Pub Date : 2011-11-18DOI: 10.1109/EMEIT.2011.6080758
Chao Wang, Dequan Zheng, T. Zhao, Ji Guo
Mining bilingual parallel sentence pair from Web data is the most effective way to get large-scale of bilingual corpus. In this paper, we put forward both the set of method and the series of process for extracting parallel sentence pair from nonspecific web date source. considering 1.1 billion page as the web data input, with a sequence of steps we get several sentences pair which has 81% recall and 85% precision, on this basis we bring up a parameter for measure quality of sentence pair. After filter sentence pair by this parameter, we get 850 thousand unique sentence pairs. On filtering by this parameter, the precision increase to 95%, meanwhile the recall only decrease by 1%.
{"title":"A Feasible Process For Mining Corpus From Web","authors":"Chao Wang, Dequan Zheng, T. Zhao, Ji Guo","doi":"10.1109/EMEIT.2011.6080758","DOIUrl":"https://doi.org/10.1109/EMEIT.2011.6080758","url":null,"abstract":"Mining bilingual parallel sentence pair from Web data is the most effective way to get large-scale of bilingual corpus. In this paper, we put forward both the set of method and the series of process for extracting parallel sentence pair from nonspecific web date source. considering 1.1 billion page as the web data input, with a sequence of steps we get several sentences pair which has 81% recall and 85% precision, on this basis we bring up a parameter for measure quality of sentence pair. After filter sentence pair by this parameter, we get 850 thousand unique sentence pairs. On filtering by this parameter, the precision increase to 95%, meanwhile the recall only decrease by 1%.","PeriodicalId":216097,"journal":{"name":"Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114347050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-19DOI: 10.1109/EMEIT.2011.6023568
Zhiqiang Wei, Kaiyuan Shi, Dongning Jia
This paper provides a conceptual model for reducing bypass vulnerabilities in web applications. The typical and primary two kinds of bypass vulnerabilities are authentication and access control vulnerabilities. Authentication attacks occur when a web application authenticates users incorrectly and grants access for users without appropriate credentials. Access control attacks happen when access control check is incorrect or missing, allowing unauthorized access to privileged resources. Such attacks are getting increasingly common and have occurred in many famous web applications such as IIS and WordPress, and 14% of surveyed web sites [5]. However, currently no available tools or methods can prevent these attacks efficiently. By using Dynamic Information Flow Tracking (DIFT) techniques to track the flow of user credentials through the application's language runtime, the model presented in this paper can automatically detect when an application safely and correctly authenticates users. Then the model combines authentication information with programmer-supplied access control rules to automatically ensure that only properly authenticated users are granted access to privileged resources or data.
本文为减少web应用中的旁路漏洞提供了一个概念模型。典型的和主要的两种旁路漏洞是身份验证和访问控制漏洞。当web应用程序错误地对用户进行身份验证并授予没有适当凭据的用户访问权限时,就会发生身份验证攻击。访问控制攻击发生在访问控制检查不正确或缺失时,允许对特权资源进行未经授权的访问。这种攻击越来越普遍,在许多著名的web应用程序中都有发生,如IIS和WordPress, 14%的被调查网站[5]。然而,目前还没有有效的工具或方法可以有效地防止这些攻击。该模型采用动态信息流跟踪(Dynamic Information Flow Tracking, DIFT)技术在应用程序的语言运行库中跟踪用户凭证的流动,从而自动检测应用程序何时安全、正确地对用户进行身份验证。然后,该模型将身份验证信息与程序员提供的访问控制规则结合起来,自动确保只有经过适当身份验证的用户才被授予对特权资源或数据的访问权限。
{"title":"A conceptual model for preventing web bypass vulnerabilities","authors":"Zhiqiang Wei, Kaiyuan Shi, Dongning Jia","doi":"10.1109/EMEIT.2011.6023568","DOIUrl":"https://doi.org/10.1109/EMEIT.2011.6023568","url":null,"abstract":"This paper provides a conceptual model for reducing bypass vulnerabilities in web applications. The typical and primary two kinds of bypass vulnerabilities are authentication and access control vulnerabilities. Authentication attacks occur when a web application authenticates users incorrectly and grants access for users without appropriate credentials. Access control attacks happen when access control check is incorrect or missing, allowing unauthorized access to privileged resources. Such attacks are getting increasingly common and have occurred in many famous web applications such as IIS and WordPress, and 14% of surveyed web sites [5]. However, currently no available tools or methods can prevent these attacks efficiently. By using Dynamic Information Flow Tracking (DIFT) techniques to track the flow of user credentials through the application's language runtime, the model presented in this paper can automatically detect when an application safely and correctly authenticates users. Then the model combines authentication information with programmer-supplied access control rules to automatically ensure that only properly authenticated users are granted access to privileged resources or data.","PeriodicalId":216097,"journal":{"name":"Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114968479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-19DOI: 10.1109/EMEIT.2011.6023252
M. Duan, Boyin Li
According to the structure of compound grinder for grinding end face and inner hole of tappet body, this paper established the finite element (FE) model and presented the modal analysis of the compound grinder and its components by means of three-dimensional software and FE method. The first four natural frequencies and modal shapes of the compound grinder were given. As a result, the weaknesses of the compound grinder were determined and it offered the basis for improving dynamic property of the compound grinder.
{"title":"Modal analysis of compound grinder for grinding end face and inner hole","authors":"M. Duan, Boyin Li","doi":"10.1109/EMEIT.2011.6023252","DOIUrl":"https://doi.org/10.1109/EMEIT.2011.6023252","url":null,"abstract":"According to the structure of compound grinder for grinding end face and inner hole of tappet body, this paper established the finite element (FE) model and presented the modal analysis of the compound grinder and its components by means of three-dimensional software and FE method. The first four natural frequencies and modal shapes of the compound grinder were given. As a result, the weaknesses of the compound grinder were determined and it offered the basis for improving dynamic property of the compound grinder.","PeriodicalId":216097,"journal":{"name":"Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115147391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-19DOI: 10.1109/EMEIT.2011.6023003
Y. Hu, Xiaowang Guo, Jianyong Zhu
A RFID tag based wireless sensor test platform is proposed in this paper, the system build a real-time monitoring of sensor network platform by using RFID tag and WSN technology. By the combination of the wireless sensor nodes, and RFID technology, and other basic technology of things, the building of an intelligent wireless sensor monitoring platform is proposed, which can not only expand the wireless sensor network are aware of the depth and breadth of information, but also the real-time monitoring and positioning quality of the items can be achieved. In this paper, the overall design of the system is proposed and the system routing and positioning protocol is analyzed, the core technologies in design are discussed, and the system is a overall solution for comprehensive RFID-based wireless sensor network to monitor.
{"title":"Research on RFID-based monitoring platform for wireless sensor networks","authors":"Y. Hu, Xiaowang Guo, Jianyong Zhu","doi":"10.1109/EMEIT.2011.6023003","DOIUrl":"https://doi.org/10.1109/EMEIT.2011.6023003","url":null,"abstract":"A RFID tag based wireless sensor test platform is proposed in this paper, the system build a real-time monitoring of sensor network platform by using RFID tag and WSN technology. By the combination of the wireless sensor nodes, and RFID technology, and other basic technology of things, the building of an intelligent wireless sensor monitoring platform is proposed, which can not only expand the wireless sensor network are aware of the depth and breadth of information, but also the real-time monitoring and positioning quality of the items can be achieved. In this paper, the overall design of the system is proposed and the system routing and positioning protocol is analyzed, the core technologies in design are discussed, and the system is a overall solution for comprehensive RFID-based wireless sensor network to monitor.","PeriodicalId":216097,"journal":{"name":"Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115505713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-19DOI: 10.1109/EMEIT.2011.6023648
Wensheng Su, Fengtao Wang
Taking the respective advantages of LabView and Matlab, an on-line vibration signal analysis system of rolling bearing was designed and developed. First, system scheme design was introduced. Then each module of the system was discussed. Finally, system application examples were given, which verified the convenience and effectiveness of this system.
{"title":"Design and development of rolling bearing vibration signal analysis system","authors":"Wensheng Su, Fengtao Wang","doi":"10.1109/EMEIT.2011.6023648","DOIUrl":"https://doi.org/10.1109/EMEIT.2011.6023648","url":null,"abstract":"Taking the respective advantages of LabView and Matlab, an on-line vibration signal analysis system of rolling bearing was designed and developed. First, system scheme design was introduced. Then each module of the system was discussed. Finally, system application examples were given, which verified the convenience and effectiveness of this system.","PeriodicalId":216097,"journal":{"name":"Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123112897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-19DOI: 10.1109/EMEIT.2011.6022921
Danhong Li
We have designed the knuckle-joint press which can fit parametric variation. According to the theory about combining press devices' size design with similarity theory, we have designed knuckle-joint press's mechanical design by means of engineering limitation. We also have verified these designs for many times by comparing design model with formulations, which makes the whole design meet practical using. The methods which have been introduced here have great important roles on mechanical design.
{"title":"Similarity theory which used in knuckle-joint press design","authors":"Danhong Li","doi":"10.1109/EMEIT.2011.6022921","DOIUrl":"https://doi.org/10.1109/EMEIT.2011.6022921","url":null,"abstract":"We have designed the knuckle-joint press which can fit parametric variation. According to the theory about combining press devices' size design with similarity theory, we have designed knuckle-joint press's mechanical design by means of engineering limitation. We also have verified these designs for many times by comparing design model with formulations, which makes the whole design meet practical using. The methods which have been introduced here have great important roles on mechanical design.","PeriodicalId":216097,"journal":{"name":"Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123118920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-19DOI: 10.1109/EMEIT.2011.6024000
Jun-wei Sun, Ya Zhang
In order to get the real-time penetrating distance of the projectile and make it detonate in the predetermined depth, this article puts forward the algorithm of penetration distance based on normalization processing, using ANSYS/LS-DYNA software to simulate the process of projectile penetrating vertically into concrete targets through which the projectile penetration acceleration signal can be reached, reading the signal by utilizing the penetration distance detonation control module, and verifying the algorithm. The result indicates that the relative error of this algorithm is small, and it can also reduce the processing time of the microprocessor, which states that this algorithm is well-designed.
{"title":"The algorithm research of penetration distance based on normalization processing","authors":"Jun-wei Sun, Ya Zhang","doi":"10.1109/EMEIT.2011.6024000","DOIUrl":"https://doi.org/10.1109/EMEIT.2011.6024000","url":null,"abstract":"In order to get the real-time penetrating distance of the projectile and make it detonate in the predetermined depth, this article puts forward the algorithm of penetration distance based on normalization processing, using ANSYS/LS-DYNA software to simulate the process of projectile penetrating vertically into concrete targets through which the projectile penetration acceleration signal can be reached, reading the signal by utilizing the penetration distance detonation control module, and verifying the algorithm. The result indicates that the relative error of this algorithm is small, and it can also reduce the processing time of the microprocessor, which states that this algorithm is well-designed.","PeriodicalId":216097,"journal":{"name":"Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123120251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-19DOI: 10.1109/EMEIT.2011.6023970
Y. Xi, Kang Ping
Based on panel data collected for seven years (2003–2009) of 30 provinces, the efficiency of knowledge sharing in regional innovation in China was evaluated by DEA Malmquist indexes model. The result indicated that knowledge sharing efficiency of six regions was improved respectively. As the same time, technical efficiency of knowledge sharing process in West China grew fast because of the advantage of backwardness so that it can acquire and absorb knowledge more quickly. As being lack of satisfactory performance in the technical efficiency, cross-organization excitation mechanism that support cross-sector collaboration and knowledge transfer between institutions and locally industries were more or less unsatisfactory.
{"title":"Measuring the performance of knowledge sharing in regional innovation","authors":"Y. Xi, Kang Ping","doi":"10.1109/EMEIT.2011.6023970","DOIUrl":"https://doi.org/10.1109/EMEIT.2011.6023970","url":null,"abstract":"Based on panel data collected for seven years (2003–2009) of 30 provinces, the efficiency of knowledge sharing in regional innovation in China was evaluated by DEA Malmquist indexes model. The result indicated that knowledge sharing efficiency of six regions was improved respectively. As the same time, technical efficiency of knowledge sharing process in West China grew fast because of the advantage of backwardness so that it can acquire and absorb knowledge more quickly. As being lack of satisfactory performance in the technical efficiency, cross-organization excitation mechanism that support cross-sector collaboration and knowledge transfer between institutions and locally industries were more or less unsatisfactory.","PeriodicalId":216097,"journal":{"name":"Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115764794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-19DOI: 10.1109/EMEIT.2011.6023145
D. Zhang, Rui Wang, Jian Cai
In this paper, we present the model of reconfigurable monitoring based on Wireless Sensor Network (WSN), which merges the technology of reconfigurable virtual instrument and WSN. A set of multi-function monitoring instrument platform with WSN characteristic was developed by using Visual Studio software. This instrument can not only visually display the present topological graph of monitor area, but also enhance module reuse. Finally, a monitoring instrument, facing the equipment of hoist room in coal mine, was designed and constructed. The result shows the platform realizes reconfigurable function of the instrument module online and dynamically.
{"title":"Coal mine reconfigurable monitoring model based on Wireless Sensor Network","authors":"D. Zhang, Rui Wang, Jian Cai","doi":"10.1109/EMEIT.2011.6023145","DOIUrl":"https://doi.org/10.1109/EMEIT.2011.6023145","url":null,"abstract":"In this paper, we present the model of reconfigurable monitoring based on Wireless Sensor Network (WSN), which merges the technology of reconfigurable virtual instrument and WSN. A set of multi-function monitoring instrument platform with WSN characteristic was developed by using Visual Studio software. This instrument can not only visually display the present topological graph of monitor area, but also enhance module reuse. Finally, a monitoring instrument, facing the equipment of hoist room in coal mine, was designed and constructed. The result shows the platform realizes reconfigurable function of the instrument module online and dynamically.","PeriodicalId":216097,"journal":{"name":"Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116795544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-19DOI: 10.1109/EMEIT.2011.6023115
Yun-hang Zhu, Ping-hua Zhang, Ming-yuan Deng
Under the software environment of MATLAB/Simulink, the communication system of direct sequence spread spectrum (DSSS) is dynamically modeled and simulated over a new practical Rayleigh channel, and the relationship curves of the bit error rate (BER) with the signal-to-noise ratio (SNR) of DSSS communication systems are presented. It is analyzed that DSSS system can effectively overcome multipath fading in multipath Rayleigh Fading Channel (RFC). In addition, the anti-multipath fading performance improved by the way of increasing pseudo noise (PN) code length is better than that by the way of increasing the spread spectrum gain in the condition of strong multipath fading.
{"title":"Simulation research on direct sequence spread spectrum communication system over Rayleigh Fading Channels","authors":"Yun-hang Zhu, Ping-hua Zhang, Ming-yuan Deng","doi":"10.1109/EMEIT.2011.6023115","DOIUrl":"https://doi.org/10.1109/EMEIT.2011.6023115","url":null,"abstract":"Under the software environment of MATLAB/Simulink, the communication system of direct sequence spread spectrum (DSSS) is dynamically modeled and simulated over a new practical Rayleigh channel, and the relationship curves of the bit error rate (BER) with the signal-to-noise ratio (SNR) of DSSS communication systems are presented. It is analyzed that DSSS system can effectively overcome multipath fading in multipath Rayleigh Fading Channel (RFC). In addition, the anti-multipath fading performance improved by the way of increasing pseudo noise (PN) code length is better than that by the way of increasing the spread spectrum gain in the condition of strong multipath fading.","PeriodicalId":216097,"journal":{"name":"Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117202350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}