Pub Date : 2012-06-22DOI: 10.1109/ICSESS.2012.6269554
Han Yan
The network topology visualization technology can be researched from the following several aspects: (1) Study adaptability of network topology discovery. It needs a kind of algorithm which can quickly detect the network topology of a completely unknown structural network. (2) Multiple effect integration of Visualization technology. The current network topology management system usually only use a single visual tools to visualization data. As Web technology development and graphics processing technology development, AIR technology and the 3D technology is more and more widely used. If they can be used into the network topology visualization design and implementation, Visualization effect will reach a new high level. (3) The integration of network topology visualization technology and network management. Although the point of network topology visualization is visualization, it should include more modern network management functions, in order to truly realize the value of the technology research.
{"title":"The study on network topology discovery algorithm based on SNMP protocol and ICMP protocol","authors":"Han Yan","doi":"10.1109/ICSESS.2012.6269554","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269554","url":null,"abstract":"The network topology visualization technology can be researched from the following several aspects: (1) Study adaptability of network topology discovery. It needs a kind of algorithm which can quickly detect the network topology of a completely unknown structural network. (2) Multiple effect integration of Visualization technology. The current network topology management system usually only use a single visual tools to visualization data. As Web technology development and graphics processing technology development, AIR technology and the 3D technology is more and more widely used. If they can be used into the network topology visualization design and implementation, Visualization effect will reach a new high level. (3) The integration of network topology visualization technology and network management. Although the point of network topology visualization is visualization, it should include more modern network management functions, in order to truly realize the value of the technology research.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124103622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-22DOI: 10.1109/ICSESS.2012.6269466
Jingjing Li, Chunlin Peng
This paper proposes a jQuery-based Ajax general interactive architecture under the research and summary of lots of Ajax application examples. This architecture designs and implements a general Ajax standard interactive model which comparing to traditional process, can effectively conceal the complex Ajax handling mechanism, swiftly realize the Ajax process and reduce the work of exploration.
{"title":"jQuery-based Ajax general interactive architecture","authors":"Jingjing Li, Chunlin Peng","doi":"10.1109/ICSESS.2012.6269466","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269466","url":null,"abstract":"This paper proposes a jQuery-based Ajax general interactive architecture under the research and summary of lots of Ajax application examples. This architecture designs and implements a general Ajax standard interactive model which comparing to traditional process, can effectively conceal the complex Ajax handling mechanism, swiftly realize the Ajax process and reduce the work of exploration.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129245035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-22DOI: 10.1109/ICSESS.2012.6269530
Hengbo Du, Yanfeng Xu
21st century is the century of the ocean, therefore, competing in the ocean and developing the ocean resources in depth is an irresistible trend. Shandong peninsula blue economic zone needs the evaluation method which can reflect the talent's ecological environment competitiveness, so as to provide the basis for the government's scientific decision. Based on the literature review and depth interview, the paper established evaluation index system of talent's ecological environmental competitiveness in Shandong peninsula blue economic zone. The weight of each index is assigned by the method of analytic hierarchy process. In the end, fuzzy comprehensive evaluation model on the talent's ecological environmental competitiveness of Shandong peninsula blue economic zone is established.
{"title":"Evaluation on the talent's ecological environmental competitiveness of shandong peninsula blue economic zone","authors":"Hengbo Du, Yanfeng Xu","doi":"10.1109/ICSESS.2012.6269530","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269530","url":null,"abstract":"21st century is the century of the ocean, therefore, competing in the ocean and developing the ocean resources in depth is an irresistible trend. Shandong peninsula blue economic zone needs the evaluation method which can reflect the talent's ecological environment competitiveness, so as to provide the basis for the government's scientific decision. Based on the literature review and depth interview, the paper established evaluation index system of talent's ecological environmental competitiveness in Shandong peninsula blue economic zone. The weight of each index is assigned by the method of analytic hierarchy process. In the end, fuzzy comprehensive evaluation model on the talent's ecological environmental competitiveness of Shandong peninsula blue economic zone is established.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116008325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-22DOI: 10.1109/ICSESS.2012.6269517
A. Costanzo, A. Faro
Mobility and logistics activities could be supported effectively if the mobile users may know the best path to destination and the loading and unloading paths by means of navigators based on the current traffic and weather conditions. Also, personal data as well user preferences should be considered by the navigators to generate effective recommendations. However, not all the relevant data may be known in a precise way since they often derive from statistical information, as well as knowing all the real time information is not always feasible due to the high cost of the sensing systems. Moreover, we don't have simple mathematical models able to generate fast right recommendations, as required in the rapidly evolving scenarios featuring the activities of walking and driving people. For this reason, the paper aims at illustrating how fuzzy logic may be used for computing measurements and perceptions by qualitative rules and to generate timely recommendations helpful to mobile users. These recommendations will consider the environmental conditions in real time, the current personal constraints and the preferences expressed in the past by the users. The paper not only proposes the methodology, but also illustrates how a Ruby on Rails server provided with a proper JQMobile interface may offer such location intelligence services taking also advantage from the information coming from social networks. A Flash Builder version to save the RoR server time and to improve privacy is also illustrated.
如果移动用户可以根据当前的交通和天气条件,通过导航器知道到达目的地的最佳路径和装卸路径,则可以有效地支持移动和物流活动。此外,导航器应该考虑个人数据以及用户偏好,以生成有效的推荐。然而,并非所有相关数据都可以以精确的方式了解,因为它们通常来自统计信息,并且由于传感系统的高成本,了解所有实时信息并不总是可行的。此外,我们没有简单的数学模型能够快速生成正确的建议,而这在以步行和开车为特征的快速发展的场景中是必需的。出于这个原因,本文旨在说明模糊逻辑如何通过定性规则用于计算测量和感知,并生成对移动用户有用的及时建议。这些建议将实时考虑环境条件、当前的个人限制和用户过去表达的偏好。本文不仅提出了方法,还说明了Ruby on Rails服务器如何提供适当的JQMobile接口,从而利用来自社交网络的信息提供此类位置智能服务。还说明了一个Flash Builder版本,它可以节省RoR服务器的时间并提高隐私性。
{"title":"A fuzzy mobile recommender system: JQMobile vs FlashBuilder implementations","authors":"A. Costanzo, A. Faro","doi":"10.1109/ICSESS.2012.6269517","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269517","url":null,"abstract":"Mobility and logistics activities could be supported effectively if the mobile users may know the best path to destination and the loading and unloading paths by means of navigators based on the current traffic and weather conditions. Also, personal data as well user preferences should be considered by the navigators to generate effective recommendations. However, not all the relevant data may be known in a precise way since they often derive from statistical information, as well as knowing all the real time information is not always feasible due to the high cost of the sensing systems. Moreover, we don't have simple mathematical models able to generate fast right recommendations, as required in the rapidly evolving scenarios featuring the activities of walking and driving people. For this reason, the paper aims at illustrating how fuzzy logic may be used for computing measurements and perceptions by qualitative rules and to generate timely recommendations helpful to mobile users. These recommendations will consider the environmental conditions in real time, the current personal constraints and the preferences expressed in the past by the users. The paper not only proposes the methodology, but also illustrates how a Ruby on Rails server provided with a proper JQMobile interface may offer such location intelligence services taking also advantage from the information coming from social networks. A Flash Builder version to save the RoR server time and to improve privacy is also illustrated.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116953241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-22DOI: 10.1109/ICSESS.2012.6269425
Xiaohui Cheng, Anming Xu
This paper expounds a predictable and adaptive management of the embedded system dynamic memory. The solution puts the survivable design in a memory static area and partitions in dynamic area again. It puts those similar objects in the object pool subarea, and the other applicants are distributed in normal subarea. Both subareas adjust the size by transmitting parameters. In normal subarea, the paper puts forward predictable mechanism for the first time. Besides, by introducing a new data structure and combining classic buddy algorithm, it improves the adaptive algorithm of delay recovery with statistical data and applicant time interval. Finally the solution is confirmed more safely and efficiently by simulation experiments.
{"title":"A new remory management mechanism based on embedded system","authors":"Xiaohui Cheng, Anming Xu","doi":"10.1109/ICSESS.2012.6269425","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269425","url":null,"abstract":"This paper expounds a predictable and adaptive management of the embedded system dynamic memory. The solution puts the survivable design in a memory static area and partitions in dynamic area again. It puts those similar objects in the object pool subarea, and the other applicants are distributed in normal subarea. Both subareas adjust the size by transmitting parameters. In normal subarea, the paper puts forward predictable mechanism for the first time. Besides, by introducing a new data structure and combining classic buddy algorithm, it improves the adaptive algorithm of delay recovery with statistical data and applicant time interval. Finally the solution is confirmed more safely and efficiently by simulation experiments.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"285 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127398945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-22DOI: 10.1109/ICSESS.2012.6269437
X. Zeng, Qing Liu
Enterprises safety management with the characteristics of long-term, complexity and indirect benefits determines inland river shipping enterprises to make inadequate investments. It is significant that evaluate the inland river shipping enterprises' level of safety management for enterprises to find out hidden danger, to prevent the occurrence of major accident, and to improve safety assurance ability. This article starts by demonstrating the necessity of evaluating the safety management on behalf of inland river shipping enterprises. Then it builds an evaluation model of inland river shipping enterprises' safety management based on triangular fuzzy number. And it ends with an empirical study in the hope of offering references for China Inland River shipping enterprises.
{"title":"Study on the evaluation of inland river shipping enterprises' safety management level based on triangular fuzzy number","authors":"X. Zeng, Qing Liu","doi":"10.1109/ICSESS.2012.6269437","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269437","url":null,"abstract":"Enterprises safety management with the characteristics of long-term, complexity and indirect benefits determines inland river shipping enterprises to make inadequate investments. It is significant that evaluate the inland river shipping enterprises' level of safety management for enterprises to find out hidden danger, to prevent the occurrence of major accident, and to improve safety assurance ability. This article starts by demonstrating the necessity of evaluating the safety management on behalf of inland river shipping enterprises. Then it builds an evaluation model of inland river shipping enterprises' safety management based on triangular fuzzy number. And it ends with an empirical study in the hope of offering references for China Inland River shipping enterprises.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124301982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-22DOI: 10.1109/ICSESS.2012.6269461
E. Valentikova, A. Lieskovsky, M. Zábovský
Data warehouse fragmentation is one of the main problems in distributed data warehouse (DDW) design. The first step in DDW design, which in fact affects overall solution, is the definition of fragments. In this work we present our approach to improve fragment allocation by their ordering before allocation process.
{"title":"Fragment pattern for data warehouse","authors":"E. Valentikova, A. Lieskovsky, M. Zábovský","doi":"10.1109/ICSESS.2012.6269461","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269461","url":null,"abstract":"Data warehouse fragmentation is one of the main problems in distributed data warehouse (DDW) design. The first step in DDW design, which in fact affects overall solution, is the definition of fragments. In this work we present our approach to improve fragment allocation by their ordering before allocation process.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122772473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-22DOI: 10.1109/ICSESS.2012.6269427
Yanjun Lu, Junying Wang
A brief introduction of the principle of correlation detection is present in this paper. As portable field-test equipment, an optical densitometer is designed with correlation detection technology to increase detection precision. In the process of designing, cross-correlation is applied to extract weak signal from strong noise. Simulation result with MATLAB shows that the correlation detection processed good performance in this application.
{"title":"Application research of correlation detection technology in optical densitometer","authors":"Yanjun Lu, Junying Wang","doi":"10.1109/ICSESS.2012.6269427","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269427","url":null,"abstract":"A brief introduction of the principle of correlation detection is present in this paper. As portable field-test equipment, an optical densitometer is designed with correlation detection technology to increase detection precision. In the process of designing, cross-correlation is applied to extract weak signal from strong noise. Simulation result with MATLAB shows that the correlation detection processed good performance in this application.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122097093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-22DOI: 10.1109/ICSESS.2012.6269507
Xiaomin Wan, Xiaoguang Mao, Ziying Dai
Software errors significantly impact software quality, and improvement of fault localization can reduce the expense of debugging. SBFL is promising approach and have received a lot of attention due to its simplicity and effectiveness. However, there are still some limits in this approach. In this paper we address these limits and present a technique to build a novel behavioral model, and propose a corresponding fault localization technique. Furthermore, we performed a study to empirically validate the effectiveness of our approach. And experimental results indicated that our method outperformed other representative SBFL techniques in locating faults in the benchmark. We show that the effectiveness of the technique comes from the guidance of hierarchical behavioral model.
{"title":"Fault localization via behavioral models","authors":"Xiaomin Wan, Xiaoguang Mao, Ziying Dai","doi":"10.1109/ICSESS.2012.6269507","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269507","url":null,"abstract":"Software errors significantly impact software quality, and improvement of fault localization can reduce the expense of debugging. SBFL is promising approach and have received a lot of attention due to its simplicity and effectiveness. However, there are still some limits in this approach. In this paper we address these limits and present a technique to build a novel behavioral model, and propose a corresponding fault localization technique. Furthermore, we performed a study to empirically validate the effectiveness of our approach. And experimental results indicated that our method outperformed other representative SBFL techniques in locating faults in the benchmark. We show that the effectiveness of the technique comes from the guidance of hierarchical behavioral model.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123252317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-22DOI: 10.1109/ICSESS.2012.6269509
Wujie Zhou, Deping Zhang
Combinatorial interaction testing (CIT) is a method to detect the fault interactions among the parameters or components in a system. However the most works in the field of combinatorial interaction testing focus on detecting interaction faults rather than locating them. (d, t)-locating arrays and (d, t)-detecting arrays were proposed by C. J. Colbourn and D. W. McClary to locate and detect the interaction fault. In the paper, we study the structure of the special fault locating array that is able to locate sole interaction fault among the parameters or components, namely (1, t)-detecting arrays, and then propose the concept and construction method of approximate error locating array based on the special error locating array. The AETG-like algorithms to generate these special arrays are provided.
组合交互测试(CIT)是一种检测系统中各参数或部件之间的故障交互的方法。然而,组合交互测试领域的大部分工作都集中在检测交互故障而不是定位交互故障上。C. J. Colbourn和d . W. McClary提出了(d, t)定位阵列和(d, t)检测阵列来定位和检测交互故障。本文研究了能够定位各参数或部件之间唯一相互作用故障的专用故障定位阵列的结构,即(1,t)检测阵列,并在此基础上提出了近似误差定位阵列的概念和构造方法。提供了生成这些特殊数组的类似aetg的算法。
{"title":"Sole error locating array and approximate error locating array","authors":"Wujie Zhou, Deping Zhang","doi":"10.1109/ICSESS.2012.6269509","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269509","url":null,"abstract":"Combinatorial interaction testing (CIT) is a method to detect the fault interactions among the parameters or components in a system. However the most works in the field of combinatorial interaction testing focus on detecting interaction faults rather than locating them. (d, t)-locating arrays and (d, t)-detecting arrays were proposed by C. J. Colbourn and D. W. McClary to locate and detect the interaction fault. In the paper, we study the structure of the special fault locating array that is able to locate sole interaction fault among the parameters or components, namely (1, t)-detecting arrays, and then propose the concept and construction method of approximate error locating array based on the special error locating array. The AETG-like algorithms to generate these special arrays are provided.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128382528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}