Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711208
Young-Dong Lee, Do-Un Jeong, Hoon-Jae Lee
This paper aims to analyze wireless link quality like received signal strength indicator (RSSI) and link quality indicator (LQI) in IEEE 802.15.4 based wireless sensor networks. Our experiments are performed on Chipcon CC2420 radios, which comply with the IEEE 802.15.4. In order to measure the performance of LQI, RSSI and PRR in IEEE 802.15.4 based wireless sensor networks, the experiments were conducted by varying distances between transmitter and base-station and transmit power level. Our experimental results show that the PRR depends on some factors such as LQI and RSSI including the distance between transmitter and base-station and the location of each of the sensor nodes.
{"title":"Performance analysis of wireless link quality in wireless sensor networks","authors":"Young-Dong Lee, Do-Un Jeong, Hoon-Jae Lee","doi":"10.1109/ICCIT.2010.5711208","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711208","url":null,"abstract":"This paper aims to analyze wireless link quality like received signal strength indicator (RSSI) and link quality indicator (LQI) in IEEE 802.15.4 based wireless sensor networks. Our experiments are performed on Chipcon CC2420 radios, which comply with the IEEE 802.15.4. In order to measure the performance of LQI, RSSI and PRR in IEEE 802.15.4 based wireless sensor networks, the experiments were conducted by varying distances between transmitter and base-station and transmit power level. Our experimental results show that the PRR depends on some factors such as LQI and RSSI including the distance between transmitter and base-station and the location of each of the sensor nodes.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128346232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711075
C. Fang, Hu Bei
The problem of entrepreneurship in industrial clusters has increasingly become the focal question in the study of regional economy. By investigating and studying the cases of the entrepreneurs from five big industrial clusters in our country, the paper proposes the incubation subjects, incubation environments and incubation atmospheres of the enterprising talents in industrial clusters, builds the evaluation cables of industrial clusters' venture incubation and venture performance, and tests its reliability and validity. Furthermore, multiple linear regression analysis method is applied to analyze the influences of venture incubation factors on venture performance in industrial clusters. Eight factors such as venture incubation subjects, incubation environments and incubation atmospheres are taken as multiple independent variables; two dimensions of venture performance are taken as dependent variables; and then all entry regression analysis method is applied to build a multiple linear regression equation of venture performance. All of the above studies have tested the influences and associate effects of the entrepreneurs' incubation system in industrial clusters on the venture performance and have revealed the mechanism of this system.
{"title":"Research on incubation mechanism of entrepreneurs in the industrial cluster","authors":"C. Fang, Hu Bei","doi":"10.1109/ICCIT.2010.5711075","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711075","url":null,"abstract":"The problem of entrepreneurship in industrial clusters has increasingly become the focal question in the study of regional economy. By investigating and studying the cases of the entrepreneurs from five big industrial clusters in our country, the paper proposes the incubation subjects, incubation environments and incubation atmospheres of the enterprising talents in industrial clusters, builds the evaluation cables of industrial clusters' venture incubation and venture performance, and tests its reliability and validity. Furthermore, multiple linear regression analysis method is applied to analyze the influences of venture incubation factors on venture performance in industrial clusters. Eight factors such as venture incubation subjects, incubation environments and incubation atmospheres are taken as multiple independent variables; two dimensions of venture performance are taken as dependent variables; and then all entry regression analysis method is applied to build a multiple linear regression equation of venture performance. All of the above studies have tested the influences and associate effects of the entrepreneurs' incubation system in industrial clusters on the venture performance and have revealed the mechanism of this system.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129273079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711220
N. Kim, Yongwoo Nam, Tae Yong Kim, HeungKuk Jo, Hoon-Jae Lee
Existing certificates in online financial and security transaction area are stored in mobile device stogare; the private key corresponding to the user's public key certificates is encrypted by the user password and then stored in a file. However the present management system facing some issues to access the public certificates locally. For example: certificate password disclosure, Key logger attacks, MITM attack and etc. In the study we propose a mobile public certificate management application to resolve the existing problem.
{"title":"Study of certificates management by mobile device with bluetooth","authors":"N. Kim, Yongwoo Nam, Tae Yong Kim, HeungKuk Jo, Hoon-Jae Lee","doi":"10.1109/ICCIT.2010.5711220","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711220","url":null,"abstract":"Existing certificates in online financial and security transaction area are stored in mobile device stogare; the private key corresponding to the user's public key certificates is encrypted by the user password and then stored in a file. However the present management system facing some issues to access the public certificates locally. For example: certificate password disclosure, Key logger attacks, MITM attack and etc. In the study we propose a mobile public certificate management application to resolve the existing problem.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124663156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711055
Guoxin Tan, Tanghai Liu
It is a very challenging task to interactively build a realistic character model. In this paper, by introducing the stretching model and the vector differential adjustor, a character modeling method based on vector difference is proposed. With this method, firstly, a reference model, a vertical stretching model and a horizontal stretching model are constructed in accordance with the model structure of the human body; secondly, the vector differences of control points are obtained between the horizontal stretching model and the reference model, and between the vertical stretching model and the reference model; and then a vector difference adjustor is employed to interactively adjust the control points in the reference model; lastly, a realistic character model is automatically generated based on the control points' coordinates. Experimental results show that this method can overcome the problems associated with other methods, such as: the need to master professional model software, system requirements for large cumbersome model databases, cracks or holes generated in the result model, and make it easy for users to interactively build a realistic character model.
{"title":"Realistic character modeling based on vector difference","authors":"Guoxin Tan, Tanghai Liu","doi":"10.1109/ICCIT.2010.5711055","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711055","url":null,"abstract":"It is a very challenging task to interactively build a realistic character model. In this paper, by introducing the stretching model and the vector differential adjustor, a character modeling method based on vector difference is proposed. With this method, firstly, a reference model, a vertical stretching model and a horizontal stretching model are constructed in accordance with the model structure of the human body; secondly, the vector differences of control points are obtained between the horizontal stretching model and the reference model, and between the vertical stretching model and the reference model; and then a vector difference adjustor is employed to interactively adjust the control points in the reference model; lastly, a realistic character model is automatically generated based on the control points' coordinates. Experimental results show that this method can overcome the problems associated with other methods, such as: the need to master professional model software, system requirements for large cumbersome model databases, cracks or holes generated in the result model, and make it easy for users to interactively build a realistic character model.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121286271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711201
Cheng Yongpan, Zhang Jili, Mu Xianmin, Ma Jin-xing
In order to solve the serious problem of high energy consumption in large public buildings, lots of building energy monitoring systems (BEMS) have been established all over the whole country in recent years. The application of the Internet of Things (IoT) in building field will certainly raise the function of building auto control technology, and reform the monitoring control situation of building equipment system. BEMS owns obvious Internet of Things features. Then, this paper puts forward the concept of the internet of building energy systems (IBES), and demonstrates the theoretical frame and function of each layer. IBES would establish the industry standards which are based on the Internet of Things in the building energy field, and suit for building energy management. With the support of IBES, the corresponding diagnosis can be feed back after analyzing the data. Finally, this paper introduces the functions of the databases and sets of software.
{"title":"Study on the theoretical framework of the internet of building energy systems","authors":"Cheng Yongpan, Zhang Jili, Mu Xianmin, Ma Jin-xing","doi":"10.1109/ICCIT.2010.5711201","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711201","url":null,"abstract":"In order to solve the serious problem of high energy consumption in large public buildings, lots of building energy monitoring systems (BEMS) have been established all over the whole country in recent years. The application of the Internet of Things (IoT) in building field will certainly raise the function of building auto control technology, and reform the monitoring control situation of building equipment system. BEMS owns obvious Internet of Things features. Then, this paper puts forward the concept of the internet of building energy systems (IBES), and demonstrates the theoretical frame and function of each layer. IBES would establish the industry standards which are based on the Internet of Things in the building energy field, and suit for building energy management. With the support of IBES, the corresponding diagnosis can be feed back after analyzing the data. Finally, this paper introduces the functions of the databases and sets of software.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121595250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711136
Pardeep Kumar, Md. Iftekhar Salam, A. G. Reza, H. Lim, Hoon-Jae Lee
In this paper, we quantify the performance analysis of PingPong-128 keystream generator for wireless sensor networks. Although, PingPong-128 is not a standard stream cipher but still PingPong-128 keystream generator is an idea for resource constrained WSNs and can be widely used in the applications of secure communication, where the communication nodes have limited computation processing and storage capabilities while requiring sufficient levels of security. We present a performance comparison of PingPong-128 with other stream ciphers selected in European Project Ecrypt called eSTREAM project, namely Dragon, HC-128, and Rabbit. Apart from that, we are also considering RC-4 stream ciphers for comparison with pingpong-128 for wireless sensor networks.
{"title":"Performance analysis of PingPong-128 keystream generator for wireless sensor networks","authors":"Pardeep Kumar, Md. Iftekhar Salam, A. G. Reza, H. Lim, Hoon-Jae Lee","doi":"10.1109/ICCIT.2010.5711136","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711136","url":null,"abstract":"In this paper, we quantify the performance analysis of PingPong-128 keystream generator for wireless sensor networks. Although, PingPong-128 is not a standard stream cipher but still PingPong-128 keystream generator is an idea for resource constrained WSNs and can be widely used in the applications of secure communication, where the communication nodes have limited computation processing and storage capabilities while requiring sufficient levels of security. We present a performance comparison of PingPong-128 with other stream ciphers selected in European Project Ecrypt called eSTREAM project, namely Dragon, HC-128, and Rabbit. Apart from that, we are also considering RC-4 stream ciphers for comparison with pingpong-128 for wireless sensor networks.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122240759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711090
J. Krueger, M. Grund, Martin Boissier, A. Zeier, H. Plattner
Traditionally, enterprise data management is divided into separate systems. Online Transaction Processing (OLTP) systems are focused on the day to day business by being optimized for retrieving and modifying complete entities. Online Analytical Processing (OLAP) systems initiate queries on specific attributes as these applications are optimized to support decision making based on the information gathered from many instances. In parallel both hardware and database applications are subject to steady improvements. For example, today's size of main memory in combination with the column oriented organization of data offer completely new possibilities such as real time analytical ad hoc queries on transactional data. Especially latest development in the area of main memory database systems raises the question whether those databases are capable of handling both OLAP and OLTP workloads in one system. This Paper discusses requirements for main memory database systems managing both workloads and analyses using appropriate data structures.
{"title":"Data structures for mixed workloads in in-memory databases","authors":"J. Krueger, M. Grund, Martin Boissier, A. Zeier, H. Plattner","doi":"10.1109/ICCIT.2010.5711090","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711090","url":null,"abstract":"Traditionally, enterprise data management is divided into separate systems. Online Transaction Processing (OLTP) systems are focused on the day to day business by being optimized for retrieving and modifying complete entities. Online Analytical Processing (OLAP) systems initiate queries on specific attributes as these applications are optimized to support decision making based on the information gathered from many instances. In parallel both hardware and database applications are subject to steady improvements. For example, today's size of main memory in combination with the column oriented organization of data offer completely new possibilities such as real time analytical ad hoc queries on transactional data. Especially latest development in the area of main memory database systems raises the question whether those databases are capable of handling both OLAP and OLTP workloads in one system. This Paper discusses requirements for main memory database systems managing both workloads and analyses using appropriate data structures.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132353847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
CDHL algorithm is a new hybrid range-free localization algorithm, which combines the Centroid and DV-Hop algorithms. The basic theory of the algorithm was introduced in this paper, and the average localization error rate of this hybrid algorithm is discussed and the algorithm energy consumption is analyzed. Simulation experiments show that the proposed algorithm is effective on different network situations, and the energy consumption is in low level. The localization accuracy of the proposed algorithm has been improved by 5%–7% compared with DV-Hop.
{"title":"CDHL algorithm and its experimental research","authors":"Yu Tang, Zhiyi Fang, Nannan Wang, Kaige Yan, Hanfei Sun, Hongyu Sun, Yongbo Ma, Tianyang Wang","doi":"10.1109/ICCIT.2010.5711043","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711043","url":null,"abstract":"CDHL algorithm is a new hybrid range-free localization algorithm, which combines the Centroid and DV-Hop algorithms. The basic theory of the algorithm was introduced in this paper, and the average localization error rate of this hybrid algorithm is discussed and the algorithm energy consumption is analyzed. Simulation experiments show that the proposed algorithm is effective on different network situations, and the energy consumption is in low level. The localization accuracy of the proposed algorithm has been improved by 5%–7% compared with DV-Hop.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"25 7-8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132606024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711102
G. Kim
Multiple line graphs that represent a large amount of everyday data are commonly used in business and in the finance industry. Color has become a useful addition to such complicated graphs to allow graph-readers to obtain relevant information quickly and easily. Although previous color research revealed that color contrast attracts human attention, a perceived and salient feature of multiple color combinations have not been clearly evident in a graph reading context. This study examines the effect of three color combinations on the user's perceived attentiveness level and usability of using a three-line graph. This research aims (1) to theoretically contribute color science domain with a graph comprehension aspect, (2) to design a quantitative experiment by measuring objective usability and subjective affective state, and (3) to understand the moderating effects of task types on reading of a pop-out line graph.
{"title":"The effect of color combination and attention on usability of graph reading tasks","authors":"G. Kim","doi":"10.1109/ICCIT.2010.5711102","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711102","url":null,"abstract":"Multiple line graphs that represent a large amount of everyday data are commonly used in business and in the finance industry. Color has become a useful addition to such complicated graphs to allow graph-readers to obtain relevant information quickly and easily. Although previous color research revealed that color contrast attracts human attention, a perceived and salient feature of multiple color combinations have not been clearly evident in a graph reading context. This study examines the effect of three color combinations on the user's perceived attentiveness level and usability of using a three-line graph. This research aims (1) to theoretically contribute color science domain with a graph comprehension aspect, (2) to design a quantitative experiment by measuring objective usability and subjective affective state, and (3) to understand the moderating effects of task types on reading of a pop-out line graph.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133172505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711063
Koun-Tem Sun, Hsin-Te Chan, Kuan-Chien Meng
In the recent years, e-learning have been developing following the trends of modern times. It can solve the restrictions of time and space and act as a second choice for students' learning activities. With the help of improved hardware performances, the technologies of 3D and virtual reality are now adopted by personal computer users. How to make use of the special space narration ability of virtual reality has become a new topic for the field of educational research. The subject of this research are fifth graders. Using 3D rendering and virtual realty, its is hoped to develop a sketch learning system that can design and develop teaching strategies and learning activities. Through clinical teaching, the results of different teaching methods in teaching higher graders to sketch were analyzed. The research found that the teaching outcomes of VR and conventional teaching methods were very similar. These results can serve as a reference for 3D material rendering and virtual reality education development on painting and creativity education.
{"title":"Research on the application of virtual reality on arts core curricula","authors":"Koun-Tem Sun, Hsin-Te Chan, Kuan-Chien Meng","doi":"10.1109/ICCIT.2010.5711063","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711063","url":null,"abstract":"In the recent years, e-learning have been developing following the trends of modern times. It can solve the restrictions of time and space and act as a second choice for students' learning activities. With the help of improved hardware performances, the technologies of 3D and virtual reality are now adopted by personal computer users. How to make use of the special space narration ability of virtual reality has become a new topic for the field of educational research. The subject of this research are fifth graders. Using 3D rendering and virtual realty, its is hoped to develop a sketch learning system that can design and develop teaching strategies and learning activities. Through clinical teaching, the results of different teaching methods in teaching higher graders to sketch were analyzed. The research found that the teaching outcomes of VR and conventional teaching methods were very similar. These results can serve as a reference for 3D material rendering and virtual reality education development on painting and creativity education.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"287 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134470903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}