In this paper, the boundedness for the multilinear commutators generated by θ-type Calderon-Zygmund operator with Lipschitz function is discussed, and we conclude that it is bounded on Herz-Hardy spaces.
{"title":"Boundedness for Multilinear Commutators of theta-type Calderón-Zygmund Operator on Herz-Hardy Spaces","authors":"R. Xie, Hailian Wang","doi":"10.1109/ICCIS.2012.96","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.96","url":null,"abstract":"In this paper, the boundedness for the multilinear commutators generated by θ-type Calderon-Zygmund operator with Lipschitz function is discussed, and we conclude that it is bounded on Herz-Hardy spaces.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128484168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the rapid development of information technology, the computer has been more and more important in our lives. Especially it makes our working, learning and entertainments, and even consumptions dependent on the computer increasingly because of the popularity of network. However, the computer has brought us a lot of convenience, while it also makes us face with a variety of security risks. Computer viruses and Trojans become the most important factor of the hazards of computer security. This article proposes the security defense technology based on the Linux process real-time monitoring to prevent malicious processes running from the operating system kernel level. By preventing unauthorized programs and drivers to run, we can effectively prevent the Trojan horse and virus such as machine dog, and avoid being attacked maliciously. This paper introduces the principle, theoretical model and the technologies in the implementation of the security defense technology based on the Linux process real-time monitoring.
{"title":"The Research and Implementation of the Linux Process Real-Time Monitoring Technology","authors":"Wu Kehi, Ge Yueguang, Chen Wei, Zhang Tong","doi":"10.1109/ICCIS.2012.342","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.342","url":null,"abstract":"With the rapid development of information technology, the computer has been more and more important in our lives. Especially it makes our working, learning and entertainments, and even consumptions dependent on the computer increasingly because of the popularity of network. However, the computer has brought us a lot of convenience, while it also makes us face with a variety of security risks. Computer viruses and Trojans become the most important factor of the hazards of computer security. This article proposes the security defense technology based on the Linux process real-time monitoring to prevent malicious processes running from the operating system kernel level. By preventing unauthorized programs and drivers to run, we can effectively prevent the Trojan horse and virus such as machine dog, and avoid being attacked maliciously. This paper introduces the principle, theoretical model and the technologies in the implementation of the security defense technology based on the Linux process real-time monitoring.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129042299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As the volume of information in the Deep Web grows, a Deep Web data source classification algorithm based on query interface context is presented. Two methods are combined to get the search interface similarity. One is based on the vector space. The classical TF-IDF statistics are used to gain the similarity between search interfaces. The other is to compute the two pages semantic similarity by the use of HowNet. Based on the K-NN algorithm, a WDB classification algorithm is presented. Experimental results show this algorithm generates high-quality clusters, measured both in terms of entropy and F-measure. It indicates the practical value of application.
{"title":"Deep Web Data Source Classification Based on Query Interface Context","authors":"Zilu Cui, Yuchen Fu","doi":"10.1109/ICCIS.2012.117","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.117","url":null,"abstract":"As the volume of information in the Deep Web grows, a Deep Web data source classification algorithm based on query interface context is presented. Two methods are combined to get the search interface similarity. One is based on the vector space. The classical TF-IDF statistics are used to gain the similarity between search interfaces. The other is to compute the two pages semantic similarity by the use of HowNet. Based on the K-NN algorithm, a WDB classification algorithm is presented. Experimental results show this algorithm generates high-quality clusters, measured both in terms of entropy and F-measure. It indicates the practical value of application.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124655221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to solve the problems such as low teaching efficiency and backward teaching method of basketball course in higher vocational colleges, and realize the interworking and sharing of basketball course teaching recourses, a basketball course CAI teaching platform based on Web is designed. The design of this platform, combining subject characteristics of basketball course, uses Windows NT 4/2000Server as operating system platform, Microsoft SQL Server 7.0 as RDBMS, NAS for data storage and flow technology for video service. The basketball course CAI teaching platform based on Web Service can realize the dynamic integration of basketball course teaching resources and it has good integration, openness and encapsulation. The design scheme of basketball course CAI teaching platform based on Web Service can effectively solve and help the interconnection, interworking of basketball course PE teaching resources and adapt to the informatization development demands of PE teaching.
为解决高职院校篮球课程教学效率低、教学方法落后等问题,实现篮球课程教学资源的互通与共享,设计了基于Web的篮球课程CAI教学平台。本平台的设计结合篮球课程的学科特点,采用Windows NT 4/2000Server作为操作系统平台,Microsoft SQL Server 7.0作为RDBMS, NAS作为数据存储,流技术作为视频服务。基于Web Service的篮球课程CAI教学平台可以实现篮球课程教学资源的动态整合,具有良好的整合性、开放性和封装性。基于Web Service的篮球课程CAI教学平台设计方案可以有效地解决和帮助篮球课程体育教学资源的互联互通,适应体育教学信息化发展的需求。
{"title":"The Design and Development of the Basketball Course CAI Based on Web","authors":"Qinghua Fang, Yukuo Wang","doi":"10.1109/ICCIS.2012.324","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.324","url":null,"abstract":"In order to solve the problems such as low teaching efficiency and backward teaching method of basketball course in higher vocational colleges, and realize the interworking and sharing of basketball course teaching recourses, a basketball course CAI teaching platform based on Web is designed. The design of this platform, combining subject characteristics of basketball course, uses Windows NT 4/2000Server as operating system platform, Microsoft SQL Server 7.0 as RDBMS, NAS for data storage and flow technology for video service. The basketball course CAI teaching platform based on Web Service can realize the dynamic integration of basketball course teaching resources and it has good integration, openness and encapsulation. The design scheme of basketball course CAI teaching platform based on Web Service can effectively solve and help the interconnection, interworking of basketball course PE teaching resources and adapt to the informatization development demands of PE teaching.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124668492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The special attributes of technical goods decide the complexity of the transfer technology price. To be more scientific and rational to assess the technology transfer price, the technical transfer pricing must take into account the sensitivity of the price's influence factors. The paper uses the Analytic Hierarchy Process to systematically analyze the sensitivity of influence factors, and classify the influence factors in accordance with the sensitivity level. The result shows that the sensitivity level of all influence actors restrict significantly the proportion of the price model's elements. It is reasonable to introduce the extremely sensitive factors and sensitivity factors to correct pricing model, and this is the practical needs of the technology trading subject.
{"title":"Study on the Sensitivity of the Influence Factors for the Technology Transfer Price","authors":"Zeng Yanlin","doi":"10.1109/ICCIS.2012.304","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.304","url":null,"abstract":"The special attributes of technical goods decide the complexity of the transfer technology price. To be more scientific and rational to assess the technology transfer price, the technical transfer pricing must take into account the sensitivity of the price's influence factors. The paper uses the Analytic Hierarchy Process to systematically analyze the sensitivity of influence factors, and classify the influence factors in accordance with the sensitivity level. The result shows that the sensitivity level of all influence actors restrict significantly the proportion of the price model's elements. It is reasonable to introduce the extremely sensitive factors and sensitivity factors to correct pricing model, and this is the practical needs of the technology trading subject.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126669992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the rapid development of multimedia applications such as video on demand, VoIP, web conferencing, distant education etc. the current IEEE 802.11's Best-effect Service is unable to meet the different needs of these multimedia applications and users' request towards the quality of the network. Therefore, the research has broad prospects in improving the efficiency of the network and meeting the different needs of the users. This paper comes up with direct packet loss rate to realize service differentiation strategy, which allows high-priority node packet loss rate to be low while low priority node packet loss rate is high, beyond the condition that the total load is under control. This scheme is quite simple and easy to achieve without changing the 802.11 protocol.
{"title":"Service Differentiation Strategy Based on Packet Loss Rate for 802.11 Wirelesses LAN","authors":"Shujun Bi","doi":"10.1109/ICCIS.2012.278","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.278","url":null,"abstract":"With the rapid development of multimedia applications such as video on demand, VoIP, web conferencing, distant education etc. the current IEEE 802.11's Best-effect Service is unable to meet the different needs of these multimedia applications and users' request towards the quality of the network. Therefore, the research has broad prospects in improving the efficiency of the network and meeting the different needs of the users. This paper comes up with direct packet loss rate to realize service differentiation strategy, which allows high-priority node packet loss rate to be low while low priority node packet loss rate is high, beyond the condition that the total load is under control. This scheme is quite simple and easy to achieve without changing the 802.11 protocol.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126686303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The spectral identification technology is a spectral basis of qualitative analysis. With the development of pattern recognition, spectral identification technology has become an important tool for rapid detection of medicine, environmental protection, petrochemical and other industries. The neural network nonlinear mapping, adaptive learning, robustness and fault tolerance features, has a wide range of applications in signal processing, knowledge engineering, pattern recognition and other fields. This paper meets the Lambert Beer law of spectral signals for the study, outlines the basic principles of neural networks for pattern recognition, and then according to the specific requirements of the spectrum recognition, multi-feature-based and neural network spectral identification programs, and conducts system design, the establishment of the basic model framework. Finally, an instance of the method is described.
{"title":"Application and Design of the Spectral Identification System Based on Neural Network and Fuzzy Control","authors":"Min Chen, Hui Liu","doi":"10.1109/ICCIS.2012.77","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.77","url":null,"abstract":"The spectral identification technology is a spectral basis of qualitative analysis. With the development of pattern recognition, spectral identification technology has become an important tool for rapid detection of medicine, environmental protection, petrochemical and other industries. The neural network nonlinear mapping, adaptive learning, robustness and fault tolerance features, has a wide range of applications in signal processing, knowledge engineering, pattern recognition and other fields. This paper meets the Lambert Beer law of spectral signals for the study, outlines the basic principles of neural networks for pattern recognition, and then according to the specific requirements of the spectrum recognition, multi-feature-based and neural network spectral identification programs, and conducts system design, the establishment of the basic model framework. Finally, an instance of the method is described.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126895177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Because the energy of the sensor nodes determines directly the wireless sensor network service life, so saving node energy which means prolonging the network life is very important. This paper proposes a new clustering method based on energy in the network with sensor nodes uniformly distributed.
{"title":"Energy-Based Cluster Partition Method in Wireless Sensor Networks","authors":"Xiao Shisong, Zou Xiangling, Zhang Feng, Feng Hui","doi":"10.1109/ICCIS.2012.143","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.143","url":null,"abstract":"Because the energy of the sensor nodes determines directly the wireless sensor network service life, so saving node energy which means prolonging the network life is very important. This paper proposes a new clustering method based on energy in the network with sensor nodes uniformly distributed.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114623515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, an image hiding scheme based on 3D skew tent map and wavelet transform is proposed. One 3D skew tent map with three control parameters and one coupled map lattice are utilized to encrypt the secret image which will be imbedded in one host image. The encryption scheme consists of generating a chaotic orbit by the skew tent map to scramble the pixel positions and yielding a random gray value sequence by the coupled map lattice to change the gray values. The encrypted secret image and the host image are transformed by the wavelet transform and then are merged in the frequency domain. Experimental results show that the proposed hiding scheme is robust against malicious attacks like cropping, noising, etc.
{"title":"An Image Hiding Scheme Based on 3D Skew Tent Map and Discrete Wavelet Transform","authors":"Ruisong Ye, Wei Zhou, Haiying Zhao","doi":"10.1109/ICCIS.2012.66","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.66","url":null,"abstract":"In this paper, an image hiding scheme based on 3D skew tent map and wavelet transform is proposed. One 3D skew tent map with three control parameters and one coupled map lattice are utilized to encrypt the secret image which will be imbedded in one host image. The encryption scheme consists of generating a chaotic orbit by the skew tent map to scramble the pixel positions and yielding a random gray value sequence by the coupled map lattice to change the gray values. The encrypted secret image and the host image are transformed by the wavelet transform and then are merged in the frequency domain. Experimental results show that the proposed hiding scheme is robust against malicious attacks like cropping, noising, etc.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"32 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114029002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
By converting natural vibration into electricity, vibration energy harvesters (VEHs) provide promising self-power resources to drive wireless electronic systems. The output voltage is a vital parameter to evaluate the performance of a VEH. Considering the fact that relation between the operation conditions and the output voltage is nonlinear, a relevance vector machine (RVM) -based approach is proposed to estimate the output voltage. The vibration frequency, acceleration amplitude, and load resistance are employed as the input vectors so as to model the harvested electricity voltage which is the output vector of the RVM. An experimental set-up is used to collect real data for RVM modeling and precision evaluation. The results show that the proposed method is capable of estimating the output voltage for the VEH with good precision.
{"title":"Output Voltage Estimation for Vibration Energy Harvesters Using Relevance Vector Mechines","authors":"Chuan Li, Daewoong Hong, K. Kwon, Jaehwa Jeong","doi":"10.1109/ICCIS.2012.201","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.201","url":null,"abstract":"By converting natural vibration into electricity, vibration energy harvesters (VEHs) provide promising self-power resources to drive wireless electronic systems. The output voltage is a vital parameter to evaluate the performance of a VEH. Considering the fact that relation between the operation conditions and the output voltage is nonlinear, a relevance vector machine (RVM) -based approach is proposed to estimate the output voltage. The vibration frequency, acceleration amplitude, and load resistance are employed as the input vectors so as to model the harvested electricity voltage which is the output vector of the RVM. An experimental set-up is used to collect real data for RVM modeling and precision evaluation. The results show that the proposed method is capable of estimating the output voltage for the VEH with good precision.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127836605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}