 10
Networking Technology
ThC 10.5
Achieving Operational Efficiency with Cloud Based Services, pp.
1063-1068.
Karthik V Bellur
National Inst. of Tech. Karnataka
Krupal M
National Inst. of Tech. Karnataka
Praveen Jain
National Inst. of Tech. Karnataka
Dr.Prakash Raghavendra
National Inst. of Tech. Karnataka
Cloud Computing is the evolution of a variety of technologies that
have come together to alter an organization's approach to building
IT infrastructure. It borrows from several computing techniques grid computing, cluster computing, software-as-a-service, utility
computing, autonomic computing and many more. It provides a
whole new deployment model for enterprise web-applications.
The cloud proposes significant cost cuts when compared to using
an internal IT infrastructure. The "pay for what you use" model of
cloud computing is significantly cheaper for a company than the
"pay for everything up front" model of internal IT. Hardware
Virtualization is the enabling technology behind many of the cloud
infrastructure vendor offerings. Through virtualization, a physical
server can be partitioned into any number of virtual servers
running their own operating systems, in their allocated memory,
CPU and disk footprints. From the perspective of the user or
application on the virtual server, no indication exists to suggest
that the server is not a real, physical server. In this paper, we make
an attempt to enhance dynamic cloud based services using
efficient load balancing techniques. We describe various steps
involved in developing and utilizing cloud based infrastructure in
such a way that cloud based services can be offered to users in an
efficient manner. In the design of load balancing algorithms for an
application offering cloud based services, the various details
described in this paper offer useful insight, while the actual
implementation may be based on the exact requirements at hand.
ThC 10.1
A Dynamic Frame Partitioning Scheme for IEEE 802.16 Mesh
Networks, pp. 1047-1050.
Zhengbao Liu
Xiamen Univ.
Yi Jiang
Xiamen Univ.
Zhixiong Liu
Xiamen Univ.
Yuliang Tang
Xiamen Univ.
The IEEE 802.16 mesh network is a promising next generation
wireless backbone network. In the mesh mode, the allocation of
minislots is handled by centralized scheduling and distributed
scheduling, which are independently exercised. However, the
standard does not specify how the frame can be dynamically
partitioned among its centralized and distributed schedulers.
Through efficient frame partitioning that dynamically adapts the
user demand, network can support more user applications. This
paper proposes a novel and general dynamic frame partitioning
scheme for IEEE 802.16 mesh so that the minislot allocation can
be more flexible and the minislot utilization is increased. The
scheme predicts efficient partitioning for future frames based on
the minislot utilization on current frames by Grey-Markov model.
Our study indicates that the dynamic frame partitioning scheme
outperform the scheme proposed in the IEEE standard.
ThC 10.2
Study on Digital Campus IT Infrastructure Virtualization, pp.
1051-1053.
Luo Guowei
Guangxi Teachers Education Univ.
As Digital Campus applications gaining momentum, the
complexity of IT infrastructure on campus network, resource
utilization efficiency, security control and data backup impose
increased difficulties. In this paper, an analysis is conducted on
applications of virtualization technology including virtual server,
virtual storage, and network virtualization technology for IT
infrastructure to cast down maintenance costs, improve
equipment efficiency, simplify IT infrastructure management, and
ultimately realize the construction of a digital campus network.
ThC 10.6
A Beacon-based Handover Scanning Mechanism with QoS Support
in WiMAX FemtoCell Architecture, pp. 1069-1074.
Han-Jung Chueh
National Chung-Hsing Univ.
Fumin Chang
Chaoyang Univ. of Tech.
Shang-Juh Kao
National Chung-Hsing Univ.
Deploying FemtoCells in WiMAX network, also called WiMAX
FemtoCell architecture, gains a lot of attention due to that
FemtoCell is able to provide better indoor services and offloads
traffic from the WiMAX network. However, since the signal of
WiMAX base station (BS) is stronger than FemtoCell Base Station
(fBS), the handover procedure may not be triggered even though
fBS is within the BS coverage. Besides, since the coverage of
FemtoCell is small, it is possible that a huge number of fBSs are
deployed in a WiMAX BS coverage, which causes a large volume of
power consumption to scan all indoor fBSs for a handover. In this
paper, we propose a beacon-based handover scanning mechanism
with Quality of Service (QoS) support. In the proposed
mechanism, through the beacon and modified MOB_NBR-ADV
messages, a neighbor cell list with QoS parameters is generated
automatically at mobile station (MS). The decision criteria for
triggering the handover procedure and selecting an appropriate
target indoor cell from many candidate fBSs are developed.
Through the adoption of the proposed mechanism, the system
throughput can be improved and the traffic load through the
WiMAX BS can be reduced effectively. A simulation was conducted
using QualNet simulator. The simulation results demonstrate that
along with the number of FemtoCells increases, both the system
ThC 10.3
Reactive Power Optimization of Distribution Network Based on
GA with Simulated Annealing Selection, pp. 1054-1057.
Zhou Shan
Changchun Inst. of Tech.
Liu Wenzhou
Changchun Inst. of Tech.
Cai Changqing
Changchun Inst. of Tech.
Zhang Li
Base of Chinese People's Laberation Army
Air Force Aviation Univ.
The simulated annealing receiving Metropolis norm as individual
replacement policy used for integrated optimization of reactive
power of distribution network, establish mathematical models of
integrated optimization of reactive power considering
comprehensively network loss and minimum voltage deviation in
line with the actual distribution network, programming
application program, by the evidence of IEEE6 nodes distribution
network results, improve the simulated annealing and selection of
genetic algorithm so as to meet the basic requirements for
distribution network Reactive Power Planning, achieve the
optimization of reactive power compensation.
ThC 10.4
Research on Multiple Coverage and Connectivity for Wireless
Sensor Network, pp. 1058-1062.
Wang Jianzhen
Business College of Shanxi Univ.
67
throughput and the utilization of FemtoCells increase significantly,
as compared with conventional handover mechanisms.
IPv6 network than IPv4, IPv6 ISATAP tunnel and IPv6 6to4 tunnel
network.
ThC 10.7
An Anycast Routing Algorithm Based on Simplified Particle Swarm
Optimization and Diversity Strategy, pp. 1075-1079.
Taoshen Li
Guangxi Univ.
Zhigang Zhao
Guangxi Univ.
To solve anycast routing problem with multiple QoS constraints, a
improved anycast routing algorithm based on simplified particle
swarm optimization algorithm and diversity strategy is presented.
Firstly, the algorithm simplify algorithm’s complexity and improve
the convergence velocity extraordinarily by dynamically changing
the inertia weight to. Then, a mutation operator is employed to
maintain particle’s diversity and balance global and local search
effectively. Finally, the validity and efficiency of the presented
algorithm are demonstrated by network experiment. The
experimental results show that proposed algorithm can better
express the advantages of particle swarm optimization algorithm,
and can meet the needs of anycast routing with multiple QoS at
same time. It has faster convergence speed and can escape from
local optimum.
ThC 10.11
Performance Evaluation of the IEEE 802.11 MAC for Mobile
Wireless Sensor Networks, pp. 1094-1098.
Zhong Ping
Xiamen Univ.
Shi Jianghong
Xiamen Univ.
Zeng Zhihong
Xiamen Univ.
Zhang Dezhong
Xiamen Univ.
Zhou Liping
Xiamen Univ.
Chen Huihuang
Xiamen Univ.
With application development of wireless sensor networks, there
are some scenarios exited mobile nodes. This motivates the
research towards the mobile wireless sensor networks (MWSNs).
IEEE 802.11 standard medium access control (MAC) is designed
mainly for wireless local and metropolitan area network and used
in Mobile Ad-hoc Networks. Its capability whether to suit MWSN
has not yet been discovered. This study is to analyze and evaluate
the suitability of IEEE 802.11 MAC in MWSN. The simulation is
simulated on newly released Network Simulator NS-3. By means
of some examples, the results show the energy consumption, delay
and packet delivery ratio performance.
ThC 10.8
Remote Monitoring of Indoor Environment Using Mobile Robot
Based Wireless Sensor Network , pp. 1080-1084.
Joshua D Freeman
Amrita Univ.
Simi S
Amrita Univ.
Remote environmental monitoring is one of important
applications of wireless sensor networking technology where
spatially distributed sensor nodes are used to monitor
environmental parameters and collaboratively transmit their data
though the nerwork. This paper discussed the design of a multi
robotic platform within a hybrid wireless sensor network to
monitor the environmental changes.The system includes a set of
static wireless sensor nodes, a set of mobile robots and a central
controller. Mobile robots help to reduce traffic congestions and
facilitate close monitoring capabilities. For the effective navigation
of the robot, the system uses a known map of the environment,
sensor readings and the guidance from the wireless sensor
network. The combination of more than one technique for
navigation significantly reduces the errors in path planning of the
mobile robots. The sensing nodes in the network will forward the
accumulated data to the central controller for analysis. The central
controller will classify the data based on different threshold levels
and records the data. If the system detects an event which exceeds
current threshold level, then it will provide an early warning to
the authorized users of the system.
ThC 10.12
Transient Fingerprint Feature Extraction for WLAN Cards Based
on Polynomial Fitting, pp. 1099-1102.
Caidan Zhao
Xiamen Univ.
Lianfen Huang
Xiamen Univ.
Liting Hu
Xiamen Univ.
Yan Yao
Xiamen Univ.
With the rapid development of cognitive radio network (CRN), the
information security has become a primary concern. In this paper,
transient fingerprinting is incorporated into CRN for detecting
Primary User Emulation (PUE) attacks. A novel approach is
proposed to extract transient fingerprint feature of transmitters.
The energy envelope obtained from the instantaneous signal by
spectrogram analysis, is fitted according to the least square
estimation. The polynomial coefficients are selected as the feature
vectors of instantaneous signal. A data acquisition system is
designed to capture IEEE802.11b signals in the 2.4GHz ISM band.
The results of data analysis indicate that it greatly improves the
performance of detecting different brand of WLAN cards.
ThC 11
Software Engineering
ThC 11.1
Research on Growth Model Management System of Fruit Tree
Based on Modern Information Technology, pp. 1103-1106.
Song Jianwei
Shijiazhuang Univ.
Wu Shuomei
Shijiazhuang Univ.
Fan Yabin
Shijiazhuang Univ.
Du Xiaoning
China Nuclear Power Engineering Corporation
Considering the growth and management of fruit tree, intelligent
decision management technology based on modern information
technology improves the quality of fruit tree production and
meets the needs of modern agriculture, agricultural information
technology includes neural networks, ontology, expert system,
decision support system etc, and growth model has the function
which can predict and manage, the system can regard various
parameters of different conditions as input factors, is used to
provide pruning, irrigation, fertilization, yield prediction,
cultivation and management, model prediction, dynamic control,
decision-making and so on, achieve the close combination of
theory research and production practice of expert system, and
make full use of the advantage of fruit tree growth models and
expert system, then provide technical support and management
decision services for the management of fruit tree.
ThC 10.9
A Research into The Latent Danger of WLAN, pp. 1085-1090.
Dongsheng Yin
Sun Yat-sen Univ.
Kai Cui
Sun Yat-sen Univ.
Nowadays, WLANs has permeated through our daily lives. In fact,
many companies are considering to abandon the wired LAN,
because it's old-style and clumsy. People prefer to deploy a more
flexible and convenient wireless LAN comparing to the traditional
wired one. While people are enjoying the ease and agility brought
by WLAN, a grave threat to your WLAN’s security may be lying
ahead because of the loopholes of itself. And if this cannot draw
public's attention, severe consequences will definitely follow. This
study's goal is to arouse people's watchfulness through our
research on the security of the WLANs around us. We will
thoroughly analyze the latent weakness of WLANs' both
encryption modes--WEP and WPA\WPA2, and finally we will
propose a series of effective solutions to strengthen your WLAN.
ThC 10.10
Research on the IPv6 Performance Analysis Based on
Dual-Protocol Stack and Tunnel Transition, pp. 1091-1093.
Yingjiao Wu
Women & Children's Central Hospital
Xiaoqing Zhou
Women & Children's Central Hospital
Based on the migration mechanism from IPv4 to IPv6, the
performance of three kinds of mechanism options, double-stack
protocol, ISATAP tunneling and 6to4 tunneling technique are
analyzed and tested. The result shows there are some
performance advantages on double stack protocol mechanism
ThC 11.2
Program Slicing Research Based on MSV in Software Security
Field, pp. 1107-1110.
Zhonglin Zhang
Lanzhoujiaotong Univ.
Muyu Lin
Lanzhoujiaotong Univ.
By proposing a new idea of use of program slicing techniques to
determine the independence of the critical safety variables. Mainly
68
to solve the independence of critical security components within a
class of critical safety variables be judged is not accurate, complex
issues. This idea can intuitive and accurate calculation of the
member variable for the category of a variable that is specific
criticality safety program slicing statement that through MSV
diagram ,which also can analysis of critical variables to achieve the
safety purpose of the independence.
Services Composition is modeling Web Services Composition by
Colored Petri Net, and then using the modeling checking
technique to verifying the model. It can find the fault occurring in
the process of composing Web Services efficiently. Finally, an
example of online shopping is used to explain the idea’s
correctness.
ThC 11.7
An Aspect-Oriented Extension to MiniJava and Its Implementation,
pp. 1131-1135.
Xuelian Hu
Anhui Univ.
Ying Zhang
Hefei Univ. of Tech.
Aspect-Oriented Programming (AOP) is a new programming
paradigm. It is a further development of process oriented,
object-oriented method. By introducing the concept of “Aspect”,
AOP makes the separation of concerns better, decreases code
tangling, solves problems of cross cutting concerns and improves
the software quality and efficiency. This paper discusses adding
aspect-oriented language facilities into the small object-oriented
language MiniJava to get an aspect-oriented programming
language “AspectMiniJava” and implementing it by the dynamic
weaving technology based on the virtual machine. We use
AspectMiniJava language and its compiler in the course of
principles of compiler design to further enhance the teaching and
practice effect.
ThC 11.3
Semantic Web Service Framework Based on Agent and Its Logical
Description, pp. 1111-1114.
Zou Jinan
Putian College
Lin Jianbing
Putian College
Via studying combination of Agent and semantic Web service
technique, researching the role of Agent to the architecture of
semantic Web service and gives a overall specific realization
process, thus paper proposes a framework of semantic Web
service based on Agent, and then describes the framework of the
Agent's work process and the content of semantic Web services
using C&L intend theory.
ThC 11.4
CiFeature: A Context-Independent Feature-Oriented Software
Development Approach, pp. 1115-1122.
Mehran Kavand
Payam Noor Univ.
Saeed Paarsa
Iran Univ. of Sci. & Tech.
Ahmad Faraahi
Payam Noor Univ.
FOSD is the major paradigm in developing SPLs and its main goal
is to increase reusability. Most the current FOSD approaches are
tool or language dependent, and are not software development
context independent. In this paper, we propose a FOSD approach
to develop context independent features, called ciFeature. Our
method is based on treating features as semi-citizen concepts in
the language and using a simple model which could be
implemented in any object-oriented language, so that features are
decoupled from their contexts. In addition to decoupling of
features from tools or languages which are developed them,
developing context independent features will result in the features
became decouple from the base code, what the refinement
approaches suffer from it. Our approach will increase reusability
by its flexible composition and configuration mechanism, so that
the reusability will be achieved at Feature, Feature Part and the
base code levels. Reaching these reusability levels is available
thanks to supporting fine-grained and coarse-grained granularity
in parallel throughout our approach. Finally developing context
independent features will help developers to enjoy FOSD while
they don’t have to migrate and adapt to the new languages,
language extensions or working using new tools.
ThC 11.8
Counterexample Generation and Representation in Model
Checking for Probabilistic Timed Automata, pp. 1136-1141.
Jianfeng Wu
Soochow Univ.
Jin Wang
Soochow Univ.
Mei Rong
Jinan Univ.
Guangquan Zhang
Soochow Univ.
Jihan Zhu
Soochow Univ.
Recently, probabilistic systems have been widely used. People
have drawn attention to counterexample generation for
probabilistic system model checking. Current works are mainly
focusing on the counterexample generation for Markov chains.
Probabilistic timed automata (PTA) is the extension of Markov
chain with non-determinism and system clocks. This paper
focuses on counterexample representation while model checking
PTA. Firstly, the semantic of PTA can be regarded as Markov
decision process (MDP); secondly, we use adversary to convert
MDP into discrete-time Markov chains (DTMCs); thirdly, we
convert DTMCs into weighted graph. So, counterexample
generation for PTA can be converted into shortest path problem
for weighted digraph. Finally, we use regular expressions to
represent the counterexample.
ThC 11.5
Research on Anti-Interference Algorithm for Web Service Trust
Evaluation, pp. 1123-1126.
Jianbin Wu
Zhejiang Normal Univ.
To realize commercial application of web services, its trust and
reputation model has been raised into the agenda. And also many
researches have been done on web services trust evaluation
model. However, in practice there exist a few interferences to
influence web service trust evaluation. For example, service
providers may improve his own QoS level on purpose or giving
vicious evaluation for his competitors. Service providers also may
provide fake services or colludes with each other to gain his high
profit. Now there are few good methods to deal with it. We put
forward two anti-interference algorithms to eliminate vicious
evaluation and collusion. The simulation indicates that the
algorithms work well on anti-interference for web service trust
ev-aluation.
ThC 11.9
The Research and Implementation Based on OpenOffice.org
Uighur Office Suite Software, pp. 1142-1146.
Baoshe Yuan
Xinjiang Univ.
Wu Shouer
Xinjiang Univ.
Based on the analysis in OpenOffice.org architecture and
researching about software internationalization and localization
mechanisms. By adding Software, such as Uighur OpenType font
library, Locale identifier, language identifier, ISO code,
environment variable, making Uighur Locale environment to the
text, preparation of Uighur automatic selection input method,
preparation of mixed syllables, auto-homogeneous deformation
even, formed a set of input and output support for Uighur
OpenOffice.org office Package in the results of a series
Customization and Development about Uighur language
localization.
ThC 11.10
The Research on Collocation Networks of Relation Words In
Modern Chinese Language, pp. 1147-1150.
Hu Quan
Hua Zhong Normal Univ.
Jinzhu Hu
Hua Zhong Normal Univ.
Xie Fang
Hubei Univ. of Tech.
Complex networks is a new method to research complicated
system from the global perspective. The relation words is the
important role in complex sentences. This paper uses complex
networks to research the relation words in modern Chinese
complex sentences. It finds that complex sentences are linked by
ThC 11.6
Verifying Web Services Composition Based on LTL and Colored
Petri Net, pp. 1127-1130.
Jihan Zhu
Soochow Univ.
Kan Zhang
Soochow Univ.
Guangquan Zhang
Soochow Univ.
The main method of model checking based on LTL is constructing
a Büchi automata by system model and a Büchi automata equaling
with the LTL denied form, and then checking the automata’s
acceptive language is empty or not. The idea of verifying Web
69
the relation words’ collocation, so the complex networks which
the relations words built is also has the small-world and
no-measure characteristics, and it is reflected the relation words’
collocation ability and object. This paper discusses the
characteristics and rules of the logic semantic relationship in
complex sentences through studing the characteristics of the
collocation networks of relation words.
interaction of the services, and the issue of existence model
checking can be transformed into the problem whether the logic
formula is satisfiable or not.
ThC 11.15
Modeling Equipment Campaign Based on MASON Platform , pp.
1170-1174.
Yuefeng Chen
66393 Units
63963 Units
Shunwang Xiao
63963 Units
Yefu Wang
63963 Units
Zhongyuan Zhang
63963 Units
The difficulty of equipment compaign simulating lies in to
describe its complexity feature. Owing to this, an agents/space
approach was established from ABM, and which construction,
theory base, key technology and platform were researched.
Furthermore simulating system architecture was constructed on
agents/space approach. In this model agent technology was used
to model weapon damaging equipment and its damage effect, and
the three dimension equipment model was treated as simulating
environment, and damage relation was modeled by interaction of
agent and space. At last a prototype simulating system of
equipment compaign was developed on Mason platform.
ThC 11.11
A Library for Parallel Programming with Multi-core Computer, pp.
1151-1153.
Qing Li
Shanghai Univ.
Wu Zhang
Shanghai Univ.
In this paper, a Multi-Thread Interface (MTI) is developed into a
lightweight and easy-to-use class library. This library is based on
multi-core processor by means of packaging Windows thread
interface functions, with which serial codes can be expanded into
parallel ones. In the library, thread-related operations are
enveloped into classes in order that programmers can use them
more conveniently. MTI constructs for parallelization, restricting
control of threads and communication primitives for
synchronization. Using this framework, parallel algorithms have
been implemented for computing numerical integral and matrix
multiplying to prove that MTI reduces the difficulty, such as
“programming wall”, brought by multicore system.
ThC 11.16
An ANN Verifying Approach to Equipment Compaign Model, pp.
1175-1179.
Shunwang Xiao
63963 Units
Yuefeng Chen
66393 Units
63963 Units
Yuangsheng Dong
63963 Units
Feng Liu
63963 Units
To any simulating system, only its credibility being confirmed can
it take on practical worthiness. When economical and feasibility
were concerned, the verifying and validating tactic was put
forward to equipment compaign simulation prototype system.
Then damage parameter experiment was done under typical
condition. Neural network was used to verify error between
experiment data and experiential value of damage parameters, the
trained neural network was embedded into model. At last system
simulating result was validated through real war data and
experiment data of real equipment. So a fresh approach on
complexity theory was explored to equipment simulating model
or analogous problem.
ThC 11.12
Demo System of Amplitude Modulation Based on Java, pp.
1154-1158.
Zhang Shuiying
Zhejiang Sci-Tech Univ.
Du Jingjing
Zhejiang Sci-Tech Univ.
Jin Xuebo
Zhejiang Sci-Tech Univ.
Yang Runkai
Zhejiang Sci-Tech Univ.
Demonstration system of amplitude modulation based on JAVA is
developed. First, this paper analyzes the principle of amplitude
modulation and demodulation. Then, The Architecture of demo
system is designed. According to function requirement, we adopt
object-oriented method to design and implement the demo
system. Finally, we use the button to debug the demo system. The
results indicate that the signal wave can change with pressing the
button. The demo system has an attractive interface, and is
convenient to operate. It also has a good interactivity. This demo
system has already been used in educational practice and got a
good effect.
ThC 11.13
Modeling Aspect-oriented Software Architecture Based on ACME,
pp. 1159-1164.
Mei Rong
Shenzhen Tourism College
Changlin Liu
Soochow Univ.
Guangquan Zhang
Soochow Univ.
The crosscutting phenomena has been found at architectural level.
Using aspects, AOP effectively solves the code tangling problem
produced by the crosscutting phenomena at code level. This paper
presents an approach to aspect-oriented software architecture
design by introducing the concept of aspects into the process of
software architecture design. We describe the regular
architectural structure with the basic design elements of ACME,
and represent the architectural aspects with the proposed
extension of ACME. The example of an Online Bookstore System
has been used to illustrate our proposal.
ThC 11.17
Information Technologies, Organizational Cultures and Knowledge
Management, pp. 1180-1185.
Shumei Tseng
I-Shou Univ.
The purpose of this study is to empirically explore the effects of
information technologies and organizational cultures in the
implementation of knowledge management. Moreover, based on
the definition of the five knowledge management gaps, the
relationships among knowledge management, information
technologies and organizational cultures are analyzed and
demonstrated by mean of case studies. The findings reveal that
information technologies and organizational cultures play very
important roles in determining the magnitudes of these
knowledge management gaps. Furthermore, this research
discusses how to enhance the effectiveness of implementing
knowledge management through appropriate information
technologies and organizational cultures.
ThC 11.14
A Method for Detecting Mismatch of Time-Aware Web Services
Based on SMT, pp. 1165-1169.
Xiyan Wang
Soochow Univ.
Shenbiao Chen
Soochow Univ.
Guangquan Zhang
Soochow Univ.
Zhu Jihan
Soochow Univ.
Jianfeng Wu
Soochow Univ.
Considering the timed properties between the interactions of Web
services, we model the Web services with timed properties
formally and propose a method for detecting mismatch of
time-aware Web services based on Satisfiability Modulo Theories
(SMT) in this paper. The issue of detecting mismatch of Web
services can be transformed into the problem of existence model
checking whether a deadlock is reachable or not between the
ThC 11.18
Liveness Rules from Fairness Based on TLA, pp. 1186-1188.
Wan Liang
Guizhou Univ.
Formal methods use mathematic and logic method to describe
and validate the system, TLA (The temporal logic of actions) is for
specifying systems, it is brought forward by Leslie Lamport, and it
can specify a system’s modeling and property together. Its
specifying language is TLA+ and the checking tool is TLC. Liveness
property is important property of a system, it is close relation to
fairness property. It is in formal a conjunct of the fairness
properties of the system properties. Leslie Lamport has put
forward several liveness rules. We use a new way to prove the
liveness rule from weak fairness and the liveness rule from strong
fairness.
70
pressure in measuring holes was smooth; the eccentricity and
bearing capacity was basically a linear relationship under a
certain condition. The pressure changes in the measuring holes
could be used to measure the force of roll collar. The results
presented in this paper laid a theoretical basis for design of
pneumatic strip shape measuring roll.
ThC 11.19
Geometric Identification of Search States on (F~,F)-information,
pp. 1189-1193.
Yuying Li
Ningde Normal Univ.
Li Zhang
Shangdong Univ.
Shiliang Zhang
Ningde Normal Univ.
Qunsheng Ruan
Ningde Normal Univ.
ThC 11.23
Study on the Engine Test and Fault Diagnosis System Based on the
Information Fusion Technique, pp. 1208-1210.
Cheng Wang
Huaiyin Inst. of Tech.
Shanzhen Xu
Huaiyin Inst. of Tech.
It analyzed the importance of the four parameters of cylinder
pressure, speed, starting rotation speed, starting current, cylinder
body temperature for the engine fault diagnosis. It designed the
testing and fault diagnosis scheme using AT89c51. According to
the testing data and the information fusion evidence reasoning
theory, it presented the fault diagnosis method for engine cold
start and formed a integration and fusion of intelligent test and
fault diagnosis system.
Using P-sets, the concepts of ( F , F )-information, ( F , F )search
scale and ( F , F )-search circle are proposed. Meanwhile, this
paper give the search principle of ( F , F )- information, the
sequence theorem of ( F , F )search scale, the internal-outer point
theorem of the unit discrete interval on (F~,F)-search scale, and
the position theorem of ( F , F )search circle. ( F , F )-search circle
is a series of concentric circles. The geometric identification
theorem and the identification criterion of the search states on
( F , F )-information are given by ( F , F )-search circle. This paper
also provides the application of identifying the search states on
( F , F )-information. The geometric identification of the search
ThC 11.24
An Empirical Study on Paying Rate of Basic Pension Insurance
based on Probabilistic Voting Model, pp. 1211-1216.
Rong Li
Beihang Univ.
Lin Jian
Tsinghua Univ.
This thesis employs two OLG Models to analyze the partially
funded pension system in China, and proves that the reduction of
the population growth rate will lead to the increase of the
payment rate. And intergenerational transfer rate between two
generations will improve. The ascending of the enterprise
payment rate during political-economy equilibrium is determined
by the decline of capital output elasticity coefficient and
retirement coefficient and the ascending of the political weight of
the retirees. Then the thesis concludes that the increase of the
social payment rate will diminish the working consumption of
labors and improving the retiree consumption. The increase of the
social total deposit will reduce the labor’s consumption at the
moment. The adding of the proportion in GDP of the total sum of
payment is decided by increase of the payment rate of enterprise
and the decline of population growth rate.
states on ( F , F )-information can enhance the geometry intuitive
characteristic of the search states as well as ( F , F )-information
size in information systems. The geometric identification of the
search states on ( F , F )-information provides a new visualization
method for information systems’ search states.
ThC 11.20
The Construction and Development of School Practice Base, pp.
1194-1197.
Yuan Hongyan
Yantai Univ.
Liu Jiangxia
Yantai Univ.
Yu Bo
Yantai Univ.
Aiming at the current problems of practical teaching in
engineering colleges and universities, the paper proposed the
concept of establishing school practice base. Take the
establishment of engineering training practice base in Yantai
University as example, a comprehensive introduction to the
practice base of concept, features, content, teaching system and
the further construction of the development is presented. Practice
shows that construction and application of school practice base is
an effective way of solving the existing difficult to practice
problems and cultivating students’ practical capability of
engineering.
ThC 11.25
Reliability Study of Complex Power Systems, pp. 1217-1222.
Zhang Ning
Xiamen Univ.
Lu Yanan
Southwest Univ. for Nationalities
Ye Tengfei
Xiamen Univ.
Zheng Siting
Xiamen Univ.
With the fast development of the power systems, the expanding of
the power system is bigger, and users have the higher
requirements of the electric quality, so researches and
developments in electric power systems analysis has been an area
of significant activity for decades. The robustness of a power
system is measured by the ability of the system to operate in a
state of equilibrium under normal and perturbed conditions.
Stability of the power system deals with the study of the behavior
of power systems under conditions. The scale of power system is
big, so we usually divide it into parts. We can analyze the
subsystem through the main features. Among them, the generate
electricity systems and the transmission system are very
important. In this paper, we make use of differential coefficient to
analyze the generator and the transmission factors in power
systems.
ThC 11.21
Supply Chains Longitudinal Competition-cooperation Games
Analysis Based on Reference Chain, pp. 1198-1203.
Hu Xianwu
City College Wenzhou Univ.
The relationship between competition and cooperation in supply
chain enterprises is not only affected by the factors inside the
chain, but also by the competition chain (reference chain). We
choose two-level supply chain in this article, and discuss the four
competition and cooperation states of manufacturer and retailer
under the same market structure with reference chain, that is,
cooperation-cooperation,
competition-competition,
competition-competition,
cooperation-competition,
competition-cooperation to establish models and solve. The result
of analysis shows that the supply chain utility of
cooperation-competition is effective, designing and analyzing the
operation mechanism of cooperationcompetition model. When
the market profit rate is high, the satisfaction proceeds value of
manufacturers is small, the cooperation proceeds distribution
mechanism of manufacturer and retailers is easily determined.
ThC 12
Teaching Mode
ThC 11.22
An Analysis and Simulation on Air Film of a Pneumatic Strip Shape
Measuring Roll, pp. 1204-1207.
Xiaoming Hu
Huaiyin Inst. of Tech.
The pressure distribution within pneumatic strip shape
measuring roll directly affected its specifications. It presented a
finite difference equation of the air film regiona film
corresponding to an orifice. An analysis and simulation on film
pressure field and the bearing capacity were complted with the
principle of Reynolds equation. The results showed that the
ThC 12.1
A Study on Profession Ability Structure and Teaching Mode
Reform, pp. 1223-1226.
Yadong Wang
Tianjin Univ. of Tech. & Education
Changzeng Wei
Tianjin Univ. of Tech. & Education
Zhixin Zhou
Tianjin Univ. of Tech. & Education
The article analyzes the main profession ability of our
undergraduates in the circumstance of present social system and
employment environment. Aiming at this structure of professional
ability, the article gives perspectives of transforming the current
71
teaching modes, and study out the detail teaching mode and
structure. The authors hope that we can improve the
comprehensive professional ability and employment status of
college graduates effectively by education reform.
Basics of Computer Applications and promotes some instructive
recommendations to address the uneven basic and application
ability showed in the process of learning. In practice, the teaching
ideas mentioned here acts as an effective role in the enhancement
of students’ sense of innovation as well as the manipulative ability
of computer application, which has improved the teaching quality
and played with good results.
ThC 12.2
Constructing Informal Learning Mode Based on Social Software,
pp. 1227-1230.
Yuan Jiugen
Jiangxi Sci. & Tech. Normal Univ.
Xing Ruonan
Jiangxi Normal Univ.
Hu Xiaoqiang
Jiangxi Sci. & Tech. Normal Univ.
In order to meet learner changes of learning state diversity,
informal learning has been gradually entering our field of vision, it
becomes a important form of learner’s learning. And social
network is a coming Internet revolution, It is particularly
important to carry out informal learning with the help of social
software. The thesis introduces two basic concept : Social
software and informal learning and analyzes the feasibility of
informal learning with social software. Finally it concludes four
usual informal learning modes: acceptance informal learning,
self-directed informal learning, collaborative informal learning
and Inquiry informal learning.
ThC 12.7
The Design and Application of Geography Experimental
Simulation Platform, pp. 1246-1250.
Jiang Huixian
Fujian Normal Univ.
Lin Guangfa
Fujian Normal Univ.
A teaching method of “virtual” experimental scene based on
virtual simulation platform is developed with the aim to solve the
existing problems in geographical experimental teaching. The
paper discussed some issues on how to build a practice teaching
technology system with geographical scene simulation that
integrating geographical space information collection, application
and simulation. Some examples were given to describe the main
construction process of the platform. The application of the
platform will provide a new practice teaching pattern in which
“experiment---theory sublimation---practice” for geographical
experimental teaching research is used to promote students’
abilities on laboratory test and field practice, comprehensive and
innovative experiment.
ThC 12.3
The Practice of the Student-centered and Teacher-guided Data
Structure Teaching Mode, pp. 1231-1234.
Yue Chen
Zhengzhou Inst. of Info. Sci. & Tech.
Jing Cao
Zhengzhou Inst. of Info. Sci. & Tech.
Qing Dai
Zhengzhou Inst. of Info. Sci. & Tech.
Chengshi Gao
Zhengzhou Inst. of Info. Sci. & Tech.
In conventional data structure teaching, the teacher pays more
attention to knowledge indoctrination and ignores cultivating
students’ ability of solving practical problems. To solve the
problem, the new goal of data structure course teaching, including
the aspects of knowledge, abilities and qualities, is proposed. And
the “student-centered and teacher-guided” data structure teaching
mode for achieving the goal is put forward. The transformation of
teachers’ and students’ roles in the new model practice is
described.
ThC 12.8
The Study of New Teaching Method in Dynamic Circuit Response
Analysis, pp. 1251-1254.
Sheng Guizhen
Changchun Inst. of Technolog
Cai Changqing
Changchun Inst. of Tech.
Zhao Yan
Univ. of Sci. & Tech. of China
The abstract and misunderstanding has been a great handicap in
the Circuit Theory teaching process, in particular, the part of
Dynamic Circuit Response analysis. In this paper, the introduction
of Multisim10 will be provided with teaching practice of the
first-order, second-order Dynamic Circuit. The significant meaning
of such practice lie in deepening students’ comprehension,
enhancing their practice skill, raising the student general analysis
ability and innovation ability.
ThC 12.4
The Research and Reform Based on CDIO in Data Structure, pp.
1235-1238.
Huijuan Qi
Shiiazhuang Inst. of Railway Tech.
Lina Liu
Shiiazhuang Inst. of Railway Tech.
Dexiong Li
Shiiazhuang Inst. of Railway Tech.
Learning from advanced international CDIO engineering
education philosophy to solve the problems of traditional "data
structure" teaching, we apply CDIO philosophy to "data structure"
teaching, and regarding the projects as the carriers, we proposed
the specific reform measures in three areas: teaching
organization, teaching methods and assessment model. After
practicing, we achieved an ideal result.
ThC 12.9
An Application-Driven Teaching Model for Series Curriculum, pp.
1255-1259.
Min Cao
Shanghai Univ.
Haiqiang Li
Shanghai Univ.
Courses for data structures, compiler theories and databases are
the most important fundamental specialty courses of computer
science. Because of the highly abstract and strong logical
characteristics of these series curricula, it is difficult for students
to learn and apply them to actual projects. Based on the design
and implementation of the information management system for
reservoir resettlement compensation, this paper summarizes the
problems encountered in the actual development, and proposes
some specific solutions. At the same time, it explores and
researches the teaching method of these series curricula. A novel
application-driven teaching model for series curriculum is
proposed. Either the solution of actual project or their application
in teaching is effective and feasible.
ThC 12.5
Concordance-based Learning and Teaching of Grammar, pp.
1239-1242.
Tang Xuemei
Anhui Polytechnic Univ.
Recent years have witnessed a resurgence of interest in the role of
grammar in English language teaching. The present state of
grammar teaching in China and the negative effects it causes upon
EFL teaching have aroused great attention and consideration. In
recent years fresh light has been cast on grammar learning and
teaching with the appearance of electronic corpora and
concordance. This paper gives a general introduction of
concordance-based learning and discusses with examples how to
apply it to grammar teaching. Accordingly, concordance-based
learning may offer more effective and appropriate pedagogical
implications.
ThC 12.10
Research of VB Programming Teaching Mode Based on the Core of
Computational Thinking Ability Training, pp. 1260-1263.
Chunying Zhang
Hebei United Univ.
Xiao Chen
Hebei United Univ.
Jianjing Li
Hebei United Univ.
In this paper, the existing problems and teaching characteristics of
VB programming are first analyzed. Then the specific measures to
reform the teaching and examination modes are proposed in
accordance with the requirements of computational thinking
ability training. After that, how to train the students’
“computational thinking” in the VB program curriculum is
elaborated on, in the hope of enabling the students to analyze and
solve problems and to innovate with computers.
ThC 12.6
Teaching Explorations of Basics of Computer Applications, pp.
1243-1245.
Zou Quan
Xiamen Univ.
Li Xubin
Xiamen Univ.
Lin Chen
Xiamen Univ.
Our work focuses on the analysis of the course education of the
ThC 12.11
72
CDIO in Websit Design Education, pp. 1264-1266.
Liu Yang
Shijiazhuang Inst. of Railway Tech.
Li Xiaonan
Shijiazhuang Inst. of Railway Tech.
Zheng Hua
Shijiazhuang Inst. of Railway Tech.
Liu Jia
Shijiazhuang Inst. of Railway Tech.
Rapid development of higher vocational education, personnel
training can not meet the needs of society. Teaching practice the
application of CDIO engineering education model, break the
routine curriculum model. With professional capacitybuilding in
the main line, using the teaching model to project program carrier,
it integrated curriculum knowledge and it attention to the quality
of students and improve teaching.
ThC 12.16
The Construction of the Specialty of Information Management and
Information System Based on CDIO Mode, pp. 1282-1285.
Ying Hua
Suzhou Vocational Univ.
Min Xu
Suzhou Vocational Univ.
CDIO is an innovative mode of higher engineering education at
home and abroad in recent years, giving twelve operational
standards concerning cultivation of abilities , implementation in
all aspects and assessment, which will be a very good reference to
the existing education in colleges . This article is guided by the
mode of CDIO, discussing the reform in the construction of the
specialty of information management and information system
from teaching philosophy, teaching objectives, curriculum system,
teaching methods and assessment.
ThC 12.12
Reforming to Improve the Teaching Quality of Computer
Programming Language, pp. 1267-1269.
Rongfang Gao
Xi'an Shiyou Univ.
Training of computer programming ability has aroused increasing
attention in the course of Computer Programming Language. This
paper analyzed main problems in the subject of computer
language course which shows that the major difficulties in
teaching the computer languge include obsolete and fragmentary
contents of the course, insufficient modularization programming,
and little practice training. Then, the reforming teaching mode of
thinking, training method and particular steps of the course are
proposed. To improve student’s practical ability, the training of
programming method and ability of students are emphasized in
this paper. Therefore, a better result has been acheaved in the
proposed teaching practice.
ThC 12.17
Computer Engineering Education Reform Based on CDIO, pp.
1286-1290.
Sun Jingdong
Southwest Jiaotong Univ.
Wang Zhengbin
Southwest Jiaotong Univ.
Zhang Yan
Southwest Jiaotong Univ.
Wang Yao
Southwest Jiaotong Univ.
Through detailed analysis of Conceive, Design, Implement, and
Operate (CDIO) engineering education mode, the education of
computer engineering is innovated in combining basis theory,
personal capability and collaboration of team and environment of
society. In view of Capability Maturity Model (CMM), a model of
computer engineering education reform Based on CDIO is
developed, and the program optimizing method called Prepare,
Assess, Summary, and Adjust (PASA) based on CDIO is put
forward, furthermore, the basic tasks and demands of the method
are also discussed in detail. When the CDIO engineering education
model with the project as its carrier is build, the Flexible, Module,
and Season (FMS) organization mode of teaching is actively
promoted, and the requirements of the project implementation
arrangements are met. From the method had been implemented
since 2010, the system has got the approval of the teachers and
students, which stimulates students’interest, and has a better
effect in practice.
ThC 12.13
A Teaching Model Based on Schema Theory in Computer
Programming Curriculum, pp. 1270-1272.
Tiezheng Sun
Changchun Univ. of Sci. & Tech.
Chunyang Qiu
Jilin Univ. of Finance & Economics
Jianhua Jiang
Jilin Univ. of Finance & Economics
Computer Programming Curriculum is a core curriculum for
information management and system majors. However, it is hard
for information management and system major students to
master computer programming technology. To solve this issue,
teaching environment and schema theory are discussed in
summary firstly, a teaching model based on schema theory is
proposed secondly, and a teaching experiment is designed next.
The teaching result shows that there is a significant difference in
final exam between the proposed model and a regular teaching
model.
ThC 12.18
Learning Effect for Students with Game-based Learning on
Meta-Analysis, pp. 1291-1295.
Tsungli Wang
Shu-Te Univ.
Yafen Tseng
Chung Hwa Univ. of Medical Tech.
This meta-analysis employs a theoretical framework in
quantitatively synthesizing empirical studies that investigate the
effects of game-based learning versus classroom instruction on
the student learning effect. Analyses of 14 journal papers with 21
studies on 946 students were conducted according to how media
were used to support game-based learning. The results indicate
that the effect sizes for synchronous game-based learning for the
students’ study were consistent and significantly different from
zero. The highest effect size is the learning performance (case 1),
and the lowest effect size the learning outcome (case 1), although
all the studies were the significance. Follow-up analysis of
game-based learning findings was framed in terms of some
patterns of interaction with the learning effect including learning
performance, learning outcome, and knowledge test and so on.
ThC 12.14
The Exploration on Task-driving Teaching Mode of Network
Security Course Reformation and Construction, pp. 1273-1276.
Yu Han
Dalian Univ. of Tech.
Naigao Jin
Dalian Univ. of Tech.
Hong Yu
Dalian Univ. of Tech.
Zhenquan Qin
Dalian Univ. of Tech.
Analyze the characteristics of network security courses and the
use of task-driven teaching practical significance. Discuss the
detailes to carry out all aspects of curriculum, including classroom
teaching, task-driven experimental procedures, evaluation system
of the re-establishment and task-driven implementation of
teaching effectiveness.
ThC 12.15
Study and Practice on CDIO Innovative Education, pp. 1277-1281.
Jiang Fan
Guangzhou Univ.
Zhang Chunliang
Guangzhou Univ.
Wang Yijun
Guangzhou Univ.
Xiao Zhongmin
Guangzhou Univ.
Innovation education is the core of engineering education, CDIO
teaching embodies the innovative education, mainly using the
TRIZ innovation theory, to solve the contradictions in knowledge
points optimization, reorganization of knowledge point, courses
creation, curriculum construction, teaching management in the
CDIO teaching. And improving the CDIO curriculum, teaching
management and the others is adapted to innovation education, to
create an innovative educational environment. TRIZ innovation
theory is taught systematically to help students master the
innovative methods, to enhance students’ innovating ability.
ThC 12.19
A Qualitative Study in Middle School on Information Technology
Teaching Model, pp. 1296-1300.
Minhua Wu
Capital Normal Univ.
Weili Peng
Capital Normal Univ.
With the new course conception of “teacher-oriented,
student-centered” proposed, the teaching model has undergone
great changes. This study bases on the six teaching video of
information technology discipline in the “seminar of information
technology in Beijing”, making use of the NVivo, a qualitative
analysis software, and discusses all the aspects of teaching model
under the new curriculum concept, then proposes individualized
teaching model.
ThC 12.20
Teaching Method Reform of the Drawing Course by Integrating
73
CDIO Mode, pp. 1301-1302.
Lina Yuan
Wuyi Univ.
Ling Wang
Wuyi Univ.
In order to meet the demand for a large number of creative
engineering talents in industry development under the
background of economic globalization, Education Ministry
formally started CDIO education model in 2008, and first made
experiments on eighteen domestic universities. After exploration
in descriptive geometry and mechanical drawing, the content of
our course is boldly reformed, which enhances the students’
ability to practise and think, and this reform turns out to be
effective.
provides a convenient method for the customers to participate the
design process. Since all the operations are conducted through
internet/intranet, customers, designers and analysts are able to
participate the design process at different geographical locations.
According to the interface procedure of the model transformation
compiled in this paper, the finite element model was successfully
transformed from CAD system to CAE system.
ThC 13.4
Design of LAN-export Flow Control Strategy Based on Application
Layer Channel, pp. 1315-1318.
Ni Sheng
Guangxi Medical Univ.
Tang Zhong
Guangxi Medical Univ.
Contradiction between the rapid expansion of WAN traffic
demand and local area network export-bandwidth force the flow
control nodes are deployed to the local area network key links.
The article analysis of the traffic needs of network users. From the
perspective of the LAN operations, described the principles and
objectives of channel flow control that based on application layer
the principle, designed fourchannel flow control and a plan of
strategy.
ThC 13
Web Application
ThC 13.1
A Novel Verification Code Technology to Make Your System More
Secure, pp. 1303-1306.
Dancheng Li
Northeastern Univ.
Qiang Wei
Northeastern Univ.
Liu Zhiliang
Northeastern Univ.
Binsheng Liu
Northeastern Univ.
Verification code technology is designed to distinguish humans
from computers using distorted letters and/or numbers, to
protect websites from machine attacking. The current verification
code technology faces a problem: too simple to prevent an
attacking machine to recognize automatically, or too complex for a
human user. It will be hard for us to decide which to choose? This
paper proposes a novel method. The verification code will be
meaningful and can be simple, and some random meaningful
images are also transferred to the client at the same time, people
should not only input the verification code, but also need to
choose one image whose content has the same meaning with
verification code. For example, the verification code is “cat”, and
transferred images will contain an image of cat, user should select
the cat image so that he/she may pass the validation. Theoretical
analysis and simulation experiments illustrate that this method is
effective, safe and with low complexity.
ThC 13.5
A Web Service QoS Prediction Approach Based on
Multi-Dimension QoS, pp. 1319-1322.
Lu Li
Suzhou Vocational Univ.
Mei Rong
Jinan Univ.
Guangquan Zhang
Soochow Univ.
With the rapid development of web service, there are a lot of web
services to be chosen. Consumers usually choose the suitable web
service when they know little about web services. To address this
problem, this paper presents a web service QoS prediction
approach based on multi-dimension QoS. It normalizes the
multi-dimension QoS parameters and maps each dimension QoS
parameter into the same interval in order to provide references
for consumers to choose the suitable web service. At last, an
application example is used to explain this approach.
ThC 13.6
On the Formalization of Aggregate Relation Based on Ontology
and Its Implement of OWL, pp. 1323-1326.
Zhao Bo
Yunnan Normal Univ.
Duan Chongjiang
Yunnan Normal Univ.
Zhang Jie
Yunnan Normal Univ.
In order to represent aggregate relation based on ontology clearly
and correctly, the rich semantic properties of aggregate relation in
addition to composition and aggregation are elaborated and
formalized based on ontology in algebra theory in the paper.
However, OWL, as an ontology modeling language, does not
provide support for these semantic properties of aggregate
relation directly. How to represent such the properties of
aggregate relation in OWL is discussed and presented.
ThC 13.2
Investigation and Analysis and Optimizing Countermeasures of
Current Website Construction of Top Third-class Hospital in
Shandong Province, pp. 1307-1310.
Song Guojian
Jining Medical College
Wang Qianfei
Jining Medical College
Chu Hongrui
Jining Medical College
By the way of investigating and analyzing the website construction
of the eighteen top third-class hospitals in Shandong Province, the
overall level of the website construction of the top third-class
hospital in the region is revealed, and the deficiencies of the
website construction is mainly discussed, and for the construction
and optimization of the hospital website suggestions are also put
forward.
ThC 13.7
Portal-based Design for SaaS System Presentation Layer
Configurability, pp. 1327-1330.
Dancheng Li
Northeastern Univ.
Wei Zhang
Northeastern Univ.
Shuangshuang Zhou
Northeastern Univ.
Cheng Liu
Northeastern Univ.
Weipeng Jin
Northeastern Univ.
SaaS (software as a service) is a new software development mode.
It has drawn many IT workers’ attentions. Its core concept is that
transform from developing softwares into developing services in
the process of software development. And the applied SaaS mode
developed system can provide the users with a greater operating
space, and it can be more meet the needs of users. In the SaaS
application system, the multi-tenants share a single instance can
effectively reduce the costs on hardware and maintenance and
maximize the scale of SaaS application. Although the single
instance architecture implements a true sense of the SaaS
architecture, at the same time this architecture results that all of
the tenants have to use the same version of user interface. It is
quite difficult to meet the personalized needs of tenants and the
user experience is rather serious. And the user interface reflects in
the presentation layer when we do the web development.
Obviously, the problem about the configurability of the
ThC 13.3
A Method of CAD/CAE Data Integration Based on XML, pp.
1311-1314.
Yi Zhang
Chongqing Univ.
Li Hua
Worcester Polytechnic Inst.
In spite of the widespread use of CAD systems for design and CAE
systems for analysis, the two processes are not well integrated
because CAD and CAE models inherently use different types of
geometric models and there currently exists no generic, unified
model that allows both design and analysis information to be
specified and shared. XML has become the de-facto standard for
data representation and exchange on the World-Wide Web. This
paper proposes a data integration method based on the XML
technique in order to resolve the problem of data transmission for
CAD and CAE. Designers parametrically model the bridges
through 3D CAD platform. CAE analysts conduct explicit dynamic
FEA (Finite Element Analysis) on the designed bridge structure.
CAD and CAE functions are accomplished through C/S
architecture. An XML and Web Service based DAC
(Design-Analysis Connection) is developed to maintain a
consistence between CAD model and FEA model. The design is
then displayed to the customers through B/S mechanism, which
74
presentation layer in SaaS application is deserved to be
researched. In this paper, we focus on the portal technology and
related knowledge to format a configurability strategy. Taking use
of the strategy to design and implement the user interface
configuration in SaaS application system.
communication unit adopts processor LPC2134 (ARM7) and
SIM300, Monitoring center design plan with JAVA as programming
language, and B/S model as well.
ThC 13.12
A Mobile Learning System Based on WAP, pp. 1351-1354.
Wei Ying
Zhejiang Univ.
This paper brings up a mobile learning system, which can be used
to collaborative learning, learning evaluation, information
distribution, resource sharing and so on. This system is developed
by using Java ME technology, the Web application server is
powered by Tomcat 6.0, and the background database uses SQL
Server database. To support the WAP 2.0 protocols, all documents
of this system follow the XHTML MP specification. Therefore, the
users can access the system by using a wireless communication
device which supports the WAP 2.0 protocols.
ThC 13.8
The Relationship of Motivation and Self-Regulation in Web -
Based Autonomous English Learning, pp. 1331-1334.
Haiyan Li
North China Electric Power Univ.
The objective of this study was to investigate how different
motivational components of social cognitive theory relate to
students' use of cognitive and metacognitive learning strategies in
web- based autonomous English learning (WAEL) . University
students (n = 140) completed a survey that assessed their task
value and self-efficacy, as well as outcome variables that included
their use of three self-regulated learning (SRL) strategies. Pearson
correlations indicate that task value and self-efficacy were
significant positive predictors of students’ use of various learning
strategies. Educational implications and suggestions for future
research are discussed.
FrA 1
Artificial Intelligence
FrA 1.1
Multi-objective
Optimization
Using
Genetic
Algorithm:Applications to Imperfect Preventive Maintenance
Model, pp. 1355-1360.
Chung-Ho Wang
National Defense Univ.
Sheng-Wang Tsai
National Defense Univ.
In this study, a multi-objective hybrid genetic algorithm (MOHGA)
is proposed to optimize a multi-objective imperfect preventive
maintenance (MOIPM) model. The MOHGA proposed not only
utilizes a Pareto-based technique to determine and retain the
superior chromosomes as the GA chromosome evolutions are
performed, but also guides their search direction. In order to
obtain diverse non-dominated solutions that approach the
optimized Pareto-efficient frontier, the closeness metric and
diversity metric are employed to evaluate the superiority of the
non-dominated solutions. Accordingly, decision makers can easily
determine the most appropriate maintenance alternative to
constitute a maintenance strategy from the optimized
non-dominated solutions, given the practical requirements of
system performance under the constraints of maintenance
resources. Furthermore, this study employs response surface
methodology via systematic parameter experiments to determine
the best search parameter settings in the MOHGA proposed. A
simulated case verifies the efficacy and practicality of the MOHGA.
ThC 13.9
The Three-dimensional Way to Describe and Build the Complex
Web Service Composition System, pp. 1335-1339.
Li Dancheng
Northeastern Univ.
Zhang Ming
Northeastern Univ.
Liu Cheng
Northeastern Univ.
Liu Binsheng
Northeastern Univ.
In this paper, the structure of the complex web service
composition relationship and the insufficiency of the conventional
web service deployment was discussed, then it introduced a
method to describe the complex composition relationships
between web services. This material also serves as a guide for
readers to build an elastic complex web service deploy platform
which can archive real time monitoring and flexible deployment to
maximize the service efficiency, security and grantee the system
stability.
ThC 13.10
Personalized Recommendation Using Implicit Interaction
Information, pp. 1340-1345.
Liu Nancheng
Xianmen Univ.
Qingshan Jiang
Shenzhen Inst.s of Advanced Tech.
Chinese Academy of Sci.s
Haishan Chen
Xiamen Univ.
Beizhan Wang
Xiamen Univ.
Currently, the information in the internet is becoming explosive. In
order to help the users searching the items they are interested in,
such as the news or the books, in this paper, we propose an
automatic personalized
recommendation
algorithm by
constructing the social graph resting on the users’ implicit
interaction information. We at first introduce a metric to measure
the users’ affinity based on their implicit interaction information
to construct a social graph, and then categorize the users into
different clusters within which they will have similar tastes,
finally, we use a personalized recommendation algorithm to
recommend the items shared in the same cluster to the users. The
experiments on a book data set are performed to demonstrate
that our proposed method can well generate the
recommendations which users will be interested in with high
accuracy and efficiency.
FrA 1.2
Margin Based Variable Importance for Random Forest, pp.
1361-1366.
Yang Fan
Xiamen Univ.
Li Xuan
Xiamen Univ.
Zhou Qifeng
Xiamen Univ.
Luo Linkai
Xiamen Univ.
Random forest variable importance measure (RF-VIM) has been
widely used in many applications such as bioinformatics. The
permutation based VIM accesses the variable importance with
changes of the OOB accuracy caused by random permutation. In
this paper a margin based variable importance measure was
proposed, which use the changes in the margin distribution of
training samples caused by random permutation to assess the
importance of features. Experiments on gene expression data
show that the method outperforms both the original RF-VIM and
the Gini importance on some datasets.
ThC 13.11
Optimization of Remote Monitoring of Cathodic Protection Power
Supply System Base on Four-tier Structure and B/S Model, pp.
1346-1350.
Liu Ting
Wuhan Univ. of Tech.
Zhao Xing
Wuhan Univ. of Tech.
Cathodic power supplies are widely used for corrosion prevention
on storage tanks,transmission and distribution pipelines in the
gas and petrochemical industry.To improve reliabiliaty of the
cathodic protection systems ,a remote monitoring of power supply
systems base on four_tier structure and B/S model is developed.
This paper presented four tier structure:Acquisition unit control
scheme with MSP430F2013 as control chip, Digital control unit
control plan with dsPIC33FJ16GS504 as core chip, GPRS
FrA 1.3
System-level Modeling and Performance Analysis of IEEE802.11
Wireless Communication Protocol, pp. 1367-1372.
Zhangqin Huang
Beijing Univ. of Tech.
Chunhua Xiao
Beijing Univ. of Tech.
Zhiqiang Wang
Beijing Univ. of Tech.
In order to analyze the performance of IEEE 802.11 wireless
communication protocol, a performance abstract model of IEEE
802.11 protocol was built base on POOSL language and the
performance was analyzed qualitatively and quantificationally in
ad hoc network and WLAN with AP. During modeling, the protocol
was abstracted rationally. Wireless channel was successfully
simulated and the two accessing methods of DCF (basic and
RTS/CTS) were simulated accurately. By simulating, the effects of
75
related parameters (the number of STAs, CWmin and frame size)
on performance of the protocol (valid throughput, average delay
and the fairness of upload and download throughput) were
analyzed and got the optimist values of the CWmin.
Xin Li
Louisiana State Univ.
Polygonal meshes are the most popular representation scheme for
3D surfaces in computer graphics. Polygonal meshes usually have
topological and/or geometric noises during their scanning and
collection steps. Many geometric computing and manipulation
operations need to be performed on clean meshes. Therefore,
topological noises on polygonal meshes need to be removed in a
preprocessing step, which is called topology denoise. We classify a
few popular topology denoise technologies and analyze their
properties.
FrA 1.4
A Vertical Handover Scheme from WMAN to WLAN by Taking into
Account the Maximum Available Resource, pp. 1373-1378.
Hsiu-Lang Wang
National Chung-Hsing Univ.
Shang-Juh Kao
National Chung-Hsing Univ.
In a heterogeneous wireless network environment, the end users
are expected to get more bandwidth from WLAN, other than from
WMAN, for real time applications. However, adopting traditional
Received Signal Strength (RSS) based approach could be
inadequate for vertical handover. When WLAN is within the
coverage of a WMAN Base Station (BS), an associating Mobile
Node (MN) can hardly connect to a WLAN Access Point (AP) due
to the default high handover triggering threshold. On the other
hand, without knowing the utilization information of scanned APs,
once the MN handover to a busy AP by detecting a better signal, it
may suffer from bandwidth contention. In this paper, we propose
an efficient handover scheme, from WMAN to WLAN, to make use
of the received signal to interference and noise ratio and the
information about back-haul bandwidth for the criteria to trigger
a handover. The time to start a handover is determined by
considering the variations of data rate as the MN moves and the
most suitable target AP is selected according to its maximum
available bandwidth. The simulation results show that the MN
consistently has a better throughput with the proposed scheme, as
compared with the RSS-based vertical handover scheme. And
among all candidates APs, the MN has the minimum packet delay
with the selected AP association.
FrA 1.8
Detecting Frame Duplication Based on Spatial and Temporal
Analyses, pp. 1396-1399.
Guoshiang Lin
Da-Yeh Univ.
Jiefan Chang
Da-Yeh Univ.
Chenghung Chuang
Asia Univ.
A passive scheme is developed to achieve frame du-plication
detection for videos in the paper. The proposed scheme is a
coarse-to-fine approach and composed of candidate clip selection,
spatial correlation calculation, and frame duplication
classification. To screen duplicated candidates in the temporal
domain, the histogram differ-ence of two adjacent frames in RGB
color space is adopted. To evaluate the similarity of image content,
a block-based algorithm is used to measure spatial correlation of
each corresponding frame between the query clip and the
candidate one. Based on the spatial and temporal analyses in the
temporal and spatial domains, we can localize the duplicated clips.
The experimental results show that our scheme can not only
detect but also localize duplicated clips well. In addition, the
proposed scheme outperforms an existing method in terms of
false alarm, missed detection, and accuracy.
FrA 1.5
APlag: A Plagiarism Checker for Arabic Texts, pp. 1379-1383.
Mohamed El Bachir Menai
King Saud Univ.
Manar Bagais
King Saud Univ.
Plagiarism is a serious problem, especially in academia and
education. Detecting it is a challenging task, particularly in natural
language texts. Many plagiarism detection tools have been
developed for diverse natural languages, mainly English.
Language-independent tools exist as well, but are considered as
too restrictive as they usually do not consider specific language
features. In this paper, we introduce APlag, a new plagiarism
detection tool for Arabic texts, based on a logical representation of
a document as paragraphs, sentences, and words, and new
heuristics for text comparison. We describe its main attributes
and present the results of some experiments conducted on a
dummy test set. We demonstrate its effectiveness by comparing its
performance to that of APD, a plagiarism detection tool for Arabic.
Overall, preliminary results show that APlag significantly
improves the results obtained by APD in terms of recall and
precision metrics.
FrA 1.9
Design of Representaiton Scheme towards Better Image Search,
pp. 1400-1403.
Shikui Wei
Beijing Jiaotong Univ.
Yao Zhao
Beijing Jiaotong Univ.
Zhenfeng Zhu
Beijing Jiaotong Univ.
Recently, Bag-of-Words(BoW) model has been widely used for
feature representation in multimedia search area due to its
simpli?cation and effectiveness. While various variants of
BoWmodels have been developed to improve the discriminative
cabability, less efforts have been paid on discovering the working
mechanism underlying them. In this paper, we systematically
investigate the impact of various factors in a quantitive manner,
and discover how to improve the image search by jointly
optimizing these factors. Subsequently, a rational, which states the
rule of factor optimization, is proposed on the basis of the
experiments on descriptor matching and used to guide the design
of better image search systems. To validate the correctness of the
proposed rational, a BoW-based image search system, which
consists of image database indexing and searching components, is
developed for testing. The comprehensive experiments
demonstrate that it is beneficial to employ the proposed rational
to develop a better image search system.
FrA 1.6
A FPGA Based Digital Design Training Platform, pp. 1384-1389.
M.Serdar BASCIL
Sakarya Univ.
Irfan YAZICI
Sakarya Univ.
Feyzullah TEMURTAS
Bozok Univ.
The role of laboratories are very important in engineering
education. In this paper FPGA based digital design training
platform was designed for Electrical & Electronics Engineering
undergraduate students. Training platform interface was created
at Visual C# program. The system combines the hardware and
software and students access to both software and hardware tools
to practice, implement and test their designs in the laboratory
environment. The main purpose of the system is to minimize the
losing and damaging TTL components used in laboratory
environment, to increase the student’s hardware and software
abilities and creative senses.
FrA 1.10
Robust LMI Based Control of Wheeled Mobile Robots, pp.
1404-1409.
A.Dolly Mary
National Inst. of Tech., India
This paper is concerned with the robust H-infinity (H∞) control of
Wheeled Mobile Robots(WMR) by LMI approach. H∞ differs from
the classical control approach in that the controller stabilizes the
system irrespective of the exogenous inputs (disturbances &
noise) affecting the system and the unmodelled dynamics. The H∞
constraints can be expressed as linear matrix inequalities via
bounded real lemma. The LMI approach is advantageous over the
Riccati equations approach because of a few reasons cited. It is
applicable to all plants without restrictions on infinite or pure
imaginary invariant zeros. The approach yields a finite
dimensional parameterization of all H∞ controllers. In this
proposed work the LMI approach towards robust H∞ control is
applied to the control of Wheeled Mobile Robots(WMR). WMR is a
multi input multi output system which finds applications in
tedious tasks like nuclear waste disposal, explorations, mines etc.
This approach yields a finite dimensional controller as compared
FrA 1.7
A Survey of Topology Denoise Technologies, pp. 1390-1395.
Zhang Ning
Xiamen Univ.
Ye Tengfei
Xiamen Univ.
Wuyi Yu
Xiamen Univ.
Maoqing Li
Xiamen Univ.
76
to other H∞ control methods.
language assessment, for there are several areas where we are still
in need of better understanding the computerized language
assessment.
FrA 1.11
An Efficient Uplink Scheduling Mechanism with enabling
Multi-device Transmission and Maximum Latency Fulfillment in
IEEE 802.16j Networks, pp. 1410-1415.
Fumin Chang
Chaoyang Univ. of Tech.
I-Ping Hsieh
National Chung-Hsing Univ.
Shang-Juh Kao
National Chung-Hsing Univ.
IEEE 802.16j spreads out the coverage of the WiMAX network via
extending the signal transmission by using the relay technology.
To take the advantage of relaying in IEEE 802.16j network, an
efficient schedule with quality of service (QoS) provision for
multiple link transmissions is necessary, especially when link
interference exists. In this paper, we propose an uplink scheduling
mechanism with enabling Multi-device Transmission and
Maximum Latency Fulfillment (MT-MLF). In the mechanism of
MT-MLF, an interference detection mechanism is first carried out,
then a resource distribution algorithm and a dynamic frame
adjustment method are developed. Through the adoption of the
proposed scheduler, both the uplink resource utilization and the
requirement of real time applications can be better enhanced.
Two simulation experiments were conducted with different levels
of interference. The results demonstrate that under a fixed QoS
type of connections, when the total number of connections goes
up to 360 and 420 and the maximum latency violation rate
approaches 20%, the average uplink transmission rate of MT-MLF
can achieve 6.67Mbps and 7.92Mbps, which apparently
outperform 4Mbps and 3.91Mbps as compared with regular relay
scheduling schemes.
FrA 2.3
The Outline Plan of Beijing Open Learning System, pp. 1429-1432.
Ma Rong
Beijing open Univ.
Now, Beijing Radio and Television University (abbreviated as
BRTVU) undertakes the task of building and running Beijing Open
University. To achieve the goals well, BRTVU has design and
developed Beijing Open Learning System. The system provides
one-stop services around students and their leaning process. The
system pays attention to learning activities, and assures
educational quality through the process controlling and
evaluation of activity effect. This article describes the system’s
building background, design objectives, principles and functions
of structures.
FrA 2.4
Teaching Data Structures and Software Architecture while
Constructing Curriculum Platform, pp. 1433-1437.
Min Cao
Shanghai Univ.
Zhen Cao
Shanghai Univ.
Data Structures and Software Architecture are two important
courses of the subjects allied to computer science. Both of them
are abstract and need practical experience to understand well.
This paper discusses how to apply the different knowledge to the
teaching process of Data Structures and Software Architecture by
constructing the curriculum platform, which is a web instructional
system. An optimal algorithm for generating authority tree
dynamically applied to the developed web system is proposed.
The knowledge hidden in the details of the algorithm is applied to
the teaching. It is meant to explore a new method of teaching, rich
the teaching content, grow the students’ interest of curricula, and
improve their ability of practice.
FrA 1.12
Topic-special Information Extraction of Online Store, pp.
1416-1420.
Zheng Siting
Xiamen Univ.
Zhang Ning
Xiamen Univ.
Yang Fan
Xiamen Univ.
Taobao,witch is the most representive transaction platform in C2C
industry in China.It is taken as example ,this paper designed the
estracting flow of online store's information automatically,and
realized automatic online store's information collection and its
structured output by Python language.
FrA 2.5
The Design and Implementation of Routing and Switching
Platform and Applications in an Experiment Teaching, pp.
1438-1441.
Deng Beixing
Tsinghua Univ.
Xu Shuzhen
Tsinghua Univ.
In order to meet the needs for the curriculum reform of Electronic
Engineering Department of Tsinghua University, we constructed
routing and switching experimental platform using the control
network technology based on ZTE's switches and three-layer
routers. The platform supports the computer network experiment
course and practice in open extracurricular for undergraduate.
FrA 2
Computer Education
FrA 2.1
The Research of Construction of the Diversified Training Mode to
Graduate Students, pp. 1421-1424.
Wang Chunzhi
Hubei Univ. of Tech.
Hong Li
Hubei Univ. of Tech.
Jiang Wei
Hubei Univ. of Tech.
In order to adapt the gradual diversification, the diversification of
training mode to graduate students is formed. Meanwhile, in order
to satisfy the need of people’s study and creation in modern
society, the education to the graduates is presenting the
development tendencies of the internationalization, the
diversification, the modernization, and the individuation.
FrA 2.6
The Practice and Probe about Training Mode in Master of
Engineering of Computer Science, pp. 1442-1444.
Shiping Lin
Fuzhou Univ.
This paper reviews and concludes the result on Fuzhou University
how to carries out the innovative training model on the
engineering postgraduate students of computer technology from
the course of system design and construction, the practice design
and implement as well as the model and evaluation about thesis.
FrA 2.2
Computer-Assisted Formative Assessment in Language
Classrooms: Focus and Forms, pp. 1425-1428.
Cheng Ke
Beijing Union Univ.
Wang Yingwei
Beijing Union Univ.
Hou Xiaoli
Beijing Union Univ.
Yang Yajun
Beijing Union Univ.
In computerized language assessment, formative assessment
presently turns out to be one of the major areas of use. The saying
paper is intended to give a brief review of certain issues involving
application of computer-assisted formative assessment (CAFA) in
the field of Language Assessment in terms of (1) historical
perspectives embodied in development from computer-assisted
assessment (CAA) to computer-assisted language assessment
(CALA) then to internet or web-assisted assessment; (2)
effectiveness issues in computerized formative assessment in the
area of Language E-Assessment; (3) Forms and tools (E-work and
E-portfolio) existing for us to employ this innovative approach for
FrA 2.7
Higher Learning Institution - Industry Collaboration: A Necessity
to Improve Teaching and Learning Process, pp. 1445-1449.
Kalaimagal Ramakrishnan
Univ. Malaya
Norizan Mohd Yasin
Univ. Malaya
The purpose of this paper is to improve the understanding of
Higher Learning Institution and industry collaboration to improve
the teaching and learning process. The paper is based upon a
quantitative and qualitative study. It is produced after gathering
feedback through questionnaires from eighty-three employers
throughout Malaysia for the ICT graduates. A group of employers
were also interviewed to gather their in-depth view on the
importance and benefits of Higher Learning Institution - industry
collaboration, the initiatives, techniques and approaches that
could be designed to improve the teaching and learning process.
Results of the questionnaires and interviewing session with
77
employers illustrate that, with an active engagement with
Industry, Higher Learning Institution could increase the efficiency,
effectiveness, and quality of graduates whom can satisfy the
employers’ need in the entry level of employability in their future.
1460-1462.
Yu Zheng
Shanghai Univ.
Jianquan Dong
Shanghai Univ.
This paper analyzed the curriculum teaching situation in the
database principles of undergraduate education, summarized of a
number of issues in the teaching practice. Aimed to solve these
problems, and the characteristics of the course, the content of
teaching, the perspectives of optimization of teaching contents
and reform of teaching methods were discussed.
FrA 2.8
Application of Mini Case Study in Computer Networks, pp.
1450-1453.
Ganlin Wang
Shanghai Ocean Univ.
Runyuan Yin
Shanghai Ocean Univ.
Xiaohua Yuan
Shanghai Ocean Univ.
For the abstract concepts and complex theories in Computer
Networks, this paper introduced a mini case study approach as
teaching aids in the course of Computer Networks. A virtual
network experiment environment for mini cases was built with
the software of VMware, and the cases were analyzed by the
Wireshark. The cases of simple network communication and TCP
protocol analysis were used to demonstrate the application of the
approach. Through integrating the theory and practice, it helps
students master the fundamental principles of Computer
Networks.
FrA 2.11
Research on Teaching Reform of Computer Science and
Technology Speciality in General Education, pp. 1463-1467.
Shen Yunfu
Shanghai Univ.
Dong Xiaowen
Shanghai Univ.
Recently, undergraduate enrollment as a breakthrough of the
teaching reform based on the general education is becoming a hot
issue. In this paper, under the background of this kind enrollment
mode in Shanghai University and the general education of
cultivating "comprehensive human development", the curriculum
and teaching reform for the specialty of computer science and
technology are discussed in detail. We analyze and study the
curriculum system, knowledge fields, training objectives, teaching
contents, etc, for the first year and later three years based on the
general education, and propose some basic principles about
curriculum setting and main course lines. Then we propose the
implementation and approaches of the training program for
undergraduates in this specialty to enable students to adapt to the
society and to meet social needs better.
FrA 2.9
Screen Education: Contemporary University Students’ Contexts
and Problems of Media Literacy, pp. 1454-1459.
Wu Zhibin
Nanjing Univ. of Aeronautics & Astronautics
Jiang Zhaojun
Nanjing Univ. of Aeronautics & Astronautics
The purpose of this study is to investigate how Chinese university
students efficiently understand and utilize the screen media,
especially when the mass media have been the basic approach to
gaining information for them. In order to give a full understanding
of the issue of media literacy education for Chinese college
students, three questions are going to be discussed in this article
by using the historical analysis method. The first question is why
the screen media have become an education problem? Through
looking back the evolution of screen media and the development
of media literacy education, it is found that media literacy is only
one of education problems in a certain context, which is
concerned by some countries. The second problem is what the
context and the problem of media literacy education for Chinese
college students is? Although the contexts and problems of media
literacy education are different from each other in British, Canada,
America and Japan, the study of media education in these four
countries starts from its real context, and based on which some
issues about screen education are raised and studied and
solutions ar e proposed. The context where China carries out the
media literacy education is the public’s general rejection of the
secreen media culture arising from the lack of the media literacy
education. The third problem is how to respond to theoretically
and deal with in practice Chinese current college students’ media
literacy edacation? We need frist set up the course of media
literacy education in universities as soon as possible, and
complete two changes in order to strengthern the theoretical and
practice response. One is the change from the traditional concept
of education to the inspirational and participatory concept, and
the other change is from the education mode of teaching
knowledge to the mode of suportive learning. This can promote
the college students’healthy development in using screen media,
so as to achieve the harmony between the man and screen.
FrA 2.12
ABMT-An Automated Support Based Rule Mining Technique , pp.
1468-1473.
Ashwin C S
Information Technology, India
Dinesh Kumar J
Information Technology, India
Gugan L
Information Technology, India
Harihar M V
Information Technology, India
Kousik M
Information Technology, India
Vijay Krishnan K
Information Technology, India
Data mining mechanisms have widely been applied in various
business and manufacturing companies across many sectors. Data
mining is defined as “the nontrivial extraction of implicit,
previously unknown, and potentially useful information from
data”. Data mining encompasses a number of different technical
approaches such as clustering, data summarization, learning
classification rules, finding dependency networks, analyzing
changes and detecting anomalies. Mining association rules from a
large database of business data, such as transaction records forms
the area of data mining. It discovers the hidden, interesting
relationship between the items in the database based on the
support and confidence thresholds. A high-support constraint
avoids the combinatorial explosion in discovering frequent item
sets, but at the expense of missing interesting patterns of low
support. To specify the most appropriate support constraint,
either uniform or non-uniform, to discover interesting patterns
without suffering from combinatorial explosion and missing some
low-support but perceptive rules. In existing system, the
specification is derived from frequent 2 item sets. It may miss
some interesting rules composed of more than 2 items. In the
proposed system, the specification is derived for every level of
item sets using cumulative support and CLS.
FrA 2.10
Teaching Reform and Practice of Database Principles, pp.
78
Author Index
79
This Page Intentionally Left Blank.
80
A
A.Dolly Mary.................................................... FrA 1.10
Abdullah Mansoor........................................... ThC 4.7
Abul L. Haque..................................................ThC 5.57
Ahmad Faraahi................................................ThC 11.4
Aihua Zhang.................................................... ThC 5.33
Ajay Indian.......................................................ThC 5.8
Amin Khodabandeh Amiri................................ThC 5.21
An Shiqi........................................................... MoA 4.2
Anam Zaman...................................................ThC 4.7
Ao Ming........................................................... ThC 7.3
Ashwin C S......................................................FrA 2.12
1404
531
788
1115
691
588
638
83
531
884
1468
B
Bao Haitao.......................................................ThC 3.28
.........................................................................ThC 3.29
Baocong Jiao...................................................ThA 1.4
Baoshe Yuan................................................... ThC 11.9
Beizhan Wang................................................. ThC 13.10
Bi Huiying........................................................ ThC 5.51
Bi Tingyan........................................................ThC 5.59
.........................................................................ThC 5.58
Bin Liu..............................................................ThC 3.31
Bing Xue.......................................................... ThC 3.31
Bingjun Li.........................................................ThC 1.21
Binsheng Liu....................................................ThC 13.1
Bo Fu............................................................... ThC 5.16
Bo Jiang...........................................................ThC 4.4
Bo Jinli............................................................. MoA 2.3
Boqin Liu..........................................................ThC 5.12
456
460
180
1142
1340
766
799
794
468
468
273
1303
619
517
32
602
C
Cai Changqing.................................................ThC 7.3
........................................................................ ThC 3.8
........................................................................ ThC 7.2
........................................................................ ThC 7.10
........................................................................ ThC 12.8
........................................................................ ThC 10.3
Cai Ying...........................................................ThC 5.53
Caidan Zhao....................................................ThC 10.12
Caidong Zhang................................................ThC 8.3
Chakarida Nukoolkit........................................ ThA 1.3
........................................................................ ThC 1.6
Changlin Liu.................................................... ThC 11.13
Changlong Jiang............................................. ThC 8.3
Changqing Cai.................................................MoA 3.5
........................................................................ ThC 2.1
Changzeng Wei...............................................ThC 12.1
Charng-Tzer Harn........................................... ThC 5.49
Chen Chen...................................................... MoA 2.1
........................................................................ ThC 8.1
Chen Hao........................................................ ThC 6.7
Chen Hongwei.................................................ThC 1.13
Chen Huahui................................................... ThC 8.7
Chen Huihuang............................................... ThC 10.11
Chen Lin.......................................................... ThC 1.5
Chen Lina........................................................ ThC 1.4
Chen Xinbo......................................................ThC 8.2
Chen Xiumin....................................................ThC 1.20
Chen Yanjie.....................................................MoA 3.2
Chen Yao........................................................ ThC 5.18
Chen Yaodong................................................ ThC 1.28
Cheng Ke........................................................ FrA 2.2
Cheng Liu........................................................ ThC 13.7
Cheng Wang................................................... ThC 2.7
........................................................................ ThC 11.23
........................................................................ ThC 3.23
........................................................................ ThC 7.11
Chenghung Chuang........................................ FrA 1.8
Chengshi Gao................................................. ThC 12.3
Chengyin Zhang.............................................. ThC 5.1
Chenyang Cui..................................................ThC 2.2
Chenyang Yan.................................................ThC 9.11
Chien-Yun Dai................................................. ThC 5.49
........................................................................ MoA 6.4
Chu Hongrui.................................................... ThC 13.2
884
375
880
915
1251
1054
772
1099
946
176
205
1159
946
70
310
1223
758
24
938
847
236
965
1094
199
195
942
269
56
627
305
1425
1327
333
1208
437
919
1396
1231
557
313
1013
758
149
1307
Chung-Ho Wang..............................................FrA 1.1
Chunhua Xiao..................................................FrA 1.3
Chunlan Wang.................................................MoA 3.4
........................................................................ MoA 1.4
Chunlin Wang..................................................ThC 3.10
Chunya Ni........................................................ThC 1.23
Chunyang Qiu................................................. ThC 12.13
Chunying Zhang.............................................. ThC 5.41
........................................................................ ThC 12.10
Chunyu Liu...................................................... ThC 3.21
Chunzhi Wang.................................................ThC 1.13
........................................................................ ThC 9.15
Cleve Yeo Keng Lin.........................................ThC 9.15
Cristiana Brunelli............................................. ThC 5.36
1355
1367
66
16
384
281
1270
726
1260
428
236
1033
1033
706
D
Dachao Hu...................................................... ThC 3.15
Dalei Song.......................................................ThC 3.31
Dan Guo.......................................................... ThC 5.55
Dan Wei...........................................................ThC 1.9
Dancheng Li.................................................... ThC 13.1
........................................................................ ThC 13.7
Dandan Yang.................................................. ThC 1.3
Daofeng Zhou..................................................ThC 7.6
Deng Beixing................................................... FrA 2.5
Deng Su.......................................................... ThC 1.4
Deng Yiyuan....................................................ThC 7.1
Dengwen Gan................................................. MoA 1.4
Dexiong Li....................................................... ThC 12.4
Deyun Zhou.....................................................ThC 1.2
Dinesh Kumar J...............................................FrA 2.12
Ding Hui...........................................................ThC 3.1
Dong Xiaowen................................................. FrA 2.11
Dong Yihong....................................................ThC 8.7
Dongsheng Yin................................................ThC 10.9
........................................................................ ThC 4.10
Dongsong Ban.................................................ThC 4.9
Dr.Prakash Raghavendra................................ThC 10.5
Du Bo.............................................................. ThC 3.8
Du Jingjing.......................................................ThC 11.12
........................................................................ ThC 3.36
Du Li................................................................ ThC 2.6
Du Xiaoning.....................................................ThC 11.1
Duan Chongjiang.............................................ThC 13.6
402
468
779
218
1303
1327
191
897
1438
195
876
16
1235
189
1468
348
1463
965
1085
547
541
1063
375
1154
492
330
1103
1323
E
E.Jeevitha........................................................ThC 4.1
81
504
F
Fan Qinman......................................................ThC 3.27
..........................................................................ThC 3.25
Fan Yabin......................................................... ThC 11.1
Fan Yang.......................................................... ThC 1.5
Fangjie Yu........................................................ ThC 3.31
Fangqi Deng..................................................... MoA 3.4
Farooq Ahmed..................................................ThC 4.7
Feng Hanrong...................................................MoA 1.5
Feng Liu............................................................ThC 11.16
Feng Shu.......................................................... ThC 3.2
Feng Yang........................................................ ThC 5.13
Feyzullah TEMURTAS..................................... FrA 1.6
Floriana Falcinelli............................................. ThC 5.36
Fumin Chang.................................................... ThC 10.6
..........................................................................FrA 1.11
452
445
1103
199
468
66
531
19
1175
351
605
1384
706
1069
1410
G
Ganlin Wang....................................................FrA 2.8
Gao Kun.......................................................... ThC 9.4
Gaurav Agarwal...............................................ThC 5.8
Ge Yan............................................................ ThC 1.23
Ge Yu.............................................................. ThC 5.38
Genchang Zhao...............................................ThC 5.29
Geng Yan........................................................ ThC 1.10
Gu Hao............................................................ ThC 3.35
Guan Xiaohui...................................................ThC 5.25
Guan Zhiyan.................................................... ThC 10.4
Guangquan Zhang...........................................ThC 11.6
.........................................................................ThC 11.8
1450
988
588
281
715
671
222
489
657
1058
1127
1136
.........................................................................ThC 11.13
.........................................................................ThC 11.14
.........................................................................ThC 13.5
.........................................................................ThC 5.35
Guangtian Zhou...............................................ThC 5.13
Guanlin Wang..................................................ThC 7.14
Gugan L...........................................................FrA 2.12
Guofeng Zhu....................................................ThC 2.2
Guoshiang Lin................................................. FrA 1.8
1159
1165
1319
703
605
933
1468
313
1396
H
Haiguang Fang................................................ ThA 1.4
Haihe Shi......................................................... ThC 5.19
Hailing Xiong................................................... MoA 5.1
Haiqiang Li.......................................................ThC 12.9
Haishan Chen..................................................ThC 13.10
Haiyan Li..........................................................ThC 13.8
Haiyin Zhang................................................... ThC 6.1
Han Lin............................................................ ThC 5.52
Han Tan...........................................................ThC 5.1
Han Yan...........................................................ThC 2.9
Han Yueping....................................................ThC 2.9
Han-Jung Chueh............................................. ThC 10.6
Hanrong Chen................................................. MoA 5.1
.........................................................................ThC 5.46
.........................................................................ThC 5.28
Harihar M V......................................................FrA 2.12
He Jun............................................................. ThC 3.24
He Qiusheng....................................................ThC 3.26
Hema Banati....................................................ThC 9.14
Hong Yu...........................................................ThC 12.14
Hong Duan...................................................... ThC 6.4
Hong Li............................................................ FrA 2.1
.........................................................................ThC 1.13
Hong Zhuang...................................................ThC 8.6
Hongyun Wang................................................ThA 1.4
Hou Xiaoli........................................................ FrA 2.2
Hou Yunbin......................................................ThC 7.4
Hsinchiu Chang............................................... ThC 2.5
Hsiu-Lang Wang..............................................FrA 1.4
Hu Dongping....................................................ThC 2.8
Hu Hongping....................................................ThC 2.10
Hu Quan.......................................................... ThC 11.10
Hu Ruimin........................................................ThC 6.6
.........................................................................ThC 6.7
Hu Shuzheng...................................................ThC 3.22
Hu Xianwu....................................................... ThC 11.21
Hu Xiaoqiang................................................... ThC 12.2
Hu Yahong.......................................................ThC 5.63
Hu Yu...............................................................MoA 1.3
Huang Chunman............................................. ThC 3.34
Huang Hongbin................................................ThC 1.4
Huang Jun....................................................... MoA 6.6
Huang Lingli.....................................................MoA 6.6
Huang Rui........................................................ThC 9.6
Huang Weimin................................................. MoA 1.3
Huang Xingyun................................................ ThC 9.8
.........................................................................ThC 5.9
Huang Zhigao.................................................. ThC 2.3
.........................................................................ThC 4.2
Huanhuan Xu...................................................ThC 6.12
Huanzhong Li.................................................. ThC 4.9
Huapeng Chang.............................................. ThC 9.15
Hui Xia............................................................. ThC 7.14
Huijuan Qi........................................................ThC 12.4
Huiling Wang................................................... ThC 3.6
Hung Chau Kim............................................... ThC 5.34
Hungpeng Lee................................................. ThC 2.5
180
631
111
1255
1340
1331
821
769
557
340
340
1069
111
748
668
1468
441
449
1027
1273
835
1421
236
960
180
1425
888
324
1373
337
344
1147
843
847
433
1198
1227
815
12
483
195
158
158
995
12
1003
592
316
508
871
541
1033
933
1235
365
697
324
I
I-Ping Hsieh.....................................................FrA 1.11
Irfan YAZICI.....................................................FrA 1.6
1410
1384
J
Ji Li.................................................................. ThC 9.2
Ji Keyan...........................................................ThC 7.8
Ji Pengwei....................................................... ThC 7.2
Jian Zhou.........................................................ThC 2.2
978
904
880
313
82
Jianan Liang.................................................... ThC 4.10
Jianbin Wu.......................................................ThC 11.5
Jianchang Liu.................................................. MoA 5.4
Jianfeng An..................................................... ThC 5.50
Jianfeng Wu.................................................... ThC 11.8
........................................................................ ThC 11.14
Jiang Daiyou....................................................ThC 5.61
Jiang Fan.........................................................ThC 3.34
........................................................................ ThC 12.15
Jiang Huixian...................................................ThC 12.7
Jiang Li............................................................ ThC 5.63
Jiang Wei.........................................................FrA 2.1
Jiang Yu.......................................................... ThC 5.47
Jiang Zhaojun..................................................FrA 2.9
........................................................................ ThC 5.23
Jiangbo Qian................................................... ThC 8.5
Jiangman Xu................................................... MoA 5.2
........................................................................ MoA 5.3
Jiangui Wu.......................................................ThC 6.4
Jianguo Ma......................................................ThC 2.4
Jianhong Zhang...............................................ThC 2.1
Jianhua Jiang.................................................. ThC 12.13
Jianjing Li........................................................ ThC 5.41
........................................................................ ThC 12.10
Jianlian Li........................................................ MoA 3.4
Jianping Li....................................................... ThC 5.48
Jianping Zeng..................................................ThC 7.13
Jianquan Dong................................................ FrA 2.10
Jianxi Fan........................................................ ThC 3.7
Jianxia Chen....................................................ThC 9.15
Jie Deng.......................................................... ThC 5.2
Jie Hu.............................................................. ThC 9.17
Jie Wu............................................................. ThC 1.19
........................................................................ ThC 1.22
Jiefan Chang................................................... FrA 1.8
Jiexiao Yu........................................................ThC 4.6
Jihan Zhu.........................................................ThC 11.6
........................................................................ ThC 11.8
Jihong Zhu.......................................................ThC 7.14
Jihua Ye.......................................................... MoA 1.4
........................................................................ MoA 3.4
Jin Wang......................................................... ThC 11.8
Jin Xuebo........................................................ ThC 11.12
Jing Cao.......................................................... ThC 12.3
Jing Chunfeng................................................. MoA 2.5
Jinghu Pan...................................................... ThC 3.21
Jinjun Hu......................................................... ThC 2.4
Jin-Jung Jang.................................................. MoA 6.4
Jinzhu Hu........................................................ ThC 11.10
Jiquan Yin........................................................ThC 1.15
Jiwen Yang......................................................ThC 3.7
Joshua D Freeman..........................................ThC 10.8
Ju Song........................................................... ThC 6.1
Jun Li...............................................................ThC 5.46
........................................................................ MoA 5.1
Jun Tong......................................................... ThC 3.9
Jun Zheng....................................................... ThC 8.4
Junling Hu....................................................... ThC 3.15
Junmei He....................................................... ThC 5.12
Junqin Wu....................................................... ThC 2.6
Junshen Chen................................................. MoA 1.2
Junyan Luo......................................................ThC 5.45
Junyong Luo....................................................ThC 1.11
547
1123
126
763
1136
1165
808
483
1277
1246
815
1421
751
1454
649
955
114
120
835
320
310
1270
726
1260
66
755
928
1460
370
1033
562
1041
265
278
1396
525
1127
1136
933
16
66
1136
1154
1231
38
428
320
149
1147
245
370
1080
821
748
111
380
950
402
602
330
6
744
226
K
Kai Cui.............................................................ThC 10.9
Kai Li............................................................... ThC 6.8
Kai Tan............................................................ ThC 1.16
Kaihua Liu....................................................... ThC 4.6
........................................................................ ThC 1.23
Kalaimagal Ramakrishnan.............................. FrA 2.7
Kan Zhang.......................................................ThC 11.6
Karthik V Bellur................................................ThC 10.5
Kehe Cai..........................................................ThC 1.14
Ken Chen........................................................ ThC 5.30
........................................................................ ThC 5.26
Kousik M..........................................................FrA 2.12
Krupal M.......................................................... ThC 10.5
1085
852
250
525
281
1445
1127
1063
240
675
660
1468
1063
Kun Wu............................................................ThC 6.1
Kun Zhang.......................................................ThC 1.2
Kuowei Lee......................................................ThA 1.1
L
Li Cuizhi...........................................................MoA 1.6
Li Dancheng.................................................... ThC 13.9
Li Gengming.................................................... ThC 3.4
Li Hang............................................................ ThC 5.47
Li Hua.............................................................. ThC 13.3
Li Kongwen......................................................ThC 6.9
Li Li..................................................................ThC 4.3
Li Maoqing.......................................................ThC 8.8
Li Ning............................................................. MoA 2.6
Li Ruihong....................................................... ThC 2.9
........................................................................ ThC 2.10
Li Suicheng......................................................ThC 9.6
Li Suxun.......................................................... ThC 4.11
Li Wang........................................................... ThC 5.60
Li Xiaoli............................................................MoA 2.5
Li Xiaolong.......................................................MoA 3.2
Li Xiaonan....................................................... ThC 12.11
Li Xingnan....................................................... ThC 5.40
Li Xuan............................................................ FrA 1.2
Li Yizhen..........................................................MoA 2.7
........................................................................ ThC 3.19
Li Yumei.......................................................... ThC 9.16
Li Zhang.......................................................... ThC 11.19
Li Zhiping.........................................................ThC 9.9
........................................................................ ThC 1.8
Li Zhongming...................................................ThC 6.6
........................................................................ ThC 6.7
Liang Likai....................................................... ThC 5.27
Liang Tao........................................................ ThC 2.2
Liang Zhisheng................................................ThC 3.5
........................................................................ ThC 9.4
........................................................................ ThC 6.2
Liangping Zhang..............................................ThC 3.20
Liao Hao.......................................................... ThC 7.1
Liao Kangli.......................................................ThC 8.7
Lili Zhang.........................................................ThC 3.12
Limin Shao...................................................... ThC 1.16
Lin Dongmei.................................................... MoA 6.3
Lin Guangfa.....................................................ThC 12.7
Lin Jian............................................................ ThC 11.24
Lin Jianbing..................................................... ThC 11.3
Lin Jing............................................................ ThC 5.54
Lin Ling............................................................ThC 3.19
Lin Shan.......................................................... ThC 5.10
Lina Liu............................................................ThC 12.4
Lina Yuan........................................................ ThC 12.20
Ling He............................................................ ThC 3.30
........................................................................ ThC 1.12
Ling Lin............................................................MoA 2.7
Ling Wang....................................................... ThC 12.20
Ling Xing......................................................... ThC 2.4
Lingbing Tao....................................................ThC 8.6
Linghong Lv.....................................................ThC 8.4
Liping Yin.........................................................ThC 5.64
Lisang Liu........................................................ ThC 1.24
Liting Hu.......................................................... ThC 10.12
Liu Baobin....................................................... ThC 5.11
Liu Bin............................................................. ThC 3.26
Liu Binsheng....................................................ThC 13.9
Liu Cheng........................................................ ThC 13.9
Liu Chengxia................................................... ThC 5.53
Liu Jia.............................................................. ThC 12.11
Liu Jiangxia..................................................... ThC 11.20
Liu Jianye........................................................ ThC 7.9
Liu Li................................................................ThC 5.59
Liu Min.............................................................ThC 7.4
Liu Nancheng.................................................. ThC 13.10
Liu Qun............................................................ThC 9.12
Liu Ting............................................................ThC 13.11
Liu Wenjie........................................................ThA 1.2
Liu Wenzhi.......................................................ThC 5.3
Liu Wenzhou................................................... ThC 10.3
........................................................................ ThC 7.10
821
189
166
22
1335
358
751
1311
856
512
971
41
340
344
995
552
804
38
56
1264
723
1361
47
420
1037
1189
1006
214
843
847
665
313
361
988
826
425
876
965
391
250
145
1246
1211
1111
776
420
595
1235
1301
464
232
47
1301
320
960
950
817
286
1099
600
449
1335
1335
772
1264
1194
909
799
888
1340
1019
1346
172
568
1054
915
83
........................................................................ ThC 7.3
Liu Xiaochun....................................................ThC 2.8
Liu Yang.......................................................... ThC 12.11
Liu Yuming...................................................... ThC 5.22
Liu Zhaobin......................................................ThC 5.3
Liu Zhiqin.........................................................ThC 5.62
Lixia Cheng..................................................... ThC 7.13
Lixin Wang.......................................................MoA 3.5
Lizhao Liu........................................................ ThC 1.27
Long Zhou....................................................... ThC 4.4
Lu Gang...........................................................ThC 3.19
Lu Li.................................................................ThC 13.5
Lu Yanan......................................................... ThC 11.25
Lu Zhengyu..................................................... MoA 3.3
Luo Delin......................................................... ThC 1.18
Luo Guowei..................................................... ThC 10.2
Luo Linkai........................................................ FrA 1.2
Lv Jiake........................................................... ThC 3.11
884
337
1264
645
568
811
928
70
297
517
420
1319
1217
61
260
1051
1361
386
M
M.Serdar BASCIL............................................ FrA 1.6
Ma Rong.......................................................... FrA 2.3
Ma Zeyun.........................................................ThC 9.7
Manar Bagais.................................................. FrA 1.5
Manting Kao.................................................... ThC 5.49
Maochun Zhou.................................................ThC 8.5
Maoqing Li....................................................... ThC 1.27
.........................................................................FrA 1.7
Maria Banari.................................................... ThC 5.21
Md Tahsin Kabir...............................................ThC 5.57
Mehran Kavand............................................... ThC 11.4
Mei Rong......................................................... ThC 11.13
.........................................................................ThC 13.5
Meijuan Yin......................................................ThC 1.11
Meng Fanrong................................................. ThC 5.5
Mengyi Liu....................................................... ThC 1.14
Miao Kehua..................................................... ThC 1.28
Miao Xiao........................................................ ThC 1.28
Min Cao........................................................... ThC 12.9
.........................................................................FrA 2.4
Min Xu............................................................. ThC 12.16
Ming Hu........................................................... ThC 5.30
Minghai Jiao.................................................... ThC 5.4
.........................................................................ThC 5.44
.........................................................................ThC 5.7
Mingshuang Bi.................................................ThC 7.7
.........................................................................ThC 7.6
Minhua Wu...................................................... ThC 12.19
Mohamed El Bachir Menai.............................. FrA 1.5
Mohammad Tahmid Bari................................. ThC 5.57
Mostafijur Rahman.......................................... ThC 4.5
MR.Meenakshi................................................ ThC 4.1
Muyu Lin.......................................................... ThC 11.2
1384
1429
999
1379
758
955
297
1390
638
788
1115
1159
1319
226
577
240
305
305
1255
1433
1282
675
572
740
584
901
897
1296
1379
788
521
504
1107
N
Naidila Sadashiv..............................................ThC 3.33
Naigao Jin....................................................... ThC 12.14
Narges Yousefnezhad.....................................ThC 5.21
Naufal Alee......................................................ThC 4.5
Nhon Do.......................................................... ThC 5.42
Nhon Do Van...................................................ThC 5.34
Ni Sheng..........................................................ThC 13.4
Norizan Mohd Yasin........................................ FrA 2.7
477
1273
638
521
730
697
1315
1445
O
Ou Huanghai................................................... MoA 6.1
Ou Qizhong..................................................... ThC 9.8
........................................................................ ThC 5.9
.........................................................................ThC 5.39
Ou Xu.............................................................. ThC 3.5
.........................................................................ThC 9.4
.........................................................................ThC 6.2
Ou Yang.......................................................... ThC 3.16
136
1003
592
720
361
988
826
406
P
Pan Hongbing..................................................ThC 4.3
Peiji Shi............................................................ThC 3.21
Peng Hehuan...................................................ThC 9.7
512
428
999
Peng Luo......................................................... ThC 4.6
Peng Zhang..................................................... ThC 1.15
Ping Yan.......................................................... ThC 5.44
.........................................................................ThC 5.7
Pingliao Zhu.....................................................MoA 1.4
Pornchai Mongkolnam.....................................ThC 1.6
Praewphan Chansripiboon.............................. ThC 1.6
.........................................................................ThA 1.3
Praveen Jain....................................................ThC 10.5
Punam Bedi..................................................... ThC 9.14
525
245
740
584
16
205
205
176
1063
1027
Q
Qi Anning.........................................................MoA 4.2
Qi Xinxing........................................................ ThC 5.62
Qi Zhong..........................................................ThC 6.4
Qian Jiangbo................................................... ThC 8.7
Qiang Luo........................................................ ThC 8.6
Qiang Ma......................................................... ThC 2.4
Qiang Wei........................................................ThC 13.1
Qiang Yi...........................................................ThC 5.40
Qianqian Li...................................................... ThC 9.15
Qiaoyun Chen..................................................ThC 5.14
Qin Zhao..........................................................MoA 2.2
Qing Dai...........................................................ThC 12.3
Qing Huang..................................................... ThC 6.11
Qing Li............................................................. ThC 11.11
Qing Ye............................................................ThC 5.4
Qingda Zhou....................................................ThC 1.9
Qingnian Huang.............................................. ThC 5.26
.........................................................................ThC 5.30
Qingqiang Wu..................................................ThC 8.3
Qingshan Jiang................................................ThC 1.9
.........................................................................ThC 13.10
Qiong Cheng................................................... ThC 5.16
Qiu Zhongpan..................................................MoA 5.5
Qiuli Tong........................................................ MoA 4.4
Qiuqi Ruan.......................................................ThC 6.10
Qu Ming........................................................... ThC 3.11
Quan Zou.........................................................ThC 1.5
Quanyou Feng.................................................ThC 4.9
Qunsheng Ruan.............................................. ThC 11.19
83
811
835
965
960
320
1303
723
1033
609
28
1231
866
1151
572
218
660
675
946
218
1340
619
129
95
860
386
199
541
1189
R
R. B Ahmad..................................................... ThC 4.5
Ren Ji.............................................................. ThC 1.1
Ren Zhang.......................................................ThC 3.22
Richa Sharma..................................................ThC 9.14
Richard Watson Todd......................................ThC 1.6
Robert M. Randoy........................................... ThC 5.30
.........................................................................ThC 5.26
Rong Jiang...................................................... ThC 5.26
Rong Li............................................................ ThC 11.24
Rongfang Gao................................................. ThC 12.12
Ruan Ruolin.....................................................ThC 6.7
.........................................................................ThC 6.6
Rui Chen..........................................................MoA 4.1
Runyuan Yin.................................................... FrA 2.8
Ruoxi Wang..................................................... ThC 1.13
521
186
433
1027
205
675
660
660
1211
1267
847
843
78
1450
236
S
S. S. Iyengar....................................................ThC 6.11
S.M Dilip Kumar...............................................ThC 3.33
Saba Zia.......................................................... ThC 4.7
Saeed Paarsa..................................................ThC 11.4
Satita Sopitsirikul............................................. ThA 1.3
Saurabh Singh.................................................ThC 5.8
Shang-Juh Kao................................................FrA 1.11
.........................................................................ThC 10.6
.........................................................................FrA 1.4
Shanzhen Xu................................................... ThC 3.23
.........................................................................ThC 7.11
.........................................................................ThC 2.7
.........................................................................ThC 11.23
Shao Yongni.................................................... MoA 2.5
Shaobing Song................................................ ThC 5.38
Shaoquan Fang............................................... MoA 4.4
Shen Lixia........................................................ThC 9.10
Shen Meie....................................................... ThC 5.53
866
477
531
1115
176
588
1410
1069
1373
437
919
333
1208
38
715
95
1010
772
84
Shen Yunfu......................................................FrA 2.11
Shenbiao Chen................................................ThC 11.14
Sheng Guizhen................................................ThC 12.8
Shengbing Zhang............................................ ThC 5.50
Sheng-Wang Tsai............................................FrA 1.1
Shi Jianghong..................................................ThC 10.11
Shi Shuyuan.................................................... ThC 3.1
Shi Zhenyin......................................................MoA 3.6
Shihai Zhu....................................................... ThC 5.60
Shikui Wei........................................................FrA 1.9
Shiliang Zhang.................................................ThC 11.19
Shiming Zhang................................................ ThC 9.5
Shiping Lin.......................................................FrA 2.6
Shu Gao.......................................................... ThC 7.12
Shuangshuang Zhou....................................... ThC 13.7
Shumei Tseng................................................. ThC 11.17
Shunwang Xiao............................................... ThC 11.16
.........................................................................ThC 11.15
Shunzhi Zhu.................................................... ThC 3.38
Simi S.............................................................. ThC 10.8
Sina Xu............................................................ ThC 7.7
Song Bingxue.................................................. MoA 3.1
Song Guojian...................................................ThC 13.2
Song Jianwei................................................... ThC 11.1
.........................................................................ThC 1.1
Sufang An........................................................ThA 1.4
Sumayya Shiraz.............................................. ThC 4.7
Sun Bo.............................................................ThC 3.24
Sun Jingdong...................................................ThC 12.17
Sun Yanan.......................................................ThC 5.47
Sun Yu.............................................................ThC 1.8
.........................................................................ThC 9.9
1463
1165
1251
763
1355
1094
348
74
804
1400
1189
991
1442
923
1327
1180
1175
1170
499
1080
901
52
1307
1103
186
180
531
441
1286
751
214
1006
T
Tang Guoxiang................................................ ThC 3.11
.........................................................................ThC 5.32
Tang Xuemei................................................... ThC 12.5
Tang Zhong..................................................... ThC 3.5
.........................................................................ThC 13.4
Tangtang Xie................................................... ThC 5.46
.........................................................................MoA 5.1
Tangtang Xie................................................... ThC 5.28
Taoshen Li.......................................................ThC 10.7
Thu_Le Pham.................................................. ThC 5.42
Tian Xia........................................................... ThC 1.7
Tianhua Zhang................................................ ThC 1.27
Tianmao Xu..................................................... ThC 6.1
Tiezheng Sun.................................................. ThC 12.13
Tingting Zhu.....................................................ThC 3.12
Tong Biao........................................................ MoA 6.2
Tong Qiang......................................................ThC 5.27
Tongcheng Huang........................................... ThC 5.64
Tsungli Wang...................................................ThC 12.18
Tzu-Hao Lee....................................................MoA 6.4
386
686
1239
361
1315
748
111
668
1075
730
210
297
821
1270
391
141
665
817
1291
149
V
V.K.G. Kalaiselvi..............................................ThC 4.1
Van Ho Long....................................................ThC 5.34
Vijay Krishnan K.............................................. FrA 2.12
504
697
1468
W
Wan Liang........................................................ ThC 11.18
Wan-Fei Chen.................................................. ThC 5.49
Wang Chunzhi.................................................. FrA 2.1
Wang Dengcai.................................................. ThC 1.20
Wang Huiting.................................................... ThC 9.7
Wang Jianbo.....................................................ThC 8.2
Wang Jianzhen.................................................ThC 10.4
Wang Jun......................................................... ThC 3.13
..........................................................................ThC 3.14
Wang Liping......................................................MoA 3.6
Wang Qianfei....................................................ThC 13.2
Wang Rui..........................................................ThC 6.3
......................................................................... ThC 5.22
Wang Weihong................................................. ThC 5.63
Wang Wenjing.................................................. ThC 1.10
Wang Xiaochi................................................... MoA 4.7
Wang Xiaohui................................................... ThC 3.3
1186
758
1421
269
999
942
1058
395
398
74
1307
830
645
815
222
107
354
Wang Xuan.......................................................ThC 3.11
..........................................................................ThC 5.32
Wang Yao.........................................................ThC 12.17
Wang Yi............................................................ ThC 7.1
Wang Yijun....................................................... ThC 3.34
..........................................................................ThC 12.15
Wang Yingwei...................................................FrA 2.2
Wang Yudong...................................................ThC 5.18
Wang Zheng..................................................... ThC 3.22
Wang Zhixiao....................................................ThC 5.5
Wang Zilan....................................................... ThC 5.54
Wang Ziyang.................................................... MoA 3.1
Wei Min.............................................................ThC 5.24
..........................................................................ThC 5.17
Wei Wang......................................................... ThC 3.37
Wei Xu.............................................................. ThC 8.8
Wei Ying........................................................... ThC 13.12
Wei Yuanyuan.................................................. ThC 5.17
......................................................................... ThC 5.24
Wei Zhang........................................................ ThC 13.7
Wei Zhou.......................................................... MoA 5.4
Weiguang Shi................................................... ThC 1.23
Weili Peng........................................................ ThC 12.19
Weipeng Jin......................................................ThC 13.7
Weixing Wang.................................................. MoA 5.6
......................................................................... ThC 3.20
Weiyao Lan.......................................................ThC 6.8
Wengxing Li......................................................ThC 5.50
Wenhua Dou.....................................................ThC 4.9
Wenhua Zeng...................................................MoA 4.1
Wenyuan Chan.................................................ThA 1.1
Wu Yonghai......................................................ThC 3.25
..........................................................................ThC 3.27
Wu Di................................................................MoA 2.5
Wu Jinqun.........................................................ThC 8.2
Wu Jun............................................................. ThC 3.19
..........................................................................MoA 2.7
Wu Kehe...........................................................ThC 3.3
Wu Liping..........................................................MoA 1.6
Wu Shouer........................................................ThC 11.9
Wu Shuomei..................................................... ThC 11.1
..........................................................................ThC 1.1
Wu Wenbo........................................................MoA 6.2
Wu Xuyang....................................................... ThC 1.26
..........................................................................ThC 1.25
Wu Yajuan........................................................ ThC 5.43
Wu Yue.............................................................ThC 5.56
Wu Zhang......................................................... ThC 11.11
Wu Zhibin......................................................... ThC 5.23
..........................................................................FrA 2.9
Wuyi Yu............................................................ FrA 1.7
386
686
1286
876
483
1277
1425
627
433
577
776
52
654
623
495
971
1351
623
654
1327
126
281
1296
1327
133
425
852
763
541
78
166
445
452
38
942
420
47
354
22
1142
1103
186
141
293
289
736
783
1151
649
1454
1390
X
Xia Youming.................................................... ThC 1.8
Xiafu Peng....................................................... ThC 1.24
Xian Wu........................................................... ThC 3.7
Xiang Deng......................................................ThC 8.3
Xiang Jianghua................................................ThC 3.34
Xianzhe Hua.................................................... ThC 4.8
Xiao Chen........................................................ThC 12.10
.........................................................................ThC 5.41
Xiao Li..............................................................ThC 1.11
Xiao Zhongmin................................................ ThC 12.15
Xiaohua Yuan.................................................. FrA 2.8
214
286
370
946
483
537
1260
726
226
1277
1450
Xiaojing Hu...................................................... ThC 1.27
Xiaojing Shang................................................ ThC 1.16
Xiaoli Zhang.....................................................ThC 7.12
Xiaoming Hu.................................................... ThC 11.22
Xiaonan Liu......................................................ThC 1.11
Xiaoqian Guo...................................................ThC 5.1
Xiaoqing Zhou................................................. ThC 10.10
Xiaoya Fan...................................................... ThC 5.50
Xiaoyan Liu......................................................ThC 5.1
Xie Deti............................................................ ThC 5.32
Xie Fang.......................................................... ThC 11.10
Xie Pan............................................................ ThC 5.54
Xilong Tan....................................................... ThC 3.6
297
250
923
1204
226
557
1091
763
557
686
1147
776
365
85
Xin Li................................................................ThC 6.11
.........................................................................ThC 6.12
.........................................................................FrA 1.7
Xing Ruonan....................................................ThC 12.2
Xinxiao Zhao....................................................MoA 5.3
.........................................................................MoA 5.2
Xiong Zhi......................................................... ThC 7.9
Xiongwei Liu.................................................... ThC 5.48
Xisheng Zhan.................................................. ThC 1.19
Xiufeng Liu.......................................................ThC 5.6
Xiuju Zhan....................................................... ThC 5.6
Xiumin Yu........................................................ ThC 7.7
Xiuxia Lu..........................................................ThC 1.21
Xiyan Wang..................................................... ThC 11.14
Xu Fang........................................................... ThC 7.5
Xu Mingbao..................................................... ThC 4.2
Xu Qiuhua........................................................ThC 5.58
Xu Shuzhen..................................................... FrA 2.5
Xu Tianwei.......................................................ThC 9.9
Xu Xuerong......................................................ThC 3.3
Xu Zhihui......................................................... ThC 1.18
Xu Zhongyu..................................................... ThC 7.1
Xue Ka.............................................................ThC 2.3
Xuefen Lin....................................................... ThC 5.45
Xuejian Yan..................................................... MoA 4.3
Xuelian Hu.......................................................ThC 11.7
Xuemei Chen...................................................ThC 7.6
Xuemin Zhang................................................. ThC 2.1
Xueqiao Wang.................................................ThC 6.10
Xueqing Li........................................................MoA 4.3
.........................................................................MoA 5.3
.........................................................................MoA 5.2
866
871
1390
1227
120
114
909
755
265
580
580
901
273
1165
891
508
794
1438
1006
354
260
876
316
744
88
1131
897
310
860
88
120
114
Y
Yabin Yan........................................................ThC 7.13
Yadong Wang..................................................ThC 12.1
Yafen Tseng.................................................... ThC 12.18
Yaguang Ding..................................................ThC 2.2
Yalu Liu........................................................... ThC 1.3
Yan Guohong.................................................. ThC 3.36
Yan Jun........................................................... ThC 9.6
Yan Lingjie.......................................................ThC 4.11
Yan Wang........................................................ThC 3.38
Yan Zhao......................................................... MoA 3.5
Yang Fan.........................................................FrA 1.2
.........................................................................FrA 1.12
Yang Fulong.................................................... MoA 6.3
Yang Gefeng................................................... ThC 6.2
.........................................................................ThC 3.5
Yang Liuqing....................................................MoA 1.3
Yang Quanfa................................................... ThC 3.22
Yang Runkai.................................................... ThC 11.12
Yang Xiaofang................................................. MoA 5.5
Yang Yajun......................................................FrA 2.2
Yang Yanping.................................................. ThC 1.20
Yangmei Zheng............................................... ThC 5.37
Yanhua Li........................................................ ThC 1.21
Yanqing Wang................................................. ThC 5.47
Yanxiang He.................................................... ThC 5.2
Yanyan Huang.................................................ThC 3.30
.........................................................................ThC 1.12
Yao Zhao......................................................... FrA 1.9
Ye Conghuan...................................................ThC 3.18
.........................................................................ThC 3.17
Ye Binqiang..................................................... ThC 7.1
Ye Tengfei....................................................... FrA 1.7
.........................................................................ThC 11.25
Ye Tian............................................................ ThC 5.2
Yefu Wang.......................................................ThC 11.15
Yi Chen............................................................ThC 1.17
Yi Du................................................................ThC 1.7
Yi Jiang............................................................ThC 10.1
Yi Jin................................................................ThC 6.10
Yi Li..................................................................ThC 5.14
Yi Zhang.......................................................... ThC 13.3
Yifang Zhang................................................... MoA 6.5
Yihong Dong....................................................ThC 8.5
Yin Yanshu...................................................... ThC 3.2
928
1223
1291
313
191
492
995
552
499
70
1361
1416
145
826
361
12
433
1154
129
1425
269
710
273
751
562
464
232
1400
416
411
876
1390
1217
562
1170
256
210
1047
860
609
1311
154
955
351
.........................................................................ThC 3.1
Ying Hua..........................................................ThC 12.16
Ying Liang........................................................ThC 9.1
Ying Wang....................................................... ThC 1.27
Ying Zhang...................................................... ThC 11.7
Yingjiao Wu..................................................... ThC 10.10
Yingying Liu..................................................... ThC 3.21
Yin-Tsuo Huang...............................................ThA 1.1
Yizhi Wang...................................................... ThC 6.10
Yong Ouyang...................................................ThC 1.17
Yu Bo...............................................................ThC 11.20
Yu Chen...........................................................ThC 3.9
.........................................................................ThC 1.5
Yu Han.............................................................ThC 12.14
Yu He...............................................................ThC 5.20
Yu Hongtao......................................................MoA 2.3
Yu Jie...............................................................ThC 5.47
Yu Lejun.......................................................... ThC 3.24
Yu Li................................................................ ThC 9.2
Yu Xiao............................................................ MoA 3.2
.........................................................................MoA 2.6
Yu Xiaohong.................................................... ThC 1.1
Yu Zhao........................................................... ThC 3.37
Yu Zhen........................................................... ThC 7.5
Yu Zheng......................................................... FrA 2.10
Yuan Hongyan.................................................ThC 11.20
Yuan Jiugen.....................................................ThC 12.2
Yuan Jun......................................................... MoA 6.1
Yuan Yan.........................................................ThC 6.3
Yuangsheng Dong...........................................ThC 11.16
Yuanhe Zhao................................................... MoA 5.4
Yue Chen.........................................................ThC 12.3
Yuefeng Chen..................................................ThC 11.16
.........................................................................ThC 11.15
Yueqi Zhong.................................................... ThC 6.5
Yu-Hsi Yuan.................................................... ThC 5.49
.........................................................................MoA 6.4
Yuhui Ma......................................................... ThC 1.16
Yuliang Tang................................................... ThC 10.1
Yun Wu............................................................ThC 3.38
Yun Zhang....................................................... ThC 7.7
.........................................................................ThC 7.6
Yunchen Liu.....................................................ThC 3.9
Yunpeng Zhang............................................... ThC 3.9
Yu-Tsang Chen............................................... MoA 6.4
Yuying Li..........................................................ThC 11.19
Yuyu Zhang..................................................... ThC 1.14
.........................................................................ThC 1.15
348
1282
974
297
1131
1091
428
166
860
256
1194
380
199
1273
634
32
751
441
978
56
41
186
495
891
1460
1194
1227
136
830
1175
126
1231
1175
1170
839
758
149
250
1047
499
901
897
380
380
149
1189
240
245
Z
Zeng Guangyu.................................................ThC 5.52
Zeng Wenhua..................................................ThC 3.19
Zeng Yi............................................................ ThC 5.15
Zeng Zhihong.................................................. ThC 10.11
Zhang Aihua.................................................... MoA 6.3
Zhang Chunliang............................................. ThC 12.15
Zhang Damin...................................................MoA 3.3
Zhang Dan.......................................................ThC 7.9
Zhang Dezhong...............................................ThC 10.11
Zhang Hui........................................................MoA 4.5
........................................................................ MoA 1.6
Zhang Jie.........................................................ThC 13.6
Zhang Lanfang................................................ ThC 5.39
Zhang Li.......................................................... ThC 10.3
Zhang Ming..................................................... ThC 13.9
Zhang Nan.......................................................ThC 3.32
Zhang Ning......................................................FrA 1.12
........................................................................ MoA 2.6
........................................................................ ThC 4.11
........................................................................ FrA 1.7
........................................................................ ThC 11.25
Zhang Ping...................................................... ThC 5.52
Zhang Rong.................................................... ThC 4.3
Zhang Shengwu.............................................. ThC 6.9
Zhang Xiaoli.................................................... MoA 3.3
Zhang Xiaozhou.............................................. ThC 6.9
Zhang Yan.......................................................ThC 12.17
Zhang Ying...................................................... ThC 7.4
769
420
614
1094
145
1277
61
909
1094
99
22
1323
720
1054
1335
472
1416
41
552
1390
1217
769
512
856
61
856
1286
888
Zhang Yinnan.................................................. MoA 4.7
Zhang Yuang...................................................ThC 4.3
Zhang Zhuo..................................................... ThC 7.8
........................................................................ ThC 7.10
........................................................................ ThC 7.3
Zhangqin Huang..............................................FrA 1.3
Zhao Bo...........................................................ThC 13.6
Zhao Hongyi.................................................... ThC 5.3
Zhao Kuiling.................................................... MoA 1.1
Zhao Lixiao......................................................ThC 1.18
Zhao Mingfu.................................................... ThC 7.1
Zhao Xing........................................................ ThC 13.11
Zhao Yan.........................................................ThC 5.22
........................................................................ ThC 6.3
........................................................................ ThC 12.8
........................................................................ ThC 3.14
........................................................................ ThC 3.13
Zhao Yanyan................................................... ThC 9.3
Zhen Cao.........................................................FrA 2.4
Zhenfeng Zhu.................................................. FrA 1.9
Zheng Hua.......................................................ThC 12.11
Zheng Siting.................................................... ThC 11.25
........................................................................ FrA 1.12
Zheng Xiaoyi................................................... ThC 4.11
Zheng Xin........................................................ MoA 3.6
Zheng Yamin................................................... ThC 5.27
Zheng Yinhuan................................................ ThC 2.3
Zhengbao Liu.................................................. ThC 10.1
Zhengde Zhao................................................. ThC 5.29
Zhenquan Qin..................................................ThC 12.14
Zhi Jiang..........................................................MoA 6.7
Zhigang Zhao.................................................. ThC 10.7
Zhihui Yang..................................................... MoA 4.6
Zhijie Wang..................................................... ThC 8.5
Zhijun Xie........................................................ ThC 8.4
Zhilin Ren........................................................ ThC 5.46
Zhiqiang Wang................................................ FrA 1.3
Zhixin Tie.........................................................ThC 8.6
Zhixin Zhou......................................................ThC 12.1
Zhixiong Liu..................................................... ThC 10.1
Zhizhen Yang.................................................. MoA 4.6
........................................................................ ThC 9.5
Zhong Ping...................................................... ThC 10.11
Zhongdang Yu.................................................ThC 5.33
Zhonglin Zhang............................................... ThC 11.2
Zhongyuan Zhang........................................... ThC 11.15
Zhou Hanchang...............................................ThC 2.10
Zhou Jingui......................................................ThC 5.40
Zhou Jingwei................................................... ThC 9.13
Zhou Liping..................................................... ThC 10.11
Zhou Minghong............................................... MoA 2.4
Zhou Qifeng.................................................... FrA 1.2
Zhou Shan.......................................................ThC 10.3
Zhou Wei......................................................... ThC 5.11
Zhou Xiaojun................................................... ThC 4.2
Zhou Yuntao....................................................ThA 1.2
Zhou Zhimin.................................................... ThC 5.25
Zhou Zili.......................................................... MoA 1.5
........................................................................ MoA 2.5
Zhu Jihan........................................................ ThC 11.14
Zhu Meining.................................................... ThC 1.20
Zhu Yuwei....................................................... MoA 4.2
Zhu Zhengwei................................................. ThC 3.35
Zou Jinan........................................................ ThC 11.3
Zou Yuzhuo..................................................... ThC 1.26
86
107
512
904
915
884
1367
1323
568
1
260
876
1346
645
830
1251
398
395
984
1433
1400
1264
1217
1416
552
74
665
316
1047
671
1273
162
1075
102
955
950
748
1367
960
1223
1047
102
991
1094
691
1107
1170
344
723
1023
1094
35
1361
1054
600
508
172
657
19
38
1165
269
83
489
1111
293
Download