摘要:
Information integration and interoperability among information sources are related problems that have received significant attention since early days of computer information processing. The objective of Web information integration system is to promote Web information collection, sharing and retrieval in distributed and heterogeneous environment. This paper Puts forward an ontology-based approach to Web information integration, which promises better access to relevant information by producing a global domain ontology that is used for establishing semantic connections among the local autonomous information sources as well as for retrieving those sources. In this approach, an up-bottom information integration method with a semantic transformation adapter framework is proposed to solve both the semantic heterogeneities and the query answering problems.
关键词:
logistics;Foodstuffs Logistics Management Information System;distribution;selection;data mining
摘要:
Information system is the nerve center of modern logistics. How to construct FLMIS(Foodstuffs Logistics Management Information System) and what pattern should be adopted and what factor should be considered we're studied This paper investigated the aspects of objective design, over all design, logic structure design and model design on LMIS, based on which a basic frame of modern logistics management information system design was built.
期刊:
PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON INFORMATION, ELECTRONIC AND COMPUTER SCIENCE, VOLS I AND II,2009年:399-402
通讯作者:
Gao, Zunhai
作者机构:
[Gao, Zunhai] Wuhan Polytech Univ, Dept Math & Phys, Wuhan 430023, Peoples R China.
通讯机构:
[Gao, Zunhai] W;Wuhan Polytech Univ, Dept Math & Phys, Wuhan 430023, Peoples R China.
会议名称:
2009 International Conference on Information,Electronic and Computer Science(2009 国际信息、电子与计算机工程学术会议)
会议时间:
2009-11-21
会议地点:
青岛
会议论文集名称:
2009 International Conference on Information,Electronic and Computer Science(2009 国际信息、电子与计算机工程学术会议)论文集
关键词:
model order-reduction;aggregation condition;generated Lyapunov equation
摘要:
A new condition for accurately aggregated model order-reduction of large-scale systems is presented,which can be used to determine whether the accurate order-reduction model exists for a given order or certain variable components previously assigned. The corresponding reduced-order model is also derived under the proposed existence condition.It is shown that,if the condition is not satisfied,an approximate model order-reduction can be carried out.Simulation results are shown to verify the validity and feasibility of this method.
摘要:
This paper presents a file transfer global dynamic scheduling algorithm that incorporates the two optimizations of multi-hop path splitting and multi-pathing in conjunction with the use of available file replicas, This algorithm makes use of information from past GridFTP transfers to estimate network bandwidths and resource availability. The experimental results show that this algorithm achieve significant performance improvement.
摘要:
To maximize network lifetime for target coverage, we propose an energy-balance heuristic distributed algorithm with adjustable sensing ranges based energy-balance and energy-utility of sensor. Firstly, we transform the target coverage problem with adjustable sensing ranges into the h-hop local target coverage problem with adjustable sensing ranges. Secondly, we seek the key constraint of network lifetime, introduce the definition of key target, design the energy utility function, and establish the adaptive adjustment mechanism of waiting time. Finally, Measurement results show that the new algorithm extends 25% longer network lifetime, has good scalability and stability, and a lower computational and communication complexity.
摘要:
Software configuration management(SCM) manages change of software development. In web project development, management of mounts of files and different kinds of file is the most difficult in all software development. How to realize management of web development lifecycle conveniently is a hard problem. In this paper, we proposed software configuration management method for web project. We adopted VSS and designed multileveled directory to manage different type meta-data. Reality testing approved that the method had very high practicability.
摘要:
We consider an M/M/1 queueing system with auxiliary service in addition to primary service. When the auxiliary service is requested, the server allocates part of its capacity to process the additional service. We show that the possible optimal auxiliary capacity is actually on the convex envelope of the auxiliary cost function. Also, the optimal control policy is that the allocated capacity for auxiliary service is monotonically non-increasing in the number of people in the system.
摘要:
In traditional vocal tract length normalization (VTLN) method, the details of the differences of spectral among speakers can not be modeled, because only a simple vocal tract length factor is regarded as the absolutely indicator of the speaker specific attribute, according to the assumption of lossless multi-tube vocal tract model. In this paper, the piece-wise frequency warping function is adopted to describe the speaker specific character in detail. With an appropriate partition of frequency axis, the differences of spectral can be removed well. Due to the model-independent warping function, this method is proved to be a quite fast adaptation technique, and especially suitable for the unsupervised adaptation.
摘要:
Some difficult topics can't be easily understood by students in OOP teaching program such as class, object, inheritance, polymorphism, abstract class, templates and so on because they have no class and object thinking mode before studying OOP lessons. In this paper, some typical examples are designed and discussed for these topics and some ambiguous and similar concepts which include constructor, destructors, overload, override and order of execution are compared and analyzed using particular examples. The typical examples method can make it clear for students and the classroom and experimental teaching can get better results.
会议名称:
2009 International Symposium on Intelligent Ubiquitous Computing and Education(2009国际智能普适计算与教育研讨会 IUCE 2009)
会议时间:
2009-05-15
会议地点:
成都
会议论文集名称:
2009 International Symposium on Intelligent Ubiquitous Computing and Education(2009国际智能普适计算与教育研讨会 IUCE 2009)论文集
关键词:
network security;port scanning;vulnerability scanning;remote operating system scanning;libnet;libpcap
摘要:
This paper discusses the network security scanning and some scanning methods which contain port scanning, vulnerability scanning and remote operating system detection are studied. In order to reduce the complexity and get high performance, the architecture of a common network security scanning system based on Libnet and Libpcap is provided and the every module of system is designed and implemented. The key modules include packet constructing, packet sending, packet capture, packet analyzing module and information log analysis module. The methods of packet injection based on Libnet and the packet capture based on Libpcap are presented and it can improve scanning performance and enhance the scalability and expansibility of system.
会议名称:
Information Technology and Applications, 2009. IFITA '09. International Forum on
关键词:
Radar;PLM;B/S mode;module design method
摘要:
Product lifecycle management (PLM) is recognized as one of the leading technologies to facilitate companies overcome ever-increasing challenges. The concept and implementation of Product Lifecycle Management have drawn much attention in both industry and academia. This technology offers companies a novel way to rapidly plan the research, manufacture, sale of the production. So the enterprise can deliver up new products and services much faster and cheaper in an integrated way. This paper introduces the conception of PLM into the project of the RADAR management system and provides the solution according to the demand of Radar Corporation. In this PLM system, we can manage every process of the life circle that includes making, running, repairing, maintenance, destroying by designing serial code, it also establish a stable foundation for CIMS (Computer Integrated Manufacturing System) integrate of corporation in the future. (8 refs.)
关键词:
human resources recruitment system;Service Oriented Architecture;Web service
摘要:
Traditional enterprise human resources recruitment system is not flexible enough and is independent of each other and does not follow the standards with the lack of communication between each other. It can't share the resources and the operation is cumbersome and not convenient enough. This paper presents a Web service-based human resource recruitment system to solve these problems well. Web service is a distributed software architecture model and uses XML, HTTP, UDDI, WSDL and SOAP standard protocols. It is the software architecture as a generic implementation model for SOA. Web service-based human resources system has excellent resources reusability, adaptability and scalability and it can reduce cost money and improve great efficiency for enterprise recruiting and save time and energy for job seekers.
摘要:
With the development of science and technology, many new materials and new technology are applied to the dike anti-seepage project. The practical methods of foundation vertical anti-seepage technology include vertically paving plastic film technique, directional jet grouting method and cement soil cutoff wall technology. The concepts of cement soil cutoff wall and the anti-seepage project's task and principle were introduced is this paper. According to the geological conditions of the Lower Yangtze region, the application of cement soil cutoff wall technology to the embankment of the Lower Yangtze region were analyzed, and the influence of the cut-off wall's permeability to seepage control effect was studied. It is concluded that the appropriate design of cut-off wall is permeability in an order of magnitude of 10-6 cm/s and the thickness is not less than 0.2m. The research results are helpful to the construction and design of dike anti-seepage project in future.
关键词:
ATN;access control policy;Hiding policy;checking policy;policy consistency
摘要:
Trust Negotiation (TN) is an approach to establishing trust relationship between strangers by disclosing iteratively credentials and access control policies. In open and distributed environment, while TN brings convenience in resource sharing, it still has some shortcomings, such as easy to fail in negotiation, difficult to track users' deed and so on. In A TN, access control policy plays a key role in protecting resources from unauthorized access. In practice, a policy may contain sensitive information, and its disclosure may cause damages. In order to protect the sensitive policy or its content, the policy is usually designed complex. Even worse, the policy may be self contradictory, which would lead the negotiation to fail. To solve such a problem, a new approach for checking policy consistency is proposed in the paper. In the approach, we analyze why the policy inconsistency happens and specify how to avoid it by simplifying a compound policy. Meanwhile, the approach is proved useful to hide policy by presenting some useful theorems to generate minimal policy set and credential set. (14refs.)
摘要:
The paper proposed a fast method on discovering vehicle license plate position in image with very complicated background and bad shooting condition. Firstly, we deduced a new RGB threshold formula by limiting the hue change range. Secondly, we provided a fast method to detect license plate position according to the characteristics of colors of license plate. Finally, we performed a detection experiment with 416 images containing license plate and the result showed that almost all license plates could be discovered quickly with our method from the images with even quit complicated background.
关键词:
Data hiding capability;Frequency watermarking;Sigmoid function;Bright hiding capability
摘要:
This paper presents in detail an analysis of the ability of data hiding capabilities. According to the human visual features, this paper uses edge degree which can be computed by Log points, and combines distributed evenly degrees with sigmoid function which is adopted to describe bright hiding capability, and proposes an effective method to measure the data hiding capability. Moreover, this paper implements embedding and distilling watermark based on the frequency modulation. Using the idea of frequency modulation that belongs to communication engineering, and bringing up "frequency modulation watermark" which different to traditional watermark technique, we constitute base band signal by select the intermediate frequency coefficients of image piece which has strong data conceals ability, then, embedding and picking up watermark according to the idea of frequency modulation. This kind of watermark technique can give attention to invisibleness and robustness, and realize blind examination efficiently The experiments show that the technique has the properties of combing invisibility and robustness as well as achieving efficient blind detection.
摘要:
In account of the heterogeneous data existed in the e-commerce, the solution of heterogeneous database data exchange middleware based on XML is brought up. With the beginning of heterogeneous data integration, this paper combined with the examples of e-commerce platform construction, realized the transformation and integration of the relational data to XML data, which provided the underlying support for the data sharing, publishing and application access among various systems.
摘要:
In this paper, a system for PPPoE protocol analysis is designed and implemented. The system includes three modules: network capture module, traffic analysis module and information log module. The network packets are captured by Winpcap which can enhance high correctness and efficiency of the network capture. The mechanism of PPPoE data communication and the packet capture method of using Winpcap are introduced and the process of PPPoE protocol analysis is realized in detail. The protocol data in the log module is based on XML format and it can provide more readable information using XSLT. The algorithms of parsing the tag options and making packet markup in the XML file are realized. The experiment shows that the system can transform the whole protocol information correctly and this system can make the administrator and customer to make full use of the network advice on ADSL and check the network problem quickly.