Pub Date : 2010-12-06DOI: 10.1109/DBTA.2010.5658970
Yan-Xiao Li, Le-Bin Lu, Dong-Yang Liu
Due to uncertainties in target motion and limited sensing regions of sensors, collaborative target tracking in wireless sensor networks (WSNs) suffers from low tracking accuracy and lack of reliability when a target cannot be detected by a scheduled sensor. Generally, actuating multiple sensors can achieve better tracking performance but with high energy consumption. Tracking accuracy, reliability, and energy consumed are affected by the continuous sensing and transmission and coding method. In this paper, an optimized energy-efficient multisensor scheduling scheme is proposed for collaborative target tracking in WSNs. Simulation results show that, compared with existing scheduling mechanism the proposed scheme can achieve superior energy efficiency and tracking reliability while satisfying the tracking accuracy requirement. It is also robust to the uncertainty of the process noise.
{"title":"Research on Battlefield Target Tracking in Wireless Sensor Networks","authors":"Yan-Xiao Li, Le-Bin Lu, Dong-Yang Liu","doi":"10.1109/DBTA.2010.5658970","DOIUrl":"https://doi.org/10.1109/DBTA.2010.5658970","url":null,"abstract":"Due to uncertainties in target motion and limited sensing regions of sensors, collaborative target tracking in wireless sensor networks (WSNs) suffers from low tracking accuracy and lack of reliability when a target cannot be detected by a scheduled sensor. Generally, actuating multiple sensors can achieve better tracking performance but with high energy consumption. Tracking accuracy, reliability, and energy consumed are affected by the continuous sensing and transmission and coding method. In this paper, an optimized energy-efficient multisensor scheduling scheme is proposed for collaborative target tracking in WSNs. Simulation results show that, compared with existing scheduling mechanism the proposed scheme can achieve superior energy efficiency and tracking reliability while satisfying the tracking accuracy requirement. It is also robust to the uncertainty of the process noise.","PeriodicalId":320509,"journal":{"name":"2010 2nd International Workshop on Database Technology and Applications","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129385893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-06DOI: 10.1109/DBTA.2010.5659046
Hongyan Lu, Zhengbing Hu
The application of Computer technology in education promoted the generation of Virtual Learning Environment (VLE). This paper describes the theory of VLE, and then studies some key steps during constructing VLE, including scenario construction, collaboration and communication, meaning construction as well as distribution of VLE system. Finally, a virtual learning environment created by Virtools is illustrated to verify those key steps.
{"title":"Study on the Virtual Learning Environment Construction Based on Virtools","authors":"Hongyan Lu, Zhengbing Hu","doi":"10.1109/DBTA.2010.5659046","DOIUrl":"https://doi.org/10.1109/DBTA.2010.5659046","url":null,"abstract":"The application of Computer technology in education promoted the generation of Virtual Learning Environment (VLE). This paper describes the theory of VLE, and then studies some key steps during constructing VLE, including scenario construction, collaboration and communication, meaning construction as well as distribution of VLE system. Finally, a virtual learning environment created by Virtools is illustrated to verify those key steps.","PeriodicalId":320509,"journal":{"name":"2010 2nd International Workshop on Database Technology and Applications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121364756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-06DOI: 10.1109/DBTA.2010.5659106
X. Ren, J. Yang, Fengmei Wei
The common way to protect privacy is to use K-anonymity in data publishing. This paper will analyse comprehensively the current research situation of K-anonymity model used to prevent privacy leaked in data publishing, we study the characteristics of sensitive attribute diversity of K-Anonymity, and propose CBK(L,K)-Anonymity algorithm in order to solve the problem of privacy information leakage in publishing the data, it can make anonymous data effectively resist background knowledge attack and homogeneity attack , and can solve diversity of sensitive attribute. In addition, we will extend our ideas for handling how to solve privacy information leakage problem by using CBK(L,K)-Anonymity algorithm in another paper.
{"title":"Research on Diversity of Sensitive Attribute of K-Anonymity","authors":"X. Ren, J. Yang, Fengmei Wei","doi":"10.1109/DBTA.2010.5659106","DOIUrl":"https://doi.org/10.1109/DBTA.2010.5659106","url":null,"abstract":"The common way to protect privacy is to use K-anonymity in data publishing. This paper will analyse comprehensively the current research situation of K-anonymity model used to prevent privacy leaked in data publishing, we study the characteristics of sensitive attribute diversity of K-Anonymity, and propose CBK(L,K)-Anonymity algorithm in order to solve the problem of privacy information leakage in publishing the data, it can make anonymous data effectively resist background knowledge attack and homogeneity attack , and can solve diversity of sensitive attribute. In addition, we will extend our ideas for handling how to solve privacy information leakage problem by using CBK(L,K)-Anonymity algorithm in another paper.","PeriodicalId":320509,"journal":{"name":"2010 2nd International Workshop on Database Technology and Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126585470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-06DOI: 10.1109/DBTA.2010.5659080
Shuijing Jie
This paper has explored some features, the system design goals, ideas, processes, technology, and the selection of the psychology archives content as well as the design of the system function modules of a Psychological Archives Management System for College Students (PAMS), which is always highly valued as an important support system for college students' mental health.
{"title":"A Novel Psychological Archives Management System for College Students","authors":"Shuijing Jie","doi":"10.1109/DBTA.2010.5659080","DOIUrl":"https://doi.org/10.1109/DBTA.2010.5659080","url":null,"abstract":"This paper has explored some features, the system design goals, ideas, processes, technology, and the selection of the psychology archives content as well as the design of the system function modules of a Psychological Archives Management System for College Students (PAMS), which is always highly valued as an important support system for college students' mental health.","PeriodicalId":320509,"journal":{"name":"2010 2nd International Workshop on Database Technology and Applications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126846393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-06DOI: 10.1109/DBTA.2010.5658936
Xiuxu Zhao, Y. Zhu
Failure Mode and Effect Analysis (FMEA) is an important method to ensure the effectiveness of manufacturing process, which can prevent the happening of various potential failure. If the knowledge of FMEA can be accumulated and utilized reasonably, the quality management in manufacturing process will get decision support timely, and the efficiency of product quality problem analysis also can be improved. But, it is impossible to integrate the dispersive FMEA knowledge in the manufacturing process because there is a lack of unified management criterion of FMEA knowledge. In order to satisfy the requirement to share, reuse, and maintain FMEA knowledge, the representation method of FMEA knowledge based on ontology is put forward in this study. The structure of FMEA knowledge ontology can be described via visual modeling tool- Unified Modeling Language. In this study, the FMEA repository has been built and the acquisition, storage and searching of FMEA knowledge has been researched to satisfy the need of sharing and reusing of the FMEA knowledge in the manufacturing process.
{"title":"Research of FMEA Knowledge Sharing Method Based on Ontology and the Application in Manufacturing Process","authors":"Xiuxu Zhao, Y. Zhu","doi":"10.1109/DBTA.2010.5658936","DOIUrl":"https://doi.org/10.1109/DBTA.2010.5658936","url":null,"abstract":"Failure Mode and Effect Analysis (FMEA) is an important method to ensure the effectiveness of manufacturing process, which can prevent the happening of various potential failure. If the knowledge of FMEA can be accumulated and utilized reasonably, the quality management in manufacturing process will get decision support timely, and the efficiency of product quality problem analysis also can be improved. But, it is impossible to integrate the dispersive FMEA knowledge in the manufacturing process because there is a lack of unified management criterion of FMEA knowledge. In order to satisfy the requirement to share, reuse, and maintain FMEA knowledge, the representation method of FMEA knowledge based on ontology is put forward in this study. The structure of FMEA knowledge ontology can be described via visual modeling tool- Unified Modeling Language. In this study, the FMEA repository has been built and the acquisition, storage and searching of FMEA knowledge has been researched to satisfy the need of sharing and reusing of the FMEA knowledge in the manufacturing process.","PeriodicalId":320509,"journal":{"name":"2010 2nd International Workshop on Database Technology and Applications","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127661367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-06DOI: 10.1109/DBTA.2010.5658992
Kaibo Xu, Junkang Feng
The notion of 'classes of a path in an Entity-Relationship (ER) data schema' was put forward as a characterization of the capability of a schema of accommodating data instances whereby to provide information for various purposes including answering a query. Thus far though, criteria with which a process of classifying paths can be systematically carried out are yet to be found and formulated. To this end, one possible approach seems to first all accurately and formally describe paths so that we can reason about them, and then to examine the characteristics of the formal representations of the paths with a view to finding useful clues and indications. We propose to use Description Logics (DL) for this task. In this paper, we show how to use Description Logics to formulate paths in an ER schema whereby to find desirable criteria.
{"title":"Identifying Criteria for Classifying Paths in ER Schemata by Using a Description Logic","authors":"Kaibo Xu, Junkang Feng","doi":"10.1109/DBTA.2010.5658992","DOIUrl":"https://doi.org/10.1109/DBTA.2010.5658992","url":null,"abstract":"The notion of 'classes of a path in an Entity-Relationship (ER) data schema' was put forward as a characterization of the capability of a schema of accommodating data instances whereby to provide information for various purposes including answering a query. Thus far though, criteria with which a process of classifying paths can be systematically carried out are yet to be found and formulated. To this end, one possible approach seems to first all accurately and formally describe paths so that we can reason about them, and then to examine the characteristics of the formal representations of the paths with a view to finding useful clues and indications. We propose to use Description Logics (DL) for this task. In this paper, we show how to use Description Logics to formulate paths in an ER schema whereby to find desirable criteria.","PeriodicalId":320509,"journal":{"name":"2010 2nd International Workshop on Database Technology and Applications","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128772791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-06DOI: 10.1109/DBTA.2010.5659116
Hongsong Liang
After studying the chaotic of economic organization carefully, we get to know the synergetic effect between organizational chaos and organizational innovation. We attempt to utilize the environment inducement to control chaotic change in organizational innovation. In addition, while analyzing the chaos characteristics of economic organization and reasons of organizational innovation, we have introduced the concept of managing entropy, and have done the further explanation to the relation between inside entropy and external entropy by quantization. Finally, this paper establishes the mathematics model during organizational innovation and external environment condition on the basis of Chaos Theory. Through analyzing, we find this model has feasibility in theory.
{"title":"The Coupling Mechanism between External Environment Change and Organizational Innovation Based on Chaos Analysis Models","authors":"Hongsong Liang","doi":"10.1109/DBTA.2010.5659116","DOIUrl":"https://doi.org/10.1109/DBTA.2010.5659116","url":null,"abstract":"After studying the chaotic of economic organization carefully, we get to know the synergetic effect between organizational chaos and organizational innovation. We attempt to utilize the environment inducement to control chaotic change in organizational innovation. In addition, while analyzing the chaos characteristics of economic organization and reasons of organizational innovation, we have introduced the concept of managing entropy, and have done the further explanation to the relation between inside entropy and external entropy by quantization. Finally, this paper establishes the mathematics model during organizational innovation and external environment condition on the basis of Chaos Theory. Through analyzing, we find this model has feasibility in theory.","PeriodicalId":320509,"journal":{"name":"2010 2nd International Workshop on Database Technology and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130611366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-06DOI: 10.1109/DBTA.2010.5658948
Yan Chen, Wenyu Zhang, D. Deng, Fangfei Zhao
In order to study the damage on weapon equipment by explosive shock wave, simulation experiments were carried out to research explosive impact damage on stiffened cantilever box girder. Data mining method of PCA was introduced to process the damage data in simulation experiments. Basing on simulation and data mining, it discussed multi-objective optimization of stiffened cantilever box girder about lightweight and anti-damage.
{"title":"Optimization of Stiffened Cantilever Box Girder Based on Data Mining on Simulation","authors":"Yan Chen, Wenyu Zhang, D. Deng, Fangfei Zhao","doi":"10.1109/DBTA.2010.5658948","DOIUrl":"https://doi.org/10.1109/DBTA.2010.5658948","url":null,"abstract":"In order to study the damage on weapon equipment by explosive shock wave, simulation experiments were carried out to research explosive impact damage on stiffened cantilever box girder. Data mining method of PCA was introduced to process the damage data in simulation experiments. Basing on simulation and data mining, it discussed multi-objective optimization of stiffened cantilever box girder about lightweight and anti-damage.","PeriodicalId":320509,"journal":{"name":"2010 2nd International Workshop on Database Technology and Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128112958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-06DOI: 10.1109/DBTA.2010.5658934
You-Sai Zhang, Zhong-Jun Chen
In this paper,a support vector regression neural network (SVR-NN) approach is presented to assessment the visual quality of JPEG-coded images without reference image.The key features of human visual system (HVS) such as edge amplitude and length, background activity and luminance are extracted from sample images as input vectors. SVR-NN was used to search and approximate the functional relationship between HVS and mean opinion score (MOS). Then,the measuring of visual quality of JPEG-coded images was realized. Experimental results prove that it is easy to initialize the network structure and set parameters of SVR-NN. And the better generalization performance owned by SVR-NN can add the new features of the sample automatically.Compared with other image quality metrics, the experimental results of the proposed metric exhibit much higher correlation with perception character of HVS. And the role of HVS feature in image quality index is fully reflected.
{"title":"No-Reference JPEG Image Quality Assessment Based on Support Vector Regression Neural Network","authors":"You-Sai Zhang, Zhong-Jun Chen","doi":"10.1109/DBTA.2010.5658934","DOIUrl":"https://doi.org/10.1109/DBTA.2010.5658934","url":null,"abstract":"In this paper,a support vector regression neural network (SVR-NN) approach is presented to assessment the visual quality of JPEG-coded images without reference image.The key features of human visual system (HVS) such as edge amplitude and length, background activity and luminance are extracted from sample images as input vectors. SVR-NN was used to search and approximate the functional relationship between HVS and mean opinion score (MOS). Then,the measuring of visual quality of JPEG-coded images was realized. Experimental results prove that it is easy to initialize the network structure and set parameters of SVR-NN. And the better generalization performance owned by SVR-NN can add the new features of the sample automatically.Compared with other image quality metrics, the experimental results of the proposed metric exhibit much higher correlation with perception character of HVS. And the role of HVS feature in image quality index is fully reflected.","PeriodicalId":320509,"journal":{"name":"2010 2nd International Workshop on Database Technology and Applications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128547654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-06DOI: 10.1109/DBTA.2010.5659078
Jie Ye
In this paper, design and implementation of WEB-based integrated system of office and business management was proposed in the context of one trading company. The systematic architecture and database design were introduced and the functions of various system components were analyzed. The technical details involved in implementation of Crystal Report chart display and Gridview mouse line events under .Net platform in the course of the system development were mainly expounded.
{"title":"Design and Implementation of WEB-Based Integrated System of Office and Business Management","authors":"Jie Ye","doi":"10.1109/DBTA.2010.5659078","DOIUrl":"https://doi.org/10.1109/DBTA.2010.5659078","url":null,"abstract":"In this paper, design and implementation of WEB-based integrated system of office and business management was proposed in the context of one trading company. The systematic architecture and database design were introduced and the functions of various system components were analyzed. The technical details involved in implementation of Crystal Report chart display and Gridview mouse line events under .Net platform in the course of the system development were mainly expounded.","PeriodicalId":320509,"journal":{"name":"2010 2nd International Workshop on Database Technology and Applications","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134146387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}