Spatial index has been one of the active focus areas in recent database research. The R-tree proposed by Guttman is probably the most popular dynamic index structure for efficiently retrieving objects from a spatial database according to their spatial locations. This paper proposes a new method of constructing R-tree by studying every kind of its operations thoroughly and combining with improved k-medoids clustering algorithm. Because of its more compact structure, the R-tree based on this method has more advantages compared with traditional Rtree. The results of the study show that, due to the optimization of structure, the proposed method can improve index efficiency effectively.
{"title":"An Optimization Algorithm for Spatial Index Structure Based on Spatial Clustering","authors":"Wang Jing-bin, Peng Zhi-xing","doi":"10.1109/BCGIN.2011.156","DOIUrl":"https://doi.org/10.1109/BCGIN.2011.156","url":null,"abstract":"Spatial index has been one of the active focus areas in recent database research. The R-tree proposed by Guttman is probably the most popular dynamic index structure for efficiently retrieving objects from a spatial database according to their spatial locations. This paper proposes a new method of constructing R-tree by studying every kind of its operations thoroughly and combining with improved k-medoids clustering algorithm. Because of its more compact structure, the R-tree based on this method has more advantages compared with traditional Rtree. The results of the study show that, due to the optimization of structure, the proposed method can improve index efficiency effectively.","PeriodicalId":127523,"journal":{"name":"2011 International Conference on Business Computing and Global Informatization","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127525206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Along with global economic and information technology swift development, eXtensible Business Reporting Language (XBRL) already has become a research focus in the recent years because of its economic significance. More and more researchers pay close attention on how to improvement the performance of XBRL system. With project practice, a new algorithm for taxonomy quick analysis is proposed in this paper. The algorithm can improve the performance of XBRL system remarkably. Through using the algorithm, the performance that user experienced can increase about eight times.
随着全球经济和信息技术的飞速发展,可扩展商业报告语言(eXtensible Business Reporting Language, XBRL)因其经济意义而成为近年来的研究热点。如何提高XBRL系统的性能越来越受到研究者的关注。结合工程实践,提出了一种新的分类快速分析算法。该算法可以显著提高XBRL系统的性能。通过使用该算法,用户体验的性能可提高8倍左右。
{"title":"An Algorithm for XBRL Taxonomy Quick Analysis","authors":"Liming Luo, Jianpeng Zhu, Ying Wang","doi":"10.1109/BCGIN.2011.93","DOIUrl":"https://doi.org/10.1109/BCGIN.2011.93","url":null,"abstract":"Along with global economic and information technology swift development, eXtensible Business Reporting Language (XBRL) already has become a research focus in the recent years because of its economic significance. More and more researchers pay close attention on how to improvement the performance of XBRL system. With project practice, a new algorithm for taxonomy quick analysis is proposed in this paper. The algorithm can improve the performance of XBRL system remarkably. Through using the algorithm, the performance that user experienced can increase about eight times.","PeriodicalId":127523,"journal":{"name":"2011 International Conference on Business Computing and Global Informatization","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127314390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper first carries out statistical analysis of the data of transnational corporations' R&D investment and technological innovation capacity in various regions of China from 1997 to 2008, then tests the cointegration relationship between transnational corporations' R&D investment and technological innovation capacity in various regions of China, it concludes that there exists a long-term and stable relationship between the two, on the basis of OLS regression analysis, we draw some conclusions and recommendations.
{"title":"Empirical Analysis of the Influence of TNC's R&D Investment on the Innovation Capacity of Regions in China Based on Cointegration Test","authors":"Li Xiaodi, Liu Qiang, Yang Qingming","doi":"10.1109/BCGIN.2011.163","DOIUrl":"https://doi.org/10.1109/BCGIN.2011.163","url":null,"abstract":"The paper first carries out statistical analysis of the data of transnational corporations' R&D investment and technological innovation capacity in various regions of China from 1997 to 2008, then tests the cointegration relationship between transnational corporations' R&D investment and technological innovation capacity in various regions of China, it concludes that there exists a long-term and stable relationship between the two, on the basis of OLS regression analysis, we draw some conclusions and recommendations.","PeriodicalId":127523,"journal":{"name":"2011 International Conference on Business Computing and Global Informatization","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133678194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
HU Qiang-qiang, Jiang Shun-liang, Xu Shao-ping, Dong Tian-wen
In this paper, NVIDIA's parallel computing architecture CUDA is used to implement a discrete particle simulation system. In the neighbor search part, an algorithm based on hash list is used. In the collision part, the stream of CUDA is used to split one step simulation to four parallel streams, the asynchronous copy method is used to output, then an efficient way to use the CUDA memory model is designed. The results shown that the CUDA's discrete particle system is efficient and effective.
{"title":"The Simulation and Implementation of Discrete Particle System based on CUDA","authors":"HU Qiang-qiang, Jiang Shun-liang, Xu Shao-ping, Dong Tian-wen","doi":"10.1109/BCGIN.2011.132","DOIUrl":"https://doi.org/10.1109/BCGIN.2011.132","url":null,"abstract":"In this paper, NVIDIA's parallel computing architecture CUDA is used to implement a discrete particle simulation system. In the neighbor search part, an algorithm based on hash list is used. In the collision part, the stream of CUDA is used to split one step simulation to four parallel streams, the asynchronous copy method is used to output, then an efficient way to use the CUDA memory model is designed. The results shown that the CUDA's discrete particle system is efficient and effective.","PeriodicalId":127523,"journal":{"name":"2011 International Conference on Business Computing and Global Informatization","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123039854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Buffer Status Report (BSR) and Scheduling Request (SR) are important procedures based on Medium Access Control (MAC) layer in Long Term Evolution (LTE) system. First, we study the BSR, SR and Semi-Persistent Scheduling (SPS) separately, then illustrate the priority of BSR and other data when sending MAC PDUs. The issue about the priority has been definitely defined by 3GPP, but it doesn't explain the reason, the article made a detailed analysis of it. The UE will send BSR and SR for gaining radio resources, the resources may be wasted if they exist at the same time. Finally we proposed a solution of deciding whether triggering BSR and SR in SPS and a solution of conflicts between padding BSR and other kinds of BSR.
{"title":"An Improved Approach of Sending BSR and SR Based on MAC Layer in LTE System","authors":"XiuWen Duan, D. Zhang, Xiaowen Li","doi":"10.1109/BCGIN.2011.137","DOIUrl":"https://doi.org/10.1109/BCGIN.2011.137","url":null,"abstract":"The Buffer Status Report (BSR) and Scheduling Request (SR) are important procedures based on Medium Access Control (MAC) layer in Long Term Evolution (LTE) system. First, we study the BSR, SR and Semi-Persistent Scheduling (SPS) separately, then illustrate the priority of BSR and other data when sending MAC PDUs. The issue about the priority has been definitely defined by 3GPP, but it doesn't explain the reason, the article made a detailed analysis of it. The UE will send BSR and SR for gaining radio resources, the resources may be wasted if they exist at the same time. Finally we proposed a solution of deciding whether triggering BSR and SR in SPS and a solution of conflicts between padding BSR and other kinds of BSR.","PeriodicalId":127523,"journal":{"name":"2011 International Conference on Business Computing and Global Informatization","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124579342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Currently, the development of e-commerce suffers a series of ethical issues in China, and trust is the most concerned in e-commerce activities. Strengthening the trustworthiness is an important approach to accelerate the healthy development of e-commerce in China. The paper discusses the trust issue in modern society and uses the Trust Equation to analyze the issue. Finally, the paper proposes some ideas to address the trust issue in e-commerce development.
{"title":"The Trust Equation The Core Concepts in E- Commerce","authors":"Liangfang Huang, Lingling Wang","doi":"10.1109/BCGIN.2011.40","DOIUrl":"https://doi.org/10.1109/BCGIN.2011.40","url":null,"abstract":"Currently, the development of e-commerce suffers a series of ethical issues in China, and trust is the most concerned in e-commerce activities. Strengthening the trustworthiness is an important approach to accelerate the healthy development of e-commerce in China. The paper discusses the trust issue in modern society and uses the Trust Equation to analyze the issue. Finally, the paper proposes some ideas to address the trust issue in e-commerce development.","PeriodicalId":127523,"journal":{"name":"2011 International Conference on Business Computing and Global Informatization","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127971499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study examined the determinants of foreign bank location decisions in Shanghai markets over the period of 1990 to 2009. The growing foreign presence in Shanghai was found to be related to two different policy regimes: Pudong development area foreign enterprise clustering period after China opened Pudong, and "deposit-loan-match principle" implementing period after China joined WTO. The current location pattern was found to be correlated to deposit potential in each district. It is evident that the foreign bank location decisions were influenced by those of domestic banks while the reverse did not hold. These findings provide a valuable platform for theoretical modeling and further analysis.
{"title":"Location Decisions of Foreign Banking in Shanghai","authors":"Xiaobing Feng","doi":"10.1109/BCGIN.2011.72","DOIUrl":"https://doi.org/10.1109/BCGIN.2011.72","url":null,"abstract":"This study examined the determinants of foreign bank location decisions in Shanghai markets over the period of 1990 to 2009. The growing foreign presence in Shanghai was found to be related to two different policy regimes: Pudong development area foreign enterprise clustering period after China opened Pudong, and \"deposit-loan-match principle\" implementing period after China joined WTO. The current location pattern was found to be correlated to deposit potential in each district. It is evident that the foreign bank location decisions were influenced by those of domestic banks while the reverse did not hold. These findings provide a valuable platform for theoretical modeling and further analysis.","PeriodicalId":127523,"journal":{"name":"2011 International Conference on Business Computing and Global Informatization","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116930896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Radio Frequency Identification (RFID) technologies have been widely commercially used in Electronic Commence and precision management, although the critical data are stored in backend database, they have still been threaten by SQL injection and Virus attacks during its use of electronic tags in RFID systems. This paper analyzes the cause of these attacks, and presents an efficient automatic SQL injection detection approach to prevent it to infect system.
{"title":"Security Guarantee in Backend RFID System","authors":"Li Jun, Wen Jun","doi":"10.1109/BCGIN.2011.129","DOIUrl":"https://doi.org/10.1109/BCGIN.2011.129","url":null,"abstract":"Radio Frequency Identification (RFID) technologies have been widely commercially used in Electronic Commence and precision management, although the critical data are stored in backend database, they have still been threaten by SQL injection and Virus attacks during its use of electronic tags in RFID systems. This paper analyzes the cause of these attacks, and presents an efficient automatic SQL injection detection approach to prevent it to infect system.","PeriodicalId":127523,"journal":{"name":"2011 International Conference on Business Computing and Global Informatization","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115492785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shift-share analysis is an extensively used mathematical method for research on regional economy and industrial structure at home and abroad. It owns unique advantages as regard to synthesis and dynamics. Nevertheless, current studies at home mainly rest on the application of traditional relative static model with no consideration of time factor. With the introduction of dynamic thinking, this paper constructs dynamic time series to expand traditional model. It not only reveals the contribution each growth component makes to total growth, but exhibits the law of development of each growth component on time series. Through the comparative analysis of traditional shift-share method and the developed dynamic model, the later possesses advantages in three aspects: time span, analysis result and range of application. The dynamic model not only reveals the variation characteristics of each industrial department among various provinces, but offers quantitative analysis on industrial structure and varying trend of competitiveness from year to year. It facilitates the discovery of evolution patterns in six provinces in central China. The "Twelfth Five-Year Plan" period in China is meanwhile a key phase to achieve the "Rise of Central China"; the results of this paper provide scientific basis and direction for central China industrial structure adjustment.
{"title":"Research on Regional Economic and Industrial Structure Based on Dynamic Shift-share Analysis: An Empirical Analysis of Six Provinces in Central China","authors":"Z. Huaxiong, You Fang","doi":"10.1109/BCGIN.2011.24","DOIUrl":"https://doi.org/10.1109/BCGIN.2011.24","url":null,"abstract":"Shift-share analysis is an extensively used mathematical method for research on regional economy and industrial structure at home and abroad. It owns unique advantages as regard to synthesis and dynamics. Nevertheless, current studies at home mainly rest on the application of traditional relative static model with no consideration of time factor. With the introduction of dynamic thinking, this paper constructs dynamic time series to expand traditional model. It not only reveals the contribution each growth component makes to total growth, but exhibits the law of development of each growth component on time series. Through the comparative analysis of traditional shift-share method and the developed dynamic model, the later possesses advantages in three aspects: time span, analysis result and range of application. The dynamic model not only reveals the variation characteristics of each industrial department among various provinces, but offers quantitative analysis on industrial structure and varying trend of competitiveness from year to year. It facilitates the discovery of evolution patterns in six provinces in central China. The \"Twelfth Five-Year Plan\" period in China is meanwhile a key phase to achieve the \"Rise of Central China\"; the results of this paper provide scientific basis and direction for central China industrial structure adjustment.","PeriodicalId":127523,"journal":{"name":"2011 International Conference on Business Computing and Global Informatization","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115591611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Passive tracking of motive target is in difficulty and interacting multiple model (IMM) is the classical method that requires accurate and timely target maneuver detection. In order to passively locate moving target using aerial mobile observe, a new hybrid particle filter positioning algorithm is proposed based on bearings crossing locating method. According to the existing initialization problems of particle filter, the new algorithm gets the proposal distribution from bearings crossing locating method and generates the required particles by the constraints of angle measurement to state variables. It avoids the randomness when generating particles and brings down the number of required particles in high dimensional cases. As a result, the present algorithm reduces the computing costs and improves real-time performance of the particle filter. By simulation analysis with particle filter, the new algorithm shows the superior positioning ability to other methods.
{"title":"A Passive Locating Algorithm for Motive Target Based on Modified Particle Filter Method","authors":"Yang Kui, Huang Liang, L. Zhong, Zhang Guodong","doi":"10.1109/BCGIN.2011.99","DOIUrl":"https://doi.org/10.1109/BCGIN.2011.99","url":null,"abstract":"Passive tracking of motive target is in difficulty and interacting multiple model (IMM) is the classical method that requires accurate and timely target maneuver detection. In order to passively locate moving target using aerial mobile observe, a new hybrid particle filter positioning algorithm is proposed based on bearings crossing locating method. According to the existing initialization problems of particle filter, the new algorithm gets the proposal distribution from bearings crossing locating method and generates the required particles by the constraints of angle measurement to state variables. It avoids the randomness when generating particles and brings down the number of required particles in high dimensional cases. As a result, the present algorithm reduces the computing costs and improves real-time performance of the particle filter. By simulation analysis with particle filter, the new algorithm shows the superior positioning ability to other methods.","PeriodicalId":127523,"journal":{"name":"2011 International Conference on Business Computing and Global Informatization","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114473546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}