With the rapid development of the Internet, BBS, instant messaging, twitter, micro-blog has become an important channel for people to express their will and exchange information. With the help of the free, open and efficient network platform, opinion information can more directly, more truly reflect public opinion in all aspect of life, also become real-time mapping barometer of the social public opinion. On the other sight, the online public opinion transmit information to form a system which can be affect by many factor as the government, the traditional media, the netizens and the network media. Therefore, by the use of advanced information technology to deal with the opinion information, we analysis the related factors of relationship between them by dynamic evolution rule, and make a reasonable experiment. All of these can lay the groundwork for future scientific research.
{"title":"A Dynamics Model of Opinion Information System","authors":"Jin Du, Yanhui Du, Yiping Zhang","doi":"10.1109/ISCC-C.2013.12","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.12","url":null,"abstract":"With the rapid development of the Internet, BBS, instant messaging, twitter, micro-blog has become an important channel for people to express their will and exchange information. With the help of the free, open and efficient network platform, opinion information can more directly, more truly reflect public opinion in all aspect of life, also become real-time mapping barometer of the social public opinion. On the other sight, the online public opinion transmit information to form a system which can be affect by many factor as the government, the traditional media, the netizens and the network media. Therefore, by the use of advanced information technology to deal with the opinion information, we analysis the related factors of relationship between them by dynamic evolution rule, and make a reasonable experiment. All of these can lay the groundwork for future scientific research.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131279151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud services often depend on a mechanism that provides a reliable data storage that is resilient to failures. Majority voting and hierarchical voting, an extension of majority voting, are both used to implement such a mechanism in an unreliable network. For example, Apache ZooKeeper adopts both of the two methods. This work considers the question whether or not hierarchical voting with two levels indeed improves data availability compared to majority voting. The simulation results obtained so far suggest that hierarchical voting is unlikely to increase data availability.
{"title":"On the Availability of Replicated Data Managed by Hierarchical Voting","authors":"Yuuki Ueda, Hideharu Kojima, Tatsuhiro Tsuchiya","doi":"10.1109/ISCC-C.2013.95","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.95","url":null,"abstract":"Cloud services often depend on a mechanism that provides a reliable data storage that is resilient to failures. Majority voting and hierarchical voting, an extension of majority voting, are both used to implement such a mechanism in an unreliable network. For example, Apache ZooKeeper adopts both of the two methods. This work considers the question whether or not hierarchical voting with two levels indeed improves data availability compared to majority voting. The simulation results obtained so far suggest that hierarchical voting is unlikely to increase data availability.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132436140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A fabric simulation system of 2D virtual scene is researched and implemented in this paper. The system not only simulates the folds and transformations of the scene realistically but also allows replacement and modification of fabric. The finite element mesh algorithm is used to model the virtual scene. In order to avert deformations of texture mapping, the cubic polynomial interpolation algorithm is proposed in this paper. It can overcome the low-pass characteristic of the bilinear interpolation algorithm by eliminating the jags generated from texture mapping. To make the scene simulation more stereo, this paper utilizes the intensity based fusion algorithm, which retains the original scene's intensity. The experimental results show that the two-dimensional fabric scene simulation system is accurate and realistic, and has rapid time response.
{"title":"Simulation of Fabric in 2D Virtual Scene Based on Mesh Model","authors":"Xiaona Fan, Senlin Zhang, Zhen Fan, Zhao Chen","doi":"10.1109/ISCC-C.2013.122","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.122","url":null,"abstract":"A fabric simulation system of 2D virtual scene is researched and implemented in this paper. The system not only simulates the folds and transformations of the scene realistically but also allows replacement and modification of fabric. The finite element mesh algorithm is used to model the virtual scene. In order to avert deformations of texture mapping, the cubic polynomial interpolation algorithm is proposed in this paper. It can overcome the low-pass characteristic of the bilinear interpolation algorithm by eliminating the jags generated from texture mapping. To make the scene simulation more stereo, this paper utilizes the intensity based fusion algorithm, which retains the original scene's intensity. The experimental results show that the two-dimensional fabric scene simulation system is accurate and realistic, and has rapid time response.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134481680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to solve the problem of mobile learning, the design and implementation of a mobile learning system based on Android operating system is introduced in this paper. Mobile learning brings us to new impressions of whenever and wherever there is a possible study through effective combination of digital learning and mobile computing technology. Mobile learning is regarded as a kind of indispensable learning tool in the future. There are many functions on the platform such as user management, course selection, course download, online tutorials and online test functions and so on. The learner can, whenever and wherever possible, learn by intelligent mobile phone, panel computers or other portable devices. Anyone can open course resources and use them in a convenient way. The platform has good operability and a very optimistic future business-wise, and it provides us a better solution for easy mobile learning.
{"title":"The Design and Implementation of a Mobile Learning Platform Based on Android","authors":"Song Wei","doi":"10.1109/ISCC-C.2013.136","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.136","url":null,"abstract":"In order to solve the problem of mobile learning, the design and implementation of a mobile learning system based on Android operating system is introduced in this paper. Mobile learning brings us to new impressions of whenever and wherever there is a possible study through effective combination of digital learning and mobile computing technology. Mobile learning is regarded as a kind of indispensable learning tool in the future. There are many functions on the platform such as user management, course selection, course download, online tutorials and online test functions and so on. The learner can, whenever and wherever possible, learn by intelligent mobile phone, panel computers or other portable devices. Anyone can open course resources and use them in a convenient way. The platform has good operability and a very optimistic future business-wise, and it provides us a better solution for easy mobile learning.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134107002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As the underlying design of the security protection technology, security protocol plays an indispensable role in the protection of data storage and transmission of the network and information system. This paper analyzes the existing method for generating test cases based on the security testing research of protocol implementation according to the three key steps, formal description of the protocol model, the generation of test sequence and the description of test cases. This paper also provides the reference for the research of new method to generate test cases.
{"title":"The Security Testing Case Research of Protocol Implementation","authors":"Lei Zhang, Jing An, C. You, Guangxuan Chen","doi":"10.1109/ISCC-C.2013.145","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.145","url":null,"abstract":"As the underlying design of the security protection technology, security protocol plays an indispensable role in the protection of data storage and transmission of the network and information system. This paper analyzes the existing method for generating test cases based on the security testing research of protocol implementation according to the three key steps, formal description of the protocol model, the generation of test sequence and the description of test cases. This paper also provides the reference for the research of new method to generate test cases.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131601935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The research purpose of this paper is hoping to quickly select the evidence center, which satisfies the object conclusion, from many uncertain observational evidences, effective position and rapid inference. So in the process of the first sampling, it is needed to establish the sample center. This paper establishes 4 collections of records, by using the threshold algorithm based on competition to reason and refine layer by layer, excluding the uncertainty disturbances, and find the optimal link existed in optimal state. The optimal link determines the selection center of evidence reasoning object, provides the core of evidence for subsequent optimization and achieves the objective of rapid position and accurate inference.
{"title":"Research on the Evidence Optimization Method Based on the Expert System","authors":"Chen Guo, Ming Huang, Xu Liang","doi":"10.1109/ISCC-C.2013.117","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.117","url":null,"abstract":"The research purpose of this paper is hoping to quickly select the evidence center, which satisfies the object conclusion, from many uncertain observational evidences, effective position and rapid inference. So in the process of the first sampling, it is needed to establish the sample center. This paper establishes 4 collections of records, by using the threshold algorithm based on competition to reason and refine layer by layer, excluding the uncertainty disturbances, and find the optimal link existed in optimal state. The optimal link determines the selection center of evidence reasoning object, provides the core of evidence for subsequent optimization and achieves the objective of rapid position and accurate inference.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129717429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhang Zhang, Yangyang Zhao, Lina Duan, A. Qiu, Fuhao Zhang, Kunwang Tao
In order to use enterprises' distribution data effectively and maximize their social and economic values, a multi-level grid partition method for enterprise distribution data is proposed which divides the voluminous data into reasonable size. This method uses the provinces or municipalities of nationwide as the coarsest division, then a quad-tree is constructed to partition the points of enterprises according to their locations. Each node in the quad-tree has a limit of points, when the number of points in a node beyond the limit, the node is divided into four nodes with roughly the same number of points in each quadrant. This process proceeds recursively until no node contains points more than the limit. Enterprise distribution data of Harbin is used in experiments to test the feasibility and effectiveness of this method, the results of the experiments show that the enterprises distribution data are divided rapidly and accurately to the grid, which improve the applicability of the data and the convenience of data integration.
{"title":"A Multi-level Grid Partition Method for Enterprises Distribution Data","authors":"Zhang Zhang, Yangyang Zhao, Lina Duan, A. Qiu, Fuhao Zhang, Kunwang Tao","doi":"10.1109/ISCC-C.2013.22","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.22","url":null,"abstract":"In order to use enterprises' distribution data effectively and maximize their social and economic values, a multi-level grid partition method for enterprise distribution data is proposed which divides the voluminous data into reasonable size. This method uses the provinces or municipalities of nationwide as the coarsest division, then a quad-tree is constructed to partition the points of enterprises according to their locations. Each node in the quad-tree has a limit of points, when the number of points in a node beyond the limit, the node is divided into four nodes with roughly the same number of points in each quadrant. This process proceeds recursively until no node contains points more than the limit. Enterprise distribution data of Harbin is used in experiments to test the feasibility and effectiveness of this method, the results of the experiments show that the enterprises distribution data are divided rapidly and accurately to the grid, which improve the applicability of the data and the convenience of data integration.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133110969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuntian Feng, Hongjun Zhang, Wenning Hao, Gang Chen
To compute iceberg cube based on non-antimonotonic constraint, we propose a modified Star-Cubing method by means of converting constraint by top-k. It uses a method of top-k to convert a constraint to an antimonotonic constraint and carries out the star-reduction in the base cuboid table, thus reduces the cost of the shared dimension pruning in Star-Cubing. Experimental results show that the method could compute iceberg cube based on non-antimonotonic constraint availably and improve the efficiency of computation method at the same time.
{"title":"A Method of Computing Iceberg Cube Based on Non-antimonotonic Constraint","authors":"Yuntian Feng, Hongjun Zhang, Wenning Hao, Gang Chen","doi":"10.1109/ISCC-C.2013.20","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.20","url":null,"abstract":"To compute iceberg cube based on non-antimonotonic constraint, we propose a modified Star-Cubing method by means of converting constraint by top-k. It uses a method of top-k to convert a constraint to an antimonotonic constraint and carries out the star-reduction in the base cuboid table, thus reduces the cost of the shared dimension pruning in Star-Cubing. Experimental results show that the method could compute iceberg cube based on non-antimonotonic constraint availably and improve the efficiency of computation method at the same time.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122183484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Deformation of 3D objects is an important problem in many application domains, such as geometric modeling, computer graphics and computer-aided design. In this paper, we propose a method for deformation of 3D objects with arc-length constraints. We convert the curve into the polyline. Then we build the energy function of the polyline. Based on the minimum energy curve method, the curve on the mesh is deformed with arc-length constraints and multi-points constraints. The test results show that the proposed method has good performance. Compared to the other method, shape preserving of the curve is better. Finally, we use this method for the deformation of the 3D mannequin model.
{"title":"Arc-Length Constraint-Based Surface Deformation Using Energy-Minimum Optimization","authors":"Huanyu Yang, K. Hao, Yongsheng Ding","doi":"10.1109/ISCC-C.2013.51","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.51","url":null,"abstract":"Deformation of 3D objects is an important problem in many application domains, such as geometric modeling, computer graphics and computer-aided design. In this paper, we propose a method for deformation of 3D objects with arc-length constraints. We convert the curve into the polyline. Then we build the energy function of the polyline. Based on the minimum energy curve method, the curve on the mesh is deformed with arc-length constraints and multi-points constraints. The test results show that the proposed method has good performance. Compared to the other method, shape preserving of the curve is better. Finally, we use this method for the deformation of the 3D mannequin model.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122233949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we examined the use of Neural Networks as a tool to predict the starting and reserve line up of All-Star game, in the National Basketball Association, from all the candidates. Statistics of data from season 2008-09 to 2012-13 were collected and used to train a verity of Neural Networks such as feed-forward, radial basis and generalized regression Neural Networks. Fusion of the neural networks was also examined by using AdaBoost ensemble learning algorithm. Further, we have explored which features set input to the neural network was the most useful ones for prediction. And an excellent prediction scheme was proposed to improve the forecast accuracy. By using AdaBoost and the proposed scheme, the accuracy of our prediction of the starting line up is up to 91.7%, the reserve line up 73.3%.
{"title":"NBA All-Star Lineup Prediction Based on Neural Networks","authors":"B. Ji, Ji Li","doi":"10.1109/ISCC-C.2013.92","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.92","url":null,"abstract":"In this paper we examined the use of Neural Networks as a tool to predict the starting and reserve line up of All-Star game, in the National Basketball Association, from all the candidates. Statistics of data from season 2008-09 to 2012-13 were collected and used to train a verity of Neural Networks such as feed-forward, radial basis and generalized regression Neural Networks. Fusion of the neural networks was also examined by using AdaBoost ensemble learning algorithm. Further, we have explored which features set input to the neural network was the most useful ones for prediction. And an excellent prediction scheme was proposed to improve the forecast accuracy. By using AdaBoost and the proposed scheme, the accuracy of our prediction of the starting line up is up to 91.7%, the reserve line up 73.3%.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123230227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}