Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533235
Z. Yao, C. Li, Huixian Tao
Firstly;one algorithm of credit card number validation-----LUHN Formula (Mod 10) is introduced; and then its application on the wired and wireless internet is realized.JavaScript and VBScript are used separately with HTML to realize this algorithm on the internet; at the same time, WMLScript is used with WML to realize this algorithm on the wireless internet; Lastly, conclusion is drawn about the widely application of this algorithm on the wired and wireless internet.
{"title":"The Application of Credit Card Number Validation Algorithm on the Wired and Wireless Internet","authors":"Z. Yao, C. Li, Huixian Tao","doi":"10.1109/IEEC.2010.5533235","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533235","url":null,"abstract":"Firstly;one algorithm of credit card number validation-----LUHN Formula (Mod 10) is introduced; and then its application on the wired and wireless internet is realized.JavaScript and VBScript are used separately with HTML to realize this algorithm on the internet; at the same time, WMLScript is used with WML to realize this algorithm on the wireless internet; Lastly, conclusion is drawn about the widely application of this algorithm on the wired and wireless internet.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121146724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533196
Xiao-chun Dong
Begun with the formal functional specification of stone-merger problem, formal derivation method of formal PAR was used. Recurrence formula and loop invariant of the problem naturally was gained. And then an efficient and correct algorithm was derived. Finally, according to the algorithm, the executable program of this problem has been solved.
{"title":"Formal Derivation and Implementation for the Stone-Merger Algorithm","authors":"Xiao-chun Dong","doi":"10.1109/IEEC.2010.5533196","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533196","url":null,"abstract":"Begun with the formal functional specification of stone-merger problem, formal derivation method of formal PAR was used. Recurrence formula and loop invariant of the problem naturally was gained. And then an efficient and correct algorithm was derived. Finally, according to the algorithm, the executable program of this problem has been solved.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"13 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131262651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533290
Xiu-yi Tang, Qi-long Jia, Meng Xu, Meng Jiang
This article introduces the RSA algorithm and the principle of its encryption decipher. We attack this algorithm in simulation by the feasible attack methods after analyzing the algorithm intensity. It is confirmed that the algorithm's real intensity cannot achieve its theoretical intensity judging from the mathematical theory and the program simulation. Hence, we develop the optimization proposal aiming at these shortcomings.
{"title":"Multi-Channel Interpolation Method for RSA","authors":"Xiu-yi Tang, Qi-long Jia, Meng Xu, Meng Jiang","doi":"10.1109/IEEC.2010.5533290","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533290","url":null,"abstract":"This article introduces the RSA algorithm and the principle of its encryption decipher. We attack this algorithm in simulation by the feasible attack methods after analyzing the algorithm intensity. It is confirmed that the algorithm's real intensity cannot achieve its theoretical intensity judging from the mathematical theory and the program simulation. Hence, we develop the optimization proposal aiming at these shortcomings.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122074262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533242
T. Xiong, Shi-dong Fan, Zixuan Yan
Cutter-suction dredger transports slurry through pipeline. But the pipeline is easy to be jammed and frayed because of huge resistance, resulting in limited exertion of dredger and high energy consumption. One of solutions is air injection transporting, which can reduce the resistance in pipeline. This paper makes research on the relations between pipeline distance and other factors such as slurry concentration, pressure of air injection and transportation distance. The test data proves that the key factors are slurry concentration and air volume fraction, and that high slurry concentration and low air volume fraction can reduce more resistance, and such reducing effect becomes weaker with the longer of transportation distance.
{"title":"Experimental Research on Air Injection Assisted Transportation in Cutter-Suction Dredger","authors":"T. Xiong, Shi-dong Fan, Zixuan Yan","doi":"10.1109/IEEC.2010.5533242","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533242","url":null,"abstract":"Cutter-suction dredger transports slurry through pipeline. But the pipeline is easy to be jammed and frayed because of huge resistance, resulting in limited exertion of dredger and high energy consumption. One of solutions is air injection transporting, which can reduce the resistance in pipeline. This paper makes research on the relations between pipeline distance and other factors such as slurry concentration, pressure of air injection and transportation distance. The test data proves that the key factors are slurry concentration and air volume fraction, and that high slurry concentration and low air volume fraction can reduce more resistance, and such reducing effect becomes weaker with the longer of transportation distance.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122173538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533215
Jianhu Zheng, Dongliang Yao
The prerequisites of human behavior and performance research need innovative methods for the collection of human factors data. Data generated from experimental investigations of human performance in pedestrian situations have some instinctive drawbacks such as the obvious deviation from the natural pedestrian behaviors. Real-time pedestrian dynamic data obtained from on-site pedestrian flow monitoring system will help us record the genuine pedestrian situations by instruments and analyze the flow parameters such as velocity, density and flow rate. This project will help us develop a pedestrian flow prediction and risk management system (hardware and software) that may apply to many other shopping districts.
{"title":"Intelligent Pedestrian Flow Monitoring Systems in Shopping Areas","authors":"Jianhu Zheng, Dongliang Yao","doi":"10.1109/IEEC.2010.5533215","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533215","url":null,"abstract":"The prerequisites of human behavior and performance research need innovative methods for the collection of human factors data. Data generated from experimental investigations of human performance in pedestrian situations have some instinctive drawbacks such as the obvious deviation from the natural pedestrian behaviors. Real-time pedestrian dynamic data obtained from on-site pedestrian flow monitoring system will help us record the genuine pedestrian situations by instruments and analyze the flow parameters such as velocity, density and flow rate. This project will help us develop a pedestrian flow prediction and risk management system (hardware and software) that may apply to many other shopping districts.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"07 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123990946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533309
Xiaoqin Yuan
The top priority of English teaching reform for newly up-graded universities lies in the cultivation of learner autonomy. Effective teaching model should be based on the guiding principle of teaching students in accordance with their aptitude and the individualization of automatic learning supplemented with guidance from the teacher. Individual students provided with internet-study platform can work out their study plans and goals according to their particularity and needs. The ultimate purpose of this teaching code and model is to achieve learner autonomy in networked teaching, enhance students' English proficiency and develop learner autonomy.
{"title":"An Empirical Study on Students' Individualized Learning Based on Network Teaching in Newly-Upgraded University","authors":"Xiaoqin Yuan","doi":"10.1109/IEEC.2010.5533309","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533309","url":null,"abstract":"The top priority of English teaching reform for newly up-graded universities lies in the cultivation of learner autonomy. Effective teaching model should be based on the guiding principle of teaching students in accordance with their aptitude and the individualization of automatic learning supplemented with guidance from the teacher. Individual students provided with internet-study platform can work out their study plans and goals according to their particularity and needs. The ultimate purpose of this teaching code and model is to achieve learner autonomy in networked teaching, enhance students' English proficiency and develop learner autonomy.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129590585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533240
Zheng Liu, Hai Zhao, Qian Zhang
According to the research progress of software networks in these years, the software structural networks show the same characteristics with complex networks and the software topological structure has an effect on the quality characteristics of software systems. The research work begins with the statistics analysis of three characteristic values, which can reflect the efficiency, complexity and orderliness of software systems separately, of 500 open source software systems. Then D(AP), D(AD) and D(E) are presented for measuring the quality characteristics of software systems refer to the definition of deviation of characteristic value and quality characteristics relative to software scale. By testing on seven Linux kernels of different versions, the metrics on software networks based on deviation of characteristic values is validated effective.
{"title":"Metrics on Software Networks Based on Deviation of Characteristic Values","authors":"Zheng Liu, Hai Zhao, Qian Zhang","doi":"10.1109/IEEC.2010.5533240","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533240","url":null,"abstract":"According to the research progress of software networks in these years, the software structural networks show the same characteristics with complex networks and the software topological structure has an effect on the quality characteristics of software systems. The research work begins with the statistics analysis of three characteristic values, which can reflect the efficiency, complexity and orderliness of software systems separately, of 500 open source software systems. Then D(AP), D(AD) and D(E) are presented for measuring the quality characteristics of software systems refer to the definition of deviation of characteristic value and quality characteristics relative to software scale. By testing on seven Linux kernels of different versions, the metrics on software networks based on deviation of characteristic values is validated effective.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130564772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533306
Wei Dong
As a new type of media, with its unique way of carrying and spreading information and knowledge, Internet provides a rich quick and rich interactive platform for interpersonal communication. It has far-reaching impact on University students' thinking style, behavior patterns and value attitude; it also gravely challenges university's moral education work in our country at the same time, especially network honesty education for university students. Under the network circumstances, it is a decision-making process for students to choose to be honesty or not, in which students' protective value attitude will have direct impact on behavior choices. The most important purpose for establishment of honesty evaluation system is to provide an effective carrier for universities to develop network honesty education, so that there will be a better solution for university students' dishonesty problems. Hence, this article tries to establish a network honesty evaluation system bases on Cluster-Discriminate analysis model, to restrain and regulate students' behavior, so that the situation of lacking of honesty can be changed.
{"title":"An Empirical Research for Strengthening the Protection of University Students' Protective Value Attitude Bases on Clustering-Discriminant Analysis Model of Network Honesty Evaluation System","authors":"Wei Dong","doi":"10.1109/IEEC.2010.5533306","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533306","url":null,"abstract":"As a new type of media, with its unique way of carrying and spreading information and knowledge, Internet provides a rich quick and rich interactive platform for interpersonal communication. It has far-reaching impact on University students' thinking style, behavior patterns and value attitude; it also gravely challenges university's moral education work in our country at the same time, especially network honesty education for university students. Under the network circumstances, it is a decision-making process for students to choose to be honesty or not, in which students' protective value attitude will have direct impact on behavior choices. The most important purpose for establishment of honesty evaluation system is to provide an effective carrier for universities to develop network honesty education, so that there will be a better solution for university students' dishonesty problems. Hence, this article tries to establish a network honesty evaluation system bases on Cluster-Discriminate analysis model, to restrain and regulate students' behavior, so that the situation of lacking of honesty can be changed.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131368011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533283
Zhuomin Shi, Ichiro Furukawa, Chunji Jin, Li Zhu
As a complex social and psychological phenomenon, MIANZI, Known as Chinese face, has attracted much attention in the field of sociology and psychology. But in the field of marketing, research on how MIANZI (FACE) affecting consumer behavior is not abundant. Moreover, research on the connotations of sub-dimension of MIANZI (FACE), that is, LIAN and MIAN as well as their influences on consumer behavior is seldom seen. By using open-ended and close-ended questionnaire and focus group interview, this study extracts hundreds of scenario sentences of LIAN and MIAN, initially forming a preliminary scale with 14 positive items and 20 negative items concerning with LIAN and MIAN. Studies validate the discrepancy between "FACE"(MIANZI) and "LIAN". Moreover, the discrepancy between "FACE"(MIANZI) and "LIAN" also appears in consumer perception about product category and Country-of-Origin Image. In respect to product category buying behavior, in which automobile ranks the first place affected by face, followed by cosmetics, milk is the least-affected in this study; In addition, there is significant discrepancy in the cognition of LIAN and MIAN on Country of Origin Image. As for automobile buying behavior, Buying German car is regarded as the most face-earning behavior; Buying Japanese car is regarded as LIAN-losing (shameful) but face-earning (graceful) behavior; Buying Chinese car is somehow considered as purchase of no-face but having- LIAN.
{"title":"Chinese Face: MIANZI and LIAN: And Their Influence on Chinese Consumer Behavior","authors":"Zhuomin Shi, Ichiro Furukawa, Chunji Jin, Li Zhu","doi":"10.1109/IEEC.2010.5533283","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533283","url":null,"abstract":"As a complex social and psychological phenomenon, MIANZI, Known as Chinese face, has attracted much attention in the field of sociology and psychology. But in the field of marketing, research on how MIANZI (FACE) affecting consumer behavior is not abundant. Moreover, research on the connotations of sub-dimension of MIANZI (FACE), that is, LIAN and MIAN as well as their influences on consumer behavior is seldom seen. By using open-ended and close-ended questionnaire and focus group interview, this study extracts hundreds of scenario sentences of LIAN and MIAN, initially forming a preliminary scale with 14 positive items and 20 negative items concerning with LIAN and MIAN. Studies validate the discrepancy between \"FACE\"(MIANZI) and \"LIAN\". Moreover, the discrepancy between \"FACE\"(MIANZI) and \"LIAN\" also appears in consumer perception about product category and Country-of-Origin Image. In respect to product category buying behavior, in which automobile ranks the first place affected by face, followed by cosmetics, milk is the least-affected in this study; In addition, there is significant discrepancy in the cognition of LIAN and MIAN on Country of Origin Image. As for automobile buying behavior, Buying German car is regarded as the most face-earning behavior; Buying Japanese car is regarded as LIAN-losing (shameful) but face-earning (graceful) behavior; Buying Chinese car is somehow considered as purchase of no-face but having- LIAN.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130084380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533289
Guojin Liu, Yanfang Zha, Hua Zhao, K. Yin
This paper presents a new method of group counterchange of BCH code. In this method, the relationship between syndrome vector and the vector of supervision matrix is correspondence. The new method simplifies the process of BCH encoding and decoding. So it can be used in encoding and decoding information which is over K-bits. The new method not only makes the process of decoding and correcting of BCH code easier and faster, but also educes the BER (bit error rate) of system. At the same time, it can be implemented on Cyclone-III.
{"title":"Group Counterchange of BCH Code","authors":"Guojin Liu, Yanfang Zha, Hua Zhao, K. Yin","doi":"10.1109/IEEC.2010.5533289","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533289","url":null,"abstract":"This paper presents a new method of group counterchange of BCH code. In this method, the relationship between syndrome vector and the vector of supervision matrix is correspondence. The new method simplifies the process of BCH encoding and decoding. So it can be used in encoding and decoding information which is over K-bits. The new method not only makes the process of decoding and correcting of BCH code easier and faster, but also educes the BER (bit error rate) of system. At the same time, it can be implemented on Cyclone-III.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128668035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}