Pub Date : 2010-06-28DOI: 10.1109/EDT.2010.5496591
Lijuan Zheng, Zhen Han, Man Xu, Jiangang Qi
In current network, IP address is used to represent both a host's identity and a host's topological location. This overloading makes mobility and multi-homing hard from the security point of view. In this paper we show in universal network how to solve the end-host mobility and end-host multi-homing problems, and introduce a signalling protocol to solve the security problems caused by mobility and multi-homing. Basically, universal network introduces a new architecture, in which AID is used to represent the identity of the host, RID is used to denote the topological location of the host, breaking the fixed binding between identities and locations.
{"title":"Integrating mobility, multi-homing and security in universal network","authors":"Lijuan Zheng, Zhen Han, Man Xu, Jiangang Qi","doi":"10.1109/EDT.2010.5496591","DOIUrl":"https://doi.org/10.1109/EDT.2010.5496591","url":null,"abstract":"In current network, IP address is used to represent both a host's identity and a host's topological location. This overloading makes mobility and multi-homing hard from the security point of view. In this paper we show in universal network how to solve the end-host mobility and end-host multi-homing problems, and introduce a signalling protocol to solve the security problems caused by mobility and multi-homing. Basically, universal network introduces a new architecture, in which AID is used to represent the identity of the host, RID is used to denote the topological location of the host, breaking the fixed binding between identities and locations.","PeriodicalId":325767,"journal":{"name":"2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121548499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-28DOI: 10.1109/EDT.2010.5496592
Fan Yuxiang, He Yabo
The construction management of traditional government investing project has been exposed exactly with disadvantages on the special Chinese conditions and present market environment .so the performing of Agent-construction system model has historic inevitability and practice meaning. Agent-construction system is a new project management model that appears in this years, this paper analyzes the headspring development property and implement of Agent-construction system, putting forward problems and keeping away method which in bringing into effect Agent-construction system at present.
{"title":"Notice of RetractionAgent-construction government investment project management new mode","authors":"Fan Yuxiang, He Yabo","doi":"10.1109/EDT.2010.5496592","DOIUrl":"https://doi.org/10.1109/EDT.2010.5496592","url":null,"abstract":"The construction management of traditional government investing project has been exposed exactly with disadvantages on the special Chinese conditions and present market environment .so the performing of Agent-construction system model has historic inevitability and practice meaning. Agent-construction system is a new project management model that appears in this years, this paper analyzes the headspring development property and implement of Agent-construction system, putting forward problems and keeping away method which in bringing into effect Agent-construction system at present.","PeriodicalId":325767,"journal":{"name":"2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125582616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-28DOI: 10.1109/EDT.2010.5496562
Zhao Wanhua
This paper sets up harmony project management system to build the common harmony of the engineering construction project's external environment and internal environment. The whole harmony project management theoretical system is divided into 4 parts. Each composing element is the support to the harmony project management system. They are not independent but inter-associated and interactive and meanwhile each element plays its role around the harmony project management culture.
{"title":"The building of harmony project management theoretical system","authors":"Zhao Wanhua","doi":"10.1109/EDT.2010.5496562","DOIUrl":"https://doi.org/10.1109/EDT.2010.5496562","url":null,"abstract":"This paper sets up harmony project management system to build the common harmony of the engineering construction project's external environment and internal environment. The whole harmony project management theoretical system is divided into 4 parts. Each composing element is the support to the harmony project management system. They are not independent but inter-associated and interactive and meanwhile each element plays its role around the harmony project management culture.","PeriodicalId":325767,"journal":{"name":"2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128512044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-04-17DOI: 10.1109/EDT.2010.5496422
Aimin Wang, Jie Li
Major of Computer Science & Technology (CST) in normal university should not only have the major's general features but also have its own characteristics. This paper discusses the major construction of CST in Anyang Normal University (AYNU) against the background of Ministry of Education of China's Characteristic Major Construction (CMC). From the aspects of major construction's training objective, training plan, assurance system and training effects, it introduces the preliminary effects of CMC in computer and information technology school of AYNU. Finally, it prospects the further work of CMC in AYNU.
{"title":"National level characteristic major construction of Computer Science and Technology","authors":"Aimin Wang, Jie Li","doi":"10.1109/EDT.2010.5496422","DOIUrl":"https://doi.org/10.1109/EDT.2010.5496422","url":null,"abstract":"Major of Computer Science & Technology (CST) in normal university should not only have the major's general features but also have its own characteristics. This paper discusses the major construction of CST in Anyang Normal University (AYNU) against the background of Ministry of Education of China's Characteristic Major Construction (CMC). From the aspects of major construction's training objective, training plan, assurance system and training effects, it introduces the preliminary effects of CMC in computer and information technology school of AYNU. Finally, it prospects the further work of CMC in AYNU.","PeriodicalId":325767,"journal":{"name":"2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115443713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-04-17DOI: 10.1109/EDT.2010.5496399
Qun Wang, Yong Yu, Shaobing Wang
As Scientific Research level has been an important indicator of college power, it's necessary to set up scientific research management system and make daily Scientific Management more normatively and effectively. In the process of exploiting and using scientific research management system, security has always been given the first priority since it is pivotal for the survival of the system. This paper describes the status of campus Scientific research management system, analyses the current major problems and hidden dangers, proposed a viewpoint to solve the security issues, including authentication, access control, communications security and digital signatures, expected to provide some help with the management of Campus Scientific Research.
{"title":"Discussion on security for campus scientific research management system","authors":"Qun Wang, Yong Yu, Shaobing Wang","doi":"10.1109/EDT.2010.5496399","DOIUrl":"https://doi.org/10.1109/EDT.2010.5496399","url":null,"abstract":"As Scientific Research level has been an important indicator of college power, it's necessary to set up scientific research management system and make daily Scientific Management more normatively and effectively. In the process of exploiting and using scientific research management system, security has always been given the first priority since it is pivotal for the survival of the system. This paper describes the status of campus Scientific research management system, analyses the current major problems and hidden dangers, proposed a viewpoint to solve the security issues, including authentication, access control, communications security and digital signatures, expected to provide some help with the management of Campus Scientific Research.","PeriodicalId":325767,"journal":{"name":"2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117210818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-04-17DOI: 10.1109/EDT.2010.5496565
Lili Li, Yongxin Liu
Fuzzy PID with parameters self-turning control technology is applied to design a belt position departure control system to control the belt transmission. This designed system is simulated using MATLAB Simulation, and simulating results show that the response speed, overshot, self-adapting and robustness of the fuzzy controller are better than that of the traditional PID controller, and also more stable. This design is used in a real belt offset control system.
{"title":"Fuzzy PID with parameters self-turning used in the belt position departure control","authors":"Lili Li, Yongxin Liu","doi":"10.1109/EDT.2010.5496565","DOIUrl":"https://doi.org/10.1109/EDT.2010.5496565","url":null,"abstract":"Fuzzy PID with parameters self-turning control technology is applied to design a belt position departure control system to control the belt transmission. This designed system is simulated using MATLAB Simulation, and simulating results show that the response speed, overshot, self-adapting and robustness of the fuzzy controller are better than that of the traditional PID controller, and also more stable. This design is used in a real belt offset control system.","PeriodicalId":325767,"journal":{"name":"2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126643817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-04-17DOI: 10.1109/EDT.2010.5496373
Zhou Xianjiang, Wang Xiangfei, Zhang Qiaoling
Using factor analysis on the impact of social transition, China Professional Basketball Club, the input and returns an analysis of the factors,The results show that the team factor, the club factor, the Chinese Basketball Association factors, service factors, social and environmental factors affecting the period of social transition in China Professional Basketball Club, the main factor inputs and returns. According to China's reality of professional basketball club, proposed countermeasures:Clubs should continue to improve the team's performance and strength as the fundamental task, in the capital and, under conditions permitting the introduction of super-star; club should strive to establish clear property rights and the modern enterprise system, become autonomous, self-operating entity; the club should continue to improve the quality of the venues within the facility and service standards, in particular, should increase the dissemination of technologies and means of investment; the community should continue to strive, together for the development of China's Professional Basketball Club to provide a suitable external environment.
{"title":"Notice of RetractionPeriod of social transition into the Chinese Professional Basketball Club, the Tmpact of factor analysis and revenue","authors":"Zhou Xianjiang, Wang Xiangfei, Zhang Qiaoling","doi":"10.1109/EDT.2010.5496373","DOIUrl":"https://doi.org/10.1109/EDT.2010.5496373","url":null,"abstract":"Using factor analysis on the impact of social transition, China Professional Basketball Club, the input and returns an analysis of the factors,The results show that the team factor, the club factor, the Chinese Basketball Association factors, service factors, social and environmental factors affecting the period of social transition in China Professional Basketball Club, the main factor inputs and returns. According to China's reality of professional basketball club, proposed countermeasures:Clubs should continue to improve the team's performance and strength as the fundamental task, in the capital and, under conditions permitting the introduction of super-star; club should strive to establish clear property rights and the modern enterprise system, become autonomous, self-operating entity; the club should continue to improve the quality of the venues within the facility and service standards, in particular, should increase the dissemination of technologies and means of investment; the community should continue to strive, together for the development of China's Professional Basketball Club to provide a suitable external environment.","PeriodicalId":325767,"journal":{"name":"2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116412197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-04-17DOI: 10.1109/EDT.2010.5496584
Zhou Xunjie, Li Chao, Liu Pu
At the present stage, most of the university library networks are using the wired networks. However, as the university staff's demanding for the Internet is increasing, the limited access terminals and the electronic reading rooms have been far from meeting the reader demand. Building a wireless network on the basis of the wired network can meet readers' demanding for Internet access and retrieval. This paper first analyzes the architecture of the library wireless network, and then by compare, selects the IEEE 802.11 standard to set up the wireless network; the paper focuses on the standards both 802.11b and 802.11g.
{"title":"Application research of 802.11-based wireless network in the library","authors":"Zhou Xunjie, Li Chao, Liu Pu","doi":"10.1109/EDT.2010.5496584","DOIUrl":"https://doi.org/10.1109/EDT.2010.5496584","url":null,"abstract":"At the present stage, most of the university library networks are using the wired networks. However, as the university staff's demanding for the Internet is increasing, the limited access terminals and the electronic reading rooms have been far from meeting the reader demand. Building a wireless network on the basis of the wired network can meet readers' demanding for Internet access and retrieval. This paper first analyzes the architecture of the library wireless network, and then by compare, selects the IEEE 802.11 standard to set up the wireless network; the paper focuses on the standards both 802.11b and 802.11g.","PeriodicalId":325767,"journal":{"name":"2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129899755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-04-17DOI: 10.1109/EDT.2010.5496435
Xuefei Chen, Jing Liu, Jun Han, Hong-yun Xu
Cloud computing affects the development of mobile learning with its unique advantages. This article first sums up the traditional mode of mobile learning, analyses the characteristics of various patterns, sum up the characteristics of the cloud computing, and then make mobile learning mode under a cloud computing environment.
{"title":"Primary exploration of mobile learning mode under a cloud computing environment","authors":"Xuefei Chen, Jing Liu, Jun Han, Hong-yun Xu","doi":"10.1109/EDT.2010.5496435","DOIUrl":"https://doi.org/10.1109/EDT.2010.5496435","url":null,"abstract":"Cloud computing affects the development of mobile learning with its unique advantages. This article first sums up the traditional mode of mobile learning, analyses the characteristics of various patterns, sum up the characteristics of the cloud computing, and then make mobile learning mode under a cloud computing environment.","PeriodicalId":325767,"journal":{"name":"2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123527874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-04-17DOI: 10.1109/EDT.2010.5496609
H. Qiang, Ding Zhihua, Zhang Xiao
It is significant to identify the running-states of NC machines for ensuring the machining accuracy and running stability. Vibration diagnosis is an on-line prognostics and diagnosis technique by picking-up the frequency characters of the vibration signal on NC machine. In the paper, combining with the wavelet noise reduction and character extraction with varying scales, the Hidden Semi-Markov model is built by the example of headstock bearing abrasion to recognize the running-states effectively. According to experiment and simulation researches, it indicates that the veracity of identification is 96.7% in the 120 test samples after training the HSMM with 80 training samples. This fault diagnosis method is satisfied for the engineering demand, and it can be applied for vibration analysis for other complex machineries.
{"title":"Application of HSMM on NC machine's state recognition","authors":"H. Qiang, Ding Zhihua, Zhang Xiao","doi":"10.1109/EDT.2010.5496609","DOIUrl":"https://doi.org/10.1109/EDT.2010.5496609","url":null,"abstract":"It is significant to identify the running-states of NC machines for ensuring the machining accuracy and running stability. Vibration diagnosis is an on-line prognostics and diagnosis technique by picking-up the frequency characters of the vibration signal on NC machine. In the paper, combining with the wavelet noise reduction and character extraction with varying scales, the Hidden Semi-Markov model is built by the example of headstock bearing abrasion to recognize the running-states effectively. According to experiment and simulation researches, it indicates that the veracity of identification is 96.7% in the 120 test samples after training the HSMM with 80 training samples. This fault diagnosis method is satisfied for the engineering demand, and it can be applied for vibration analysis for other complex machineries.","PeriodicalId":325767,"journal":{"name":"2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114322658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}