Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533235
Z. Yao, C. Li, Huixian Tao
Firstly;one algorithm of credit card number validation-----LUHN Formula (Mod 10) is introduced; and then its application on the wired and wireless internet is realized.JavaScript and VBScript are used separately with HTML to realize this algorithm on the internet; at the same time, WMLScript is used with WML to realize this algorithm on the wireless internet; Lastly, conclusion is drawn about the widely application of this algorithm on the wired and wireless internet.
{"title":"The Application of Credit Card Number Validation Algorithm on the Wired and Wireless Internet","authors":"Z. Yao, C. Li, Huixian Tao","doi":"10.1109/IEEC.2010.5533235","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533235","url":null,"abstract":"Firstly;one algorithm of credit card number validation-----LUHN Formula (Mod 10) is introduced; and then its application on the wired and wireless internet is realized.JavaScript and VBScript are used separately with HTML to realize this algorithm on the internet; at the same time, WMLScript is used with WML to realize this algorithm on the wireless internet; Lastly, conclusion is drawn about the widely application of this algorithm on the wired and wireless internet.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121146724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533196
Xiao-chun Dong
Begun with the formal functional specification of stone-merger problem, formal derivation method of formal PAR was used. Recurrence formula and loop invariant of the problem naturally was gained. And then an efficient and correct algorithm was derived. Finally, according to the algorithm, the executable program of this problem has been solved.
{"title":"Formal Derivation and Implementation for the Stone-Merger Algorithm","authors":"Xiao-chun Dong","doi":"10.1109/IEEC.2010.5533196","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533196","url":null,"abstract":"Begun with the formal functional specification of stone-merger problem, formal derivation method of formal PAR was used. Recurrence formula and loop invariant of the problem naturally was gained. And then an efficient and correct algorithm was derived. Finally, according to the algorithm, the executable program of this problem has been solved.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"13 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131262651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533242
T. Xiong, Shi-dong Fan, Zixuan Yan
Cutter-suction dredger transports slurry through pipeline. But the pipeline is easy to be jammed and frayed because of huge resistance, resulting in limited exertion of dredger and high energy consumption. One of solutions is air injection transporting, which can reduce the resistance in pipeline. This paper makes research on the relations between pipeline distance and other factors such as slurry concentration, pressure of air injection and transportation distance. The test data proves that the key factors are slurry concentration and air volume fraction, and that high slurry concentration and low air volume fraction can reduce more resistance, and such reducing effect becomes weaker with the longer of transportation distance.
{"title":"Experimental Research on Air Injection Assisted Transportation in Cutter-Suction Dredger","authors":"T. Xiong, Shi-dong Fan, Zixuan Yan","doi":"10.1109/IEEC.2010.5533242","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533242","url":null,"abstract":"Cutter-suction dredger transports slurry through pipeline. But the pipeline is easy to be jammed and frayed because of huge resistance, resulting in limited exertion of dredger and high energy consumption. One of solutions is air injection transporting, which can reduce the resistance in pipeline. This paper makes research on the relations between pipeline distance and other factors such as slurry concentration, pressure of air injection and transportation distance. The test data proves that the key factors are slurry concentration and air volume fraction, and that high slurry concentration and low air volume fraction can reduce more resistance, and such reducing effect becomes weaker with the longer of transportation distance.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122173538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533292
Yan Li
Realization of e-business is based on business process management system (BPMS). In BPMS there are a large number of event logs recording the performers who initiate or complete the activities. Collaboration-based organization structure is so flexible as to be more suitable for the business implementing e-business. However the existing organizational structure modeling methods are difficult to model collaboration-based structure. This paper design an automatic modeling method of collaboration-based organization structure based on event logs from BPMS. Firstly, six kinds of performer relations are analyzed, i.e. PR1-PR6; Secondly, Five kinds of modeling rules are designed, i.e. MR1-MR5; At last, an actual case are given to verify feasibility of this method.
{"title":"Research on Collaboration-Based Organization Structure Modeling in E-Business","authors":"Yan Li","doi":"10.1109/IEEC.2010.5533292","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533292","url":null,"abstract":"Realization of e-business is based on business process management system (BPMS). In BPMS there are a large number of event logs recording the performers who initiate or complete the activities. Collaboration-based organization structure is so flexible as to be more suitable for the business implementing e-business. However the existing organizational structure modeling methods are difficult to model collaboration-based structure. This paper design an automatic modeling method of collaboration-based organization structure based on event logs from BPMS. Firstly, six kinds of performer relations are analyzed, i.e. PR1-PR6; Secondly, Five kinds of modeling rules are designed, i.e. MR1-MR5; At last, an actual case are given to verify feasibility of this method.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134152959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533250
Hong-quan Xie, H. Jia
with the development of information technology, land reclamation needs more tools to meet the demand of planning and design. 3D laser scanning technique potentially provides a novel tool for generating an accurate and comprehensive 3D mathematical description of environment in mining area, which can help study and analysis the problems in land reclamation. The developments of 3D laser scanning technique were introduced in this paper, and then several main application aspects for land reclamation were put forth. The application of 3D laser scanning technique in land reclamation can enhance the work efficiency and be a useful tool for land reclamation.
{"title":"The Development of 3D Laser Scanning Technique and Its Application in Land Reclamation","authors":"Hong-quan Xie, H. Jia","doi":"10.1109/IEEC.2010.5533250","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533250","url":null,"abstract":"with the development of information technology, land reclamation needs more tools to meet the demand of planning and design. 3D laser scanning technique potentially provides a novel tool for generating an accurate and comprehensive 3D mathematical description of environment in mining area, which can help study and analysis the problems in land reclamation. The developments of 3D laser scanning technique were introduced in this paper, and then several main application aspects for land reclamation were put forth. The application of 3D laser scanning technique in land reclamation can enhance the work efficiency and be a useful tool for land reclamation.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132551367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533290
Xiu-yi Tang, Qi-long Jia, Meng Xu, Meng Jiang
This article introduces the RSA algorithm and the principle of its encryption decipher. We attack this algorithm in simulation by the feasible attack methods after analyzing the algorithm intensity. It is confirmed that the algorithm's real intensity cannot achieve its theoretical intensity judging from the mathematical theory and the program simulation. Hence, we develop the optimization proposal aiming at these shortcomings.
{"title":"Multi-Channel Interpolation Method for RSA","authors":"Xiu-yi Tang, Qi-long Jia, Meng Xu, Meng Jiang","doi":"10.1109/IEEC.2010.5533290","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533290","url":null,"abstract":"This article introduces the RSA algorithm and the principle of its encryption decipher. We attack this algorithm in simulation by the feasible attack methods after analyzing the algorithm intensity. It is confirmed that the algorithm's real intensity cannot achieve its theoretical intensity judging from the mathematical theory and the program simulation. Hence, we develop the optimization proposal aiming at these shortcomings.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122074262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533199
Fengyun Zhang, Yiqiang Xiao, Xiyao Chen
The virtual reality technology is used to construct a practice teaching system of sport stadium management according the present situation and its existing problems. The basic structure, main functions of the virtual stadium management teaching system and its advantages in the practice teaching are introduced. The critical technologies and application examples of this system are also showed in this paper.
{"title":"Research on the Application of Virtual Reality Technology in the Practice Teaching of Sport Stadium Management","authors":"Fengyun Zhang, Yiqiang Xiao, Xiyao Chen","doi":"10.1109/IEEC.2010.5533199","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533199","url":null,"abstract":"The virtual reality technology is used to construct a practice teaching system of sport stadium management according the present situation and its existing problems. The basic structure, main functions of the virtual stadium management teaching system and its advantages in the practice teaching are introduced. The critical technologies and application examples of this system are also showed in this paper.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116796999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533215
Jianhu Zheng, Dongliang Yao
The prerequisites of human behavior and performance research need innovative methods for the collection of human factors data. Data generated from experimental investigations of human performance in pedestrian situations have some instinctive drawbacks such as the obvious deviation from the natural pedestrian behaviors. Real-time pedestrian dynamic data obtained from on-site pedestrian flow monitoring system will help us record the genuine pedestrian situations by instruments and analyze the flow parameters such as velocity, density and flow rate. This project will help us develop a pedestrian flow prediction and risk management system (hardware and software) that may apply to many other shopping districts.
{"title":"Intelligent Pedestrian Flow Monitoring Systems in Shopping Areas","authors":"Jianhu Zheng, Dongliang Yao","doi":"10.1109/IEEC.2010.5533215","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533215","url":null,"abstract":"The prerequisites of human behavior and performance research need innovative methods for the collection of human factors data. Data generated from experimental investigations of human performance in pedestrian situations have some instinctive drawbacks such as the obvious deviation from the natural pedestrian behaviors. Real-time pedestrian dynamic data obtained from on-site pedestrian flow monitoring system will help us record the genuine pedestrian situations by instruments and analyze the flow parameters such as velocity, density and flow rate. This project will help us develop a pedestrian flow prediction and risk management system (hardware and software) that may apply to many other shopping districts.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"07 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123990946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533289
Guojin Liu, Yanfang Zha, Hua Zhao, K. Yin
This paper presents a new method of group counterchange of BCH code. In this method, the relationship between syndrome vector and the vector of supervision matrix is correspondence. The new method simplifies the process of BCH encoding and decoding. So it can be used in encoding and decoding information which is over K-bits. The new method not only makes the process of decoding and correcting of BCH code easier and faster, but also educes the BER (bit error rate) of system. At the same time, it can be implemented on Cyclone-III.
{"title":"Group Counterchange of BCH Code","authors":"Guojin Liu, Yanfang Zha, Hua Zhao, K. Yin","doi":"10.1109/IEEC.2010.5533289","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533289","url":null,"abstract":"This paper presents a new method of group counterchange of BCH code. In this method, the relationship between syndrome vector and the vector of supervision matrix is correspondence. The new method simplifies the process of BCH encoding and decoding. So it can be used in encoding and decoding information which is over K-bits. The new method not only makes the process of decoding and correcting of BCH code easier and faster, but also educes the BER (bit error rate) of system. At the same time, it can be implemented on Cyclone-III.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128668035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1109/IEEC.2010.5533265
Sichun Wang, Yanhui Wu
he method that the utility of genetic programming (GP) is used to create and use ensembles in data mining is demonstrated in the paper . Given its representational power in the model of complex non-linearities in the data, GP is seen to be effective at learning diverse patterns in the data. With different models capturing varied data relationships, GP models are ideally suited for combination in ensembles. Experimental results show that different GP models are dissimilar both in terms of the functional form as well as with respect to the variables defining the models.
{"title":"A Large-Scale Data Classifying Approach Based on GP","authors":"Sichun Wang, Yanhui Wu","doi":"10.1109/IEEC.2010.5533265","DOIUrl":"https://doi.org/10.1109/IEEC.2010.5533265","url":null,"abstract":"he method that the utility of genetic programming (GP) is used to create and use ensembles in data mining is demonstrated in the paper . Given its representational power in the model of complex non-linearities in the data, GP is seen to be effective at learning diverse patterns in the data. With different models capturing varied data relationships, GP models are ideally suited for combination in ensembles. Experimental results show that different GP models are dissimilar both in terms of the functional form as well as with respect to the variables defining the models.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128540124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}