Pub Date : 2010-09-09DOI: 10.1109/ITAPP.2010.5566631
L. Xue, Yumin Liu, Jichao Xu
In order to reduce the cost of the production cycle, the economic design of EWMA standard deviation charts with variable sampling interval (VSI) is discussed in this paper. First, the optimal values of the test parameters for the VSI EWMA standard deviation charts will be determined such that the expected total cost is minimized. Further, the genetic algorithms (GA) will be used to search for the optimal values of parameters of the VSI EWMA standard deviation chart, and an example is provided to illustrate the solution procedure. Finally, a sensitivity analysis is carried out to economic modal and the effect of model parameters on the solution of the economic design is obtained.
{"title":"Economic Design of EWMA Standard Deviation Charts Using Variable Sampling Policy","authors":"L. Xue, Yumin Liu, Jichao Xu","doi":"10.1109/ITAPP.2010.5566631","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566631","url":null,"abstract":"In order to reduce the cost of the production cycle, the economic design of EWMA standard deviation charts with variable sampling interval (VSI) is discussed in this paper. First, the optimal values of the test parameters for the VSI EWMA standard deviation charts will be determined such that the expected total cost is minimized. Further, the genetic algorithms (GA) will be used to search for the optimal values of parameters of the VSI EWMA standard deviation chart, and an example is provided to illustrate the solution procedure. Finally, a sensitivity analysis is carried out to economic modal and the effect of model parameters on the solution of the economic design is obtained.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131542262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-09DOI: 10.1109/ITAPP.2010.5566242
Shianghau Wu, Jiannjong Guo
The study applies the text mining method to analyze the policy addresses of Macau Special Administrative Region (SAR) government from 2000 to 2009, and finds the main policy focuses of Macao SAR government are governance and development and ignore cultural and industrial policies.
{"title":"The Study on Policy Addresses of Macao SAR (2000-2009): A Text Mining Analysis","authors":"Shianghau Wu, Jiannjong Guo","doi":"10.1109/ITAPP.2010.5566242","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566242","url":null,"abstract":"The study applies the text mining method to analyze the policy addresses of Macau Special Administrative Region (SAR) government from 2000 to 2009, and finds the main policy focuses of Macao SAR government are governance and development and ignore cultural and industrial policies.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131699935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-09DOI: 10.1109/ITAPP.2010.5566407
Wen-Hwa Liao, Chia-Ching Chang
Botnet was composed of the virus-infected computers severely threaten the security of internet. Hackers, firstly, implanted virus in targeted computers, which were then commanded and controlled by them via the internet to operate distributed denial of services (DDoS), steal confidential information, distribute junk mails and other malicious acts. By imitating P2P software, P2P botnet used multiple main controller to avoid single point of failure, and failed various misuse detecting technologies together with encryption technologies. Differentiating from the normal network behavior, P2P botnet sets up numerous sessions without consuming bandwidth substantially, causing itself exposed to the anomaly detection technology. The data mining scheme was tested in real internet to prove its capability of discovering the host of P2P botnet. Crucially, the research applied the original dissimilarity of P2P botnet differing from normal internet behaviors as parameters of data mining, which were then clustered and distinguished to obtain reliable results with acceptable accuracy.
{"title":"Peer to Peer Botnet Detection Using Data Mining Scheme","authors":"Wen-Hwa Liao, Chia-Ching Chang","doi":"10.1109/ITAPP.2010.5566407","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566407","url":null,"abstract":"Botnet was composed of the virus-infected computers severely threaten the security of internet. Hackers, firstly, implanted virus in targeted computers, which were then commanded and controlled by them via the internet to operate distributed denial of services (DDoS), steal confidential information, distribute junk mails and other malicious acts. By imitating P2P software, P2P botnet used multiple main controller to avoid single point of failure, and failed various misuse detecting technologies together with encryption technologies. Differentiating from the normal network behavior, P2P botnet sets up numerous sessions without consuming bandwidth substantially, causing itself exposed to the anomaly detection technology. The data mining scheme was tested in real internet to prove its capability of discovering the host of P2P botnet. Crucially, the research applied the original dissimilarity of P2P botnet differing from normal internet behaviors as parameters of data mining, which were then clustered and distinguished to obtain reliable results with acceptable accuracy.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131812298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-09DOI: 10.1109/ITAPP.2010.5566177
Zhi-ming Feng
This paper based on comprehensive analysis of the voluntary service status in China and combined with the experience building voluntary service platform in Beijing, proposes the solution to informationization of voluntary service-building information-based management system of voluntary service so as to enhance life-cycle management to volunteers, voluntary service organization and voluntary service project, increase work efficiency, promote system construction, strengthen the construction of voluntary service co-ordination mechanism, raise voluntary service level, finally promote scientific and sustainable development of voluntary service undertakings.
{"title":"Notice of RetractionResearch on Construction of Volunteer Information Platform","authors":"Zhi-ming Feng","doi":"10.1109/ITAPP.2010.5566177","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566177","url":null,"abstract":"This paper based on comprehensive analysis of the voluntary service status in China and combined with the experience building voluntary service platform in Beijing, proposes the solution to informationization of voluntary service-building information-based management system of voluntary service so as to enhance life-cycle management to volunteers, voluntary service organization and voluntary service project, increase work efficiency, promote system construction, strengthen the construction of voluntary service co-ordination mechanism, raise voluntary service level, finally promote scientific and sustainable development of voluntary service undertakings.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131141419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-09DOI: 10.1109/ITAPP.2010.5566348
Cheng Gong, Jingde Hu
3G is referring to the third-generation mobile communication technology. It has high-speed communication, multi-task-oriented, real-time, personalized, multimedia-oriented features. M-learning is a new stage of development of distance education,which is defined as the use of wireless mobile communication network technology. This article introduces 3G technology and Widget, then analyzes the requirement of the mobile learning and education, gives the design of 3G English M-learning platform. The platform's operating performance is simple and convenient, makes full use of the client-side's computing power, effectively reduces the server's load, and has good scalability.
{"title":"The Design and Development of 3G English M-Learning Platform","authors":"Cheng Gong, Jingde Hu","doi":"10.1109/ITAPP.2010.5566348","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566348","url":null,"abstract":"3G is referring to the third-generation mobile communication technology. It has high-speed communication, multi-task-oriented, real-time, personalized, multimedia-oriented features. M-learning is a new stage of development of distance education,which is defined as the use of wireless mobile communication network technology. This article introduces 3G technology and Widget, then analyzes the requirement of the mobile learning and education, gives the design of 3G English M-learning platform. The platform's operating performance is simple and convenient, makes full use of the client-side's computing power, effectively reduces the server's load, and has good scalability.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131215250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-09DOI: 10.1109/ITAPP.2010.5566453
Danyang Shen, Yunchun Cao
In view of the analysis on agglomeration and diffusion of airport on economy, this article firstly abstracts the spatial scope of airport economic zone as the attraction domain of airport. Based on the completely unconstrained model and the development characters of the airport economic zone, secondly this article brings forward the theoretic model of the spatial scope of airport economic zone. Finally the feasibility of using the time and expense by arriving airport to measure the spatial scope of airport economic zone is discussed.
{"title":"Research on the Spatial Scope of Airport Economic Zone","authors":"Danyang Shen, Yunchun Cao","doi":"10.1109/ITAPP.2010.5566453","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566453","url":null,"abstract":"In view of the analysis on agglomeration and diffusion of airport on economy, this article firstly abstracts the spatial scope of airport economic zone as the attraction domain of airport. Based on the completely unconstrained model and the development characters of the airport economic zone, secondly this article brings forward the theoretic model of the spatial scope of airport economic zone. Finally the feasibility of using the time and expense by arriving airport to measure the spatial scope of airport economic zone is discussed.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130845719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-09DOI: 10.1109/ITAPP.2010.5566619
Wenzhong Yang, Zhenyu Zhang, Xiaohong Wu
Multicast is an efficient delivery which an identical data is sent to many group members from a multicast source or many multicast sources. However, there is a growing need to conquer the multicast security problem limiting its successful and extensive application. In this work, an efficient and trusted group key management protocol (EGKMP) is proposed, compared to previous tree-based key management protocol LKH and Group Key Management Protocol GKMP, EGKMP protocol can efficiently reduce the amount of key update messages, due to the operation of group member to join and leave the multicast group, in fact, the protocol eliminates the rekeying process. EGKMP protocol also utilizes TPM to credibly produce, store and distribute keys, the trustworthiness of its key management is superior to tree-based protocol LKH and GKMP. Security analysis, performance analysis shows that EGKMP agreement is the desired efficiency and trustworthiness.
{"title":"A Trusted Efficient Group Key Management Protocol","authors":"Wenzhong Yang, Zhenyu Zhang, Xiaohong Wu","doi":"10.1109/ITAPP.2010.5566619","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566619","url":null,"abstract":"Multicast is an efficient delivery which an identical data is sent to many group members from a multicast source or many multicast sources. However, there is a growing need to conquer the multicast security problem limiting its successful and extensive application. In this work, an efficient and trusted group key management protocol (EGKMP) is proposed, compared to previous tree-based key management protocol LKH and Group Key Management Protocol GKMP, EGKMP protocol can efficiently reduce the amount of key update messages, due to the operation of group member to join and leave the multicast group, in fact, the protocol eliminates the rekeying process. EGKMP protocol also utilizes TPM to credibly produce, store and distribute keys, the trustworthiness of its key management is superior to tree-based protocol LKH and GKMP. Security analysis, performance analysis shows that EGKMP agreement is the desired efficiency and trustworthiness.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133267223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-09DOI: 10.1109/ITAPP.2010.5566286
Zhenxiang Xing, Guorui Liu
A new simulation analysis algorithms establishing wireless sensor networks communication path based on ant agorithm was proposed. The detailed design of the algorithm and implementation steps and the communication path are designed. The new algorithm is very effective to determiner multi-node wireless sensor network communication processes and has good scalability and dynamic adaptability.The algorithm is feasible through simulation test.
{"title":"The Simulation Algorithm Establishing Wireless Sensor Networks Communication Path Based on Ant Algorithm","authors":"Zhenxiang Xing, Guorui Liu","doi":"10.1109/ITAPP.2010.5566286","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566286","url":null,"abstract":"A new simulation analysis algorithms establishing wireless sensor networks communication path based on ant agorithm was proposed. The detailed design of the algorithm and implementation steps and the communication path are designed. The new algorithm is very effective to determiner multi-node wireless sensor network communication processes and has good scalability and dynamic adaptability.The algorithm is feasible through simulation test.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"54 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133135923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-09DOI: 10.1109/ITAPP.2010.5566216
Jianfeng Liu, Yan Liu
Rural highway construction is the important content of building a new countryside. The rapid development of rural highways construction means that a large demand for land resources. In the analysis of the basis of the status and trends of land use for construction of rural highways, this paper summed up the characteristics and main problems in land use of construction of rural highways, according to the basic requirements for the rational use and conservation of highway land use to construct rural highways, a evaluation indictor system and criterion for land use control of rural highway construction were set up. The evaluation standard provides a useful guideline for highway planning, design, construction, land conservation units, and authority in rural highway project land use appraisal and control.
{"title":"Study on Land-Use Control Indictors for Rural Highway Construction","authors":"Jianfeng Liu, Yan Liu","doi":"10.1109/ITAPP.2010.5566216","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566216","url":null,"abstract":"Rural highway construction is the important content of building a new countryside. The rapid development of rural highways construction means that a large demand for land resources. In the analysis of the basis of the status and trends of land use for construction of rural highways, this paper summed up the characteristics and main problems in land use of construction of rural highways, according to the basic requirements for the rational use and conservation of highway land use to construct rural highways, a evaluation indictor system and criterion for land use control of rural highway construction were set up. The evaluation standard provides a useful guideline for highway planning, design, construction, land conservation units, and authority in rural highway project land use appraisal and control.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131294330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-09DOI: 10.1109/ITAPP.2010.5566460
Yanping Li, Fuping Ma, Shuting Song
Based on the study sample of 108 resource-based enterprises and the integration of internal growth mechanism and external growth mechanism of enterprises, this paper explores mutual relationship among technological innovation, external social capital and growth of firm. The results show that technological innovation and external social capital have significant affect on growth of firm. It also concludes that external social capital enhances technological innovation directly and improves growth of firm indirectly.
{"title":"A Research on Technological Innovation, External Social Capital and Growth of Firm: An Empirical Study Based on the Resource-Based Enterprises","authors":"Yanping Li, Fuping Ma, Shuting Song","doi":"10.1109/ITAPP.2010.5566460","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566460","url":null,"abstract":"Based on the study sample of 108 resource-based enterprises and the integration of internal growth mechanism and external growth mechanism of enterprises, this paper explores mutual relationship among technological innovation, external social capital and growth of firm. The results show that technological innovation and external social capital have significant affect on growth of firm. It also concludes that external social capital enhances technological innovation directly and improves growth of firm indirectly.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131305077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}