Pub Date : 2011-12-01DOI: 10.1109/ICCSNT.2011.6182456
Bingzheng Wang, Xueli Wu, Haodong Zhu
Association rules tell us interesting relationships between different items in transaction database. But traditional association rule has two disadvantages. Firstly it assumes every two items have same significance in database, which is unreasonable in many real applications and usually leads to incorrect results. On the other hand, traditional association rule representation contains too much redundancy which makes it difficult to be mined and used. This paper addresses the problem of mining weighted concise association rules based on closed itemsets under weighted support-significant framework, in which each item with different significance is assigned different weight. Through exploiting specific technique, the proposed algorithm can mine all weighted concise association rules while duplicate weighted itemset search space is pruned. As illustrated in experiments, the proposed method leads to good results and achieves good performance.
{"title":"Weighted concise association rules generation under weighted support framework","authors":"Bingzheng Wang, Xueli Wu, Haodong Zhu","doi":"10.1109/ICCSNT.2011.6182456","DOIUrl":"https://doi.org/10.1109/ICCSNT.2011.6182456","url":null,"abstract":"Association rules tell us interesting relationships between different items in transaction database. But traditional association rule has two disadvantages. Firstly it assumes every two items have same significance in database, which is unreasonable in many real applications and usually leads to incorrect results. On the other hand, traditional association rule representation contains too much redundancy which makes it difficult to be mined and used. This paper addresses the problem of mining weighted concise association rules based on closed itemsets under weighted support-significant framework, in which each item with different significance is assigned different weight. Through exploiting specific technique, the proposed algorithm can mine all weighted concise association rules while duplicate weighted itemset search space is pruned. As illustrated in experiments, the proposed method leads to good results and achieves good performance.","PeriodicalId":303186,"journal":{"name":"Proceedings of 2011 International Conference on Computer Science and Network Technology","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122007200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCSNT.2011.6182276
Changhao Piao, Lu Chen, Ju Cao
A net monitor system used to real-time monitor the state of the Controller Area Network (CAN) bus was designed. In the system, two while loops compose a producer consumer pattern which is the main program structure. The producer loop responds user actions and the consumer loop handles commands and data. The functions of the system such as data trace, graphics display, signal selection, and write frame are compiled in corresponding child VIs. Users can call those functions by clicking corresponding switches. While messages are transmitted in the bus, the signals that we want to monitor are real-time shown in the system. In the experiment, another CAN card is used to imitate the CAN bus that send messages to the monitoring system. The results show that the system can real-time monitor the CAN bus.
{"title":"A design for Controller Area Network bus real-time monitoring system","authors":"Changhao Piao, Lu Chen, Ju Cao","doi":"10.1109/ICCSNT.2011.6182276","DOIUrl":"https://doi.org/10.1109/ICCSNT.2011.6182276","url":null,"abstract":"A net monitor system used to real-time monitor the state of the Controller Area Network (CAN) bus was designed. In the system, two while loops compose a producer consumer pattern which is the main program structure. The producer loop responds user actions and the consumer loop handles commands and data. The functions of the system such as data trace, graphics display, signal selection, and write frame are compiled in corresponding child VIs. Users can call those functions by clicking corresponding switches. While messages are transmitted in the bus, the signals that we want to monitor are real-time shown in the system. In the experiment, another CAN card is used to imitate the CAN bus that send messages to the monitoring system. The results show that the system can real-time monitor the CAN bus.","PeriodicalId":303186,"journal":{"name":"Proceedings of 2011 International Conference on Computer Science and Network Technology","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122239815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCSNT.2011.6182265
J. Du, Q. Wen, Jie Zhang, S. Pang, Rui Wang
How to construct Boolean functions with good cryptographic characteristics is an interesting and significant problem in cryptography. Based on the maximal linear orthomorphic permutations, a method is proposed in this paper to construct a large class of Boolean functions with optimal algebraic immunity. Moreover, we demonstrate that the Boolean functions construct by Wang are contained in ours. The Boolean functions constructed in this paper can be balanced. At the end, based on the examples, we also give two conjectures on the construction of Boolean functions with optimal algebraic immunity.
{"title":"Construction of Boolean functions with optimal algebraic immunity based on the maximal linear orthomorphic permutations","authors":"J. Du, Q. Wen, Jie Zhang, S. Pang, Rui Wang","doi":"10.1109/ICCSNT.2011.6182265","DOIUrl":"https://doi.org/10.1109/ICCSNT.2011.6182265","url":null,"abstract":"How to construct Boolean functions with good cryptographic characteristics is an interesting and significant problem in cryptography. Based on the maximal linear orthomorphic permutations, a method is proposed in this paper to construct a large class of Boolean functions with optimal algebraic immunity. Moreover, we demonstrate that the Boolean functions construct by Wang are contained in ours. The Boolean functions constructed in this paper can be balanced. At the end, based on the examples, we also give two conjectures on the construction of Boolean functions with optimal algebraic immunity.","PeriodicalId":303186,"journal":{"name":"Proceedings of 2011 International Conference on Computer Science and Network Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122268909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCSNT.2011.6182044
Liu Li, Chunlei Wang, Ming-Chung Liang
In Service Oriented Architecture (SOA), software is implemented through a series of services and the business processes composed of services which introduce potential security problems. These security problems appeared in SOA software applications usually lead information systems and their business processes to risks. Similar to traditional quality of service (QoS) attributes such as reliability and robustness, security is one of the most important attributes of software system. In this paper, the method for modeling and analyzing the security attributes of SOA software system is investigated. Firstly, the service oriented computing model for security analysis is constructed, which characterizes service computing paradigm and related security attributes, and can be used for establishing service oriented software security metric system. Secondly, the service attack path is analyzed based upon the service oriented computing model. Finally, the effectiveness of the model and the analysis method is validated through case studies.
{"title":"A method for modeling and analyzing the security attributes of service-oriented software system","authors":"Liu Li, Chunlei Wang, Ming-Chung Liang","doi":"10.1109/ICCSNT.2011.6182044","DOIUrl":"https://doi.org/10.1109/ICCSNT.2011.6182044","url":null,"abstract":"In Service Oriented Architecture (SOA), software is implemented through a series of services and the business processes composed of services which introduce potential security problems. These security problems appeared in SOA software applications usually lead information systems and their business processes to risks. Similar to traditional quality of service (QoS) attributes such as reliability and robustness, security is one of the most important attributes of software system. In this paper, the method for modeling and analyzing the security attributes of SOA software system is investigated. Firstly, the service oriented computing model for security analysis is constructed, which characterizes service computing paradigm and related security attributes, and can be used for establishing service oriented software security metric system. Secondly, the service attack path is analyzed based upon the service oriented computing model. Finally, the effectiveness of the model and the analysis method is validated through case studies.","PeriodicalId":303186,"journal":{"name":"Proceedings of 2011 International Conference on Computer Science and Network Technology","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121798876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCSNT.2011.6181982
Guan Yingshuang, Zhao Xiren, Ma Yunfei
The Combined anti-roll device with passively controlled anti-rolling tank and course rudder, and the ship lateral motion modeling method using the compound stochastic control are proposed in the paper. On one hand, using Kalman filter in to come out interaction estimate and adopt to pen-loop compensation controls, which carrys on compensating to the wave interference; On the other hand, using the stochastic LQG Suboptimal Control to carry on the control toward the ships horizontal carriage. Imitate true result express, this kind of compound control a method to have good effect, more commendable in the engineering the application.
{"title":"The compound stochastic control on the ship lateral motion","authors":"Guan Yingshuang, Zhao Xiren, Ma Yunfei","doi":"10.1109/ICCSNT.2011.6181982","DOIUrl":"https://doi.org/10.1109/ICCSNT.2011.6181982","url":null,"abstract":"The Combined anti-roll device with passively controlled anti-rolling tank and course rudder, and the ship lateral motion modeling method using the compound stochastic control are proposed in the paper. On one hand, using Kalman filter in to come out interaction estimate and adopt to pen-loop compensation controls, which carrys on compensating to the wave interference; On the other hand, using the stochastic LQG Suboptimal Control to carry on the control toward the ships horizontal carriage. Imitate true result express, this kind of compound control a method to have good effect, more commendable in the engineering the application.","PeriodicalId":303186,"journal":{"name":"Proceedings of 2011 International Conference on Computer Science and Network Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131349670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCSNT.2011.6182435
You Li, Xiaolin Zhang
Identifying accurately the parameters of power amplifier (PA) nonlinear model is essential in modeling and predistortion of PA. RLS (Recursive Least Square) is a common used algorithm in parameter identification. The proposed algorithm modifies the cost function of the conventional RLS by multiplying a weighting function. The simulation results verify that the modified algorithm has better normalized mean square error (NMSE) performance than the conventional RLS.
{"title":"A modified RLS algorithm for identification of power amplifier nonlinear model","authors":"You Li, Xiaolin Zhang","doi":"10.1109/ICCSNT.2011.6182435","DOIUrl":"https://doi.org/10.1109/ICCSNT.2011.6182435","url":null,"abstract":"Identifying accurately the parameters of power amplifier (PA) nonlinear model is essential in modeling and predistortion of PA. RLS (Recursive Least Square) is a common used algorithm in parameter identification. The proposed algorithm modifies the cost function of the conventional RLS by multiplying a weighting function. The simulation results verify that the modified algorithm has better normalized mean square error (NMSE) performance than the conventional RLS.","PeriodicalId":303186,"journal":{"name":"Proceedings of 2011 International Conference on Computer Science and Network Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131369842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCSNT.2011.6182056
Xiaofeng Wang
This paper describes the XML data island and AJAX.NET technology and their respective characteristics, by combining AJAX.NET and XML technologies in ASP.NET; it achieves the no refresh data binding in the network examination system, and greatly improves the performance of data presentation, improve the user experience. AJAX.NET technology makes AJAX programming easier.
{"title":"XML data island and AJAX.NET application in the network test system","authors":"Xiaofeng Wang","doi":"10.1109/ICCSNT.2011.6182056","DOIUrl":"https://doi.org/10.1109/ICCSNT.2011.6182056","url":null,"abstract":"This paper describes the XML data island and AJAX.NET technology and their respective characteristics, by combining AJAX.NET and XML technologies in ASP.NET; it achieves the no refresh data binding in the network examination system, and greatly improves the performance of data presentation, improve the user experience. AJAX.NET technology makes AJAX programming easier.","PeriodicalId":303186,"journal":{"name":"Proceedings of 2011 International Conference on Computer Science and Network Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131373248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCSNT.2011.6181963
Weiping Hou, Lihai Wang
According to the theory of mathematical morphological, edge detection operators and characteristics of wood decay image, a multi-structure element multi-scale edge detection algorithm based on mathematical morphology is proposed. The image is filtered by an alternative-order morphological corrosion-expansion filter with a multi-scale element, and the edge information is obtained using multi-structure elements open-close operation. Canny operator is used to extract the edge of the decay image. Experimental results show that the proposed algorithm is insensitive to noise and is efficient in edge detection.
{"title":"Application of mathematical morphology and canny operator in pattern extraction of wood decay image","authors":"Weiping Hou, Lihai Wang","doi":"10.1109/ICCSNT.2011.6181963","DOIUrl":"https://doi.org/10.1109/ICCSNT.2011.6181963","url":null,"abstract":"According to the theory of mathematical morphological, edge detection operators and characteristics of wood decay image, a multi-structure element multi-scale edge detection algorithm based on mathematical morphology is proposed. The image is filtered by an alternative-order morphological corrosion-expansion filter with a multi-scale element, and the edge information is obtained using multi-structure elements open-close operation. Canny operator is used to extract the edge of the decay image. Experimental results show that the proposed algorithm is insensitive to noise and is efficient in edge detection.","PeriodicalId":303186,"journal":{"name":"Proceedings of 2011 International Conference on Computer Science and Network Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130089835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCSNT.2011.6182096
Yao Jiang-Yun, K. Feng, Wu Fang-Yuan
In order to improve the performance and stability of the steer-by-wire system, this paper presents a hybrid-intelligent based variable steering ratio front wheel control algorithm. The factors that could impact the performance and stability of the steer-by-wire system are analyzed at first, according to the requirements, the fuzzy neural network based steering ratio controller is designed to control the steering performance of the vehicle as a key point, and the linear fitting based steering ratio controller is designed to control the steering stability as another key point, and then the vehicle state is judged by the vehicle stability indices, the fuzzy soft-switch approach is utilized to switch the two controllers according to the vehicle state, eventually, the proper steering ratio that meets the performance and stability is obtained. The proper steering ratio is utilized to control the front wheel angel directly, and the control strategy is brought into the model for simulation experiment, simulation results show that the proposed control strategy is effective and feasible.
{"title":"Control strategy for front wheel angle of steer-by-wire based on variable steering ratio","authors":"Yao Jiang-Yun, K. Feng, Wu Fang-Yuan","doi":"10.1109/ICCSNT.2011.6182096","DOIUrl":"https://doi.org/10.1109/ICCSNT.2011.6182096","url":null,"abstract":"In order to improve the performance and stability of the steer-by-wire system, this paper presents a hybrid-intelligent based variable steering ratio front wheel control algorithm. The factors that could impact the performance and stability of the steer-by-wire system are analyzed at first, according to the requirements, the fuzzy neural network based steering ratio controller is designed to control the steering performance of the vehicle as a key point, and the linear fitting based steering ratio controller is designed to control the steering stability as another key point, and then the vehicle state is judged by the vehicle stability indices, the fuzzy soft-switch approach is utilized to switch the two controllers according to the vehicle state, eventually, the proper steering ratio that meets the performance and stability is obtained. The proper steering ratio is utilized to control the front wheel angel directly, and the control strategy is brought into the model for simulation experiment, simulation results show that the proposed control strategy is effective and feasible.","PeriodicalId":303186,"journal":{"name":"Proceedings of 2011 International Conference on Computer Science and Network Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134603468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCSNT.2011.6182196
Jianfang Wang
In fact the process of learning is an ongoing accumulation of new information, consolidation of the old information, interaction and mutual constraints of old and new information, which has grown their information storage capacity. Through training in mathematical modeling, students can learn the experience of participated exploration, training to collect, information analysis and utilization, and learn sharing and cooperation, training students in the integrated application of professional knowledge to solve practical problems. All of which are applied personnel training to achieve. Mathematical modeling training has an irreplaceable important role in the application-oriented talents training.
{"title":"The study on mathematical modeling teaching method for application ability training","authors":"Jianfang Wang","doi":"10.1109/ICCSNT.2011.6182196","DOIUrl":"https://doi.org/10.1109/ICCSNT.2011.6182196","url":null,"abstract":"In fact the process of learning is an ongoing accumulation of new information, consolidation of the old information, interaction and mutual constraints of old and new information, which has grown their information storage capacity. Through training in mathematical modeling, students can learn the experience of participated exploration, training to collect, information analysis and utilization, and learn sharing and cooperation, training students in the integrated application of professional knowledge to solve practical problems. All of which are applied personnel training to achieve. Mathematical modeling training has an irreplaceable important role in the application-oriented talents training.","PeriodicalId":303186,"journal":{"name":"Proceedings of 2011 International Conference on Computer Science and Network Technology","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133866623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}