Pub Date : 2010-04-17DOI: 10.1109/EDT.2010.5496398
Xue-ling Song, Zhe-ying Song, Chao-ying Liu
According to the characters of relatively weak cultural foundation though the overall quality relatively high of independent college students, the “Automatic Control Theory” teaching reform ideas and methods are proposed combining with long-term teaching experience and the application of network and information technology. The curriculum reform includes many aspects such as teaching content, teaching mode, and practice areas, assessment models and so on. From many years teaching practice process, it can be seen that students' learning effectiveness and engineering practice abilities are improved greatly by using these teaching reforms.
{"title":"Teaching reform of “Automatic Control Theory” course for the independent college students","authors":"Xue-ling Song, Zhe-ying Song, Chao-ying Liu","doi":"10.1109/EDT.2010.5496398","DOIUrl":"https://doi.org/10.1109/EDT.2010.5496398","url":null,"abstract":"According to the characters of relatively weak cultural foundation though the overall quality relatively high of independent college students, the “Automatic Control Theory” teaching reform ideas and methods are proposed combining with long-term teaching experience and the application of network and information technology. The curriculum reform includes many aspects such as teaching content, teaching mode, and practice areas, assessment models and so on. From many years teaching practice process, it can be seen that students' learning effectiveness and engineering practice abilities are improved greatly by using these teaching reforms.","PeriodicalId":325767,"journal":{"name":"2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132752432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-04-17DOI: 10.1109/EDT.2010.5496560
Zhang Ruihong, Y. Zhichao
How to use the information technology to improve solid waste management has become a social hot issue of environment protection and resources protection. This paper chose Dongguan City as the study area, discussed the construction goal of waste management system, and designed the waste information system based on GIS. The study would boost the solid waste management reform, and improve its management level and efficiency. It was helpful for other environmental management information system, and it could also be used as a good example in the national implementation. The research would boost pollution sources reform, and improve its management level and efficiency.
{"title":"The research of solid waste management system in Dongguan City based on GIS","authors":"Zhang Ruihong, Y. Zhichao","doi":"10.1109/EDT.2010.5496560","DOIUrl":"https://doi.org/10.1109/EDT.2010.5496560","url":null,"abstract":"How to use the information technology to improve solid waste management has become a social hot issue of environment protection and resources protection. This paper chose Dongguan City as the study area, discussed the construction goal of waste management system, and designed the waste information system based on GIS. The study would boost the solid waste management reform, and improve its management level and efficiency. It was helpful for other environmental management information system, and it could also be used as a good example in the national implementation. The research would boost pollution sources reform, and improve its management level and efficiency.","PeriodicalId":325767,"journal":{"name":"2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128536616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-04-17DOI: 10.1109/EDT.2010.5496540
D. Bansal, S. Sofat
In recent years, mesh networking has emerged as a key technology for the last mile Internet access and found to be an important area of research. The current draft standard of IEEE 802.11s has defined routing for Wireless Mesh Networks (WMNs) in layer-2 and is termed as Hybrid Wireless Mesh Protocol (HWMP). However, security in routing or forwarding functionality is not specified in the standard. The protocol does not provide authentication and integrity of routing messages which makes it vulnerable to many attacks. As a consequence, the routing protocol in its current form is vulnerable to various types of routing attacks. In this paper, we propose modified HWMP routing protocol for WMN which uses cryptographic extensions to protect unprotected routing information elements. We will show that the proposed protocol successfully prevents all the identified attacks.
{"title":"Securing IEEE 802.11 based hybrid wireless mesh networks","authors":"D. Bansal, S. Sofat","doi":"10.1109/EDT.2010.5496540","DOIUrl":"https://doi.org/10.1109/EDT.2010.5496540","url":null,"abstract":"In recent years, mesh networking has emerged as a key technology for the last mile Internet access and found to be an important area of research. The current draft standard of IEEE 802.11s has defined routing for Wireless Mesh Networks (WMNs) in layer-2 and is termed as Hybrid Wireless Mesh Protocol (HWMP). However, security in routing or forwarding functionality is not specified in the standard. The protocol does not provide authentication and integrity of routing messages which makes it vulnerable to many attacks. As a consequence, the routing protocol in its current form is vulnerable to various types of routing attacks. In this paper, we propose modified HWMP routing protocol for WMN which uses cryptographic extensions to protect unprotected routing information elements. We will show that the proposed protocol successfully prevents all the identified attacks.","PeriodicalId":325767,"journal":{"name":"2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131637399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-04-17DOI: 10.1109/EDT.2010.5496542
Kui Li, Xiaolin Lei
In this paper, an accumulated method for automatic terrain generation was proposed which was based on the fractal theory. The Fault formation algorithm is used to generate an initial model of terrain. By controlling the iteration and amplitude of Fault formation, we can get diversified Contoured Terrain. Then the MPD (Middle Point Displacement) method of fractal theory is used to iterate the initial model, which results in more terrain details. The main advantage of the method is the combination of automaticity and controllability. On the one hand, Terrain Feature Templates can be automatically generated by the various values of the parameters of Fault formation. On the other hand, arbitrary level detail can be produced by the various values of the Fractal parameters. The experiments prove that our method is feasible and valid and the realistic terrain can be generated through the method.
提出了一种基于分形理论的地形自动生成累积方法。断层生成算法用于生成地形的初始模型。通过控制断层构造的迭代和振幅,可以得到多样化的等高线地形。然后利用分形理论中的MPD (Middle Point Displacement)方法对初始模型进行迭代,得到更多的地形细节。该方法的主要优点是将自动性和可控性相结合。一方面,地形特征模板可以由断层形成参数的各种值自动生成。另一方面,分形参数的不同值可以产生任意层次的细节。实验证明了该方法的可行性和有效性,可以生成真实的地形。
{"title":"An accumulated method based on fractal for automatic terrain generation","authors":"Kui Li, Xiaolin Lei","doi":"10.1109/EDT.2010.5496542","DOIUrl":"https://doi.org/10.1109/EDT.2010.5496542","url":null,"abstract":"In this paper, an accumulated method for automatic terrain generation was proposed which was based on the fractal theory. The Fault formation algorithm is used to generate an initial model of terrain. By controlling the iteration and amplitude of Fault formation, we can get diversified Contoured Terrain. Then the MPD (Middle Point Displacement) method of fractal theory is used to iterate the initial model, which results in more terrain details. The main advantage of the method is the combination of automaticity and controllability. On the one hand, Terrain Feature Templates can be automatically generated by the various values of the parameters of Fault formation. On the other hand, arbitrary level detail can be produced by the various values of the Fractal parameters. The experiments prove that our method is feasible and valid and the realistic terrain can be generated through the method.","PeriodicalId":325767,"journal":{"name":"2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131869363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-04-17DOI: 10.1109/EDT.2010.5496572
Lihua Duan
A new fuzzy method for multi-objective decision-making is proposed, in order to resolve the incomplete fuzzy preference relation problems, and the specific algorithm is presented on the basis of the fuzzy consistent relation. To decrease the subjectivity in the process of decision-making, it is discussed how to do with the appropriate weights and how to optimize multi-objective sorting. It is concluded that it is feasible to apply the fuzzy consistent relation to multi-objective decision-making analysis, and the improved fuzzy method is workable.
{"title":"A new method based on incomplete fuzzy preference relation for multi-objective decision-making","authors":"Lihua Duan","doi":"10.1109/EDT.2010.5496572","DOIUrl":"https://doi.org/10.1109/EDT.2010.5496572","url":null,"abstract":"A new fuzzy method for multi-objective decision-making is proposed, in order to resolve the incomplete fuzzy preference relation problems, and the specific algorithm is presented on the basis of the fuzzy consistent relation. To decrease the subjectivity in the process of decision-making, it is discussed how to do with the appropriate weights and how to optimize multi-objective sorting. It is concluded that it is feasible to apply the fuzzy consistent relation to multi-objective decision-making analysis, and the improved fuzzy method is workable.","PeriodicalId":325767,"journal":{"name":"2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133111559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-04-17DOI: 10.1109/EDT.2010.5496553
Yun-fei Li, Qing Liu, Tong Li
This paper aims at speeding up RSA decryption and signature. The performance of RSA decryption and signature has direct relationship with the efficiency of modular exponentiation implementation. This paper proposes a variant of RSA cryptosystem (EAMRSA-Encrypt Assistant Multi- Prime RSA) by reducing modules and private exponents in modular exponentiation. The experimental result shows that the speed of the decryption and signature has been substantially improved and the variant can be efficiently implemented in parallel.
本文旨在提高RSA解密和签名的速度。RSA解密和签名的性能直接关系到模幂运算的实现效率。本文提出了一种RSA密码系统的变体(eamrsa - encryption Assistant Multi- Prime RSA),该密码系统通过模幂的化简模块和私有指数来实现。实验结果表明,该算法大大提高了解密和签名的速度,并且可以有效地并行实现该算法。
{"title":"Design and implementation of an improved RSA algorithm","authors":"Yun-fei Li, Qing Liu, Tong Li","doi":"10.1109/EDT.2010.5496553","DOIUrl":"https://doi.org/10.1109/EDT.2010.5496553","url":null,"abstract":"This paper aims at speeding up RSA decryption and signature. The performance of RSA decryption and signature has direct relationship with the efficiency of modular exponentiation implementation. This paper proposes a variant of RSA cryptosystem (EAMRSA-Encrypt Assistant Multi- Prime RSA) by reducing modules and private exponents in modular exponentiation. The experimental result shows that the speed of the decryption and signature has been substantially improved and the variant can be efficiently implemented in parallel.","PeriodicalId":325767,"journal":{"name":"2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT)","volume":"20 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132934903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-04-17DOI: 10.1109/EDT.2010.5496378
Jia Yu
In recent years, more and more people find traditional teaching methods are unable to meet the requirements of computer education in colleges which needs related experiments. In this work, we proposed a innovation teaching method based on robot project-driven and applied this method in the teaching process of embedded system course. We design a project named “Line Tracking”, which can be decomposed into several tasks, implemented by groups of students cooperatively. Finally we provide a summary and analysis of the characteristics of this teaching mode as well as the effect of the curriculum practice. Robot project-driven method can exetremely stimulate the enthusiasm of students to involve themselves in projects design and execution.
{"title":"Innovation teaching method researching on embedded system course based on robot project-driven idea","authors":"Jia Yu","doi":"10.1109/EDT.2010.5496378","DOIUrl":"https://doi.org/10.1109/EDT.2010.5496378","url":null,"abstract":"In recent years, more and more people find traditional teaching methods are unable to meet the requirements of computer education in colleges which needs related experiments. In this work, we proposed a innovation teaching method based on robot project-driven and applied this method in the teaching process of embedded system course. We design a project named “Line Tracking”, which can be decomposed into several tasks, implemented by groups of students cooperatively. Finally we provide a summary and analysis of the characteristics of this teaching mode as well as the effect of the curriculum practice. Robot project-driven method can exetremely stimulate the enthusiasm of students to involve themselves in projects design and execution.","PeriodicalId":325767,"journal":{"name":"2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132064472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-04-17DOI: 10.1109/EDT.2010.5496566
F. Shuo, Gao-lei Fei, Xue Yanming, Li Heng
In order to further improve identification efficiency of tag anti-collision algorithm in RFID system, we analyze the performance of the frame-slot ALOHA anti-collision algorithm, apply the idea of grouping in binary search algorithm to frame-slot ALOHA anti-collision algorithm, and on this basis, we propose an improved anti-collision algorithm to identify the collided tags in time slots quickly and correctly. The simulation results show that, the improved algorithm does improve the anti-collision performance, reduce the throughput of data, and improve the tag identification efficiency in RFID system.
{"title":"An improved frame-slot ALOHA anti-collision algorithm","authors":"F. Shuo, Gao-lei Fei, Xue Yanming, Li Heng","doi":"10.1109/EDT.2010.5496566","DOIUrl":"https://doi.org/10.1109/EDT.2010.5496566","url":null,"abstract":"In order to further improve identification efficiency of tag anti-collision algorithm in RFID system, we analyze the performance of the frame-slot ALOHA anti-collision algorithm, apply the idea of grouping in binary search algorithm to frame-slot ALOHA anti-collision algorithm, and on this basis, we propose an improved anti-collision algorithm to identify the collided tags in time slots quickly and correctly. The simulation results show that, the improved algorithm does improve the anti-collision performance, reduce the throughput of data, and improve the tag identification efficiency in RFID system.","PeriodicalId":325767,"journal":{"name":"2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124050740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-04-17DOI: 10.1109/EDT.2010.5496420
Hongli Cheng, Wei Chen
Lots of feedback information of employment indicate the success of employment for the students of electric specially is affected by the teaching effect of “electronic technology basic courses” directly. The teaching research of “electronic technology basic courses” becomes very important research project in university. This paper analyzes the importance of “electronic technology basic courses” in specialty technology teaching, explores the difficulties and emphases of the teaching of the courses, then puts forward some thinking and methods about “how integrating effectively the traditional teaching methods and the modern teaching methods”. Lots of practices indicate that it can raise the studying interest of students, and obtain some good teaching effects.
{"title":"Notice of RetractionExploration and research on teaching method of electronic technology basic course","authors":"Hongli Cheng, Wei Chen","doi":"10.1109/EDT.2010.5496420","DOIUrl":"https://doi.org/10.1109/EDT.2010.5496420","url":null,"abstract":"Lots of feedback information of employment indicate the success of employment for the students of electric specially is affected by the teaching effect of “electronic technology basic courses” directly. The teaching research of “electronic technology basic courses” becomes very important research project in university. This paper analyzes the importance of “electronic technology basic courses” in specialty technology teaching, explores the difficulties and emphases of the teaching of the courses, then puts forward some thinking and methods about “how integrating effectively the traditional teaching methods and the modern teaching methods”. Lots of practices indicate that it can raise the studying interest of students, and obtain some good teaching effects.","PeriodicalId":325767,"journal":{"name":"2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121190595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-04-17DOI: 10.1109/EDT.2010.5496452
Chuan Sun, Wanjing Ding
A new evaluation method was proposed in order to improve the reliability of evaluation of special Skill in Mechanical Operation Field. It analyzed the relationship between the evaluation index and the operation skill, and built the fuzzy synthesis evaluation method according to the request and characteristic of the operation skill. Arrangement analysis method was used to determine weight of index for decreasing influence of subject factor. Fuzzy evaluation matrix was built based on fuzzy set transformation principle. Finally, a new fuzzy measure and evaluation system was designed.
{"title":"Special Skill evaluation in Mechanical Operation Field based on fuzzy evaluation method","authors":"Chuan Sun, Wanjing Ding","doi":"10.1109/EDT.2010.5496452","DOIUrl":"https://doi.org/10.1109/EDT.2010.5496452","url":null,"abstract":"A new evaluation method was proposed in order to improve the reliability of evaluation of special Skill in Mechanical Operation Field. It analyzed the relationship between the evaluation index and the operation skill, and built the fuzzy synthesis evaluation method according to the request and characteristic of the operation skill. Arrangement analysis method was used to determine weight of index for decreasing influence of subject factor. Fuzzy evaluation matrix was built based on fuzzy set transformation principle. Finally, a new fuzzy measure and evaluation system was designed.","PeriodicalId":325767,"journal":{"name":"2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121444733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}