Besides traditional verification of system functions, performance evaluation in modern hardware and software systems has received extensive attention. Performance evaluation aims at obtaining quantitative measures of the system to test whether reliability-related properties are warranted. In this paper, model of the system is expressed in the form of IMC, a mixed model for describing both action-based and state-based systems. And by converting performance properties of the system into aCSL formulae, we can formally verify them by model checking. To accelerate the process of IMC performance evaluation, a modified version of ant colony algorithm is proposed in the paper. Compared with other numerical methods, the ant colony algorithm reduces unnecessary model elements and the execution efficiency is largely improved to tackle more complex system performance evaluation problems.
{"title":"Performance Evaluation by Ant Colony Algorithm","authors":"Jianfeng Chen, Jinzhao Wu","doi":"10.1109/ITCS.2010.40","DOIUrl":"https://doi.org/10.1109/ITCS.2010.40","url":null,"abstract":"Besides traditional verification of system functions, performance evaluation in modern hardware and software systems has received extensive attention. Performance evaluation aims at obtaining quantitative measures of the system to test whether reliability-related properties are warranted. In this paper, model of the system is expressed in the form of IMC, a mixed model for describing both action-based and state-based systems. And by converting performance properties of the system into aCSL formulae, we can formally verify them by model checking. To accelerate the process of IMC performance evaluation, a modified version of ant colony algorithm is proposed in the paper. Compared with other numerical methods, the ant colony algorithm reduces unnecessary model elements and the execution efficiency is largely improved to tackle more complex system performance evaluation problems.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125549780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Through literature consulting and correlation analysis, this paper selects seven important indicators which have close relation with CPI. Then on the basis of neural network theory and MATLAB neural network toolbox, this paper constructs a CPI prediction model. Finally, by using test samples to make a emulate experiment, the simulation result indicates that the model is feasible and effectual.
{"title":"Study on the Model of CPI Prediction Based on BP Neural Network","authors":"Hu Wang, Gengyao Fan","doi":"10.1109/ITCS.2010.147","DOIUrl":"https://doi.org/10.1109/ITCS.2010.147","url":null,"abstract":"Through literature consulting and correlation analysis, this paper selects seven important indicators which have close relation with CPI. Then on the basis of neural network theory and MATLAB neural network toolbox, this paper constructs a CPI prediction model. Finally, by using test samples to make a emulate experiment, the simulation result indicates that the model is feasible and effectual.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126637969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Interlocking system is the key equipment of railway signaling. New-type all-electronic execution unit (AEEU) for computer interlocking system is introduced. As an example of AEEU, characters and fail-safety of DC switches execution module is discussed in detail. Then some advantages of AEEU are emphasized such as reliable, a little space equipment, powerful function, building a network conveniently, easy to maintain, automatic protection while short circuit happened and so on. At the end part of paper, application on AEEU is introduced briefly.
{"title":"Application on the All-electronic Execution Unit for Railway Signaling","authors":"T. He","doi":"10.1109/ITCS.2010.144","DOIUrl":"https://doi.org/10.1109/ITCS.2010.144","url":null,"abstract":"Interlocking system is the key equipment of railway signaling. New-type all-electronic execution unit (AEEU) for computer interlocking system is introduced. As an example of AEEU, characters and fail-safety of DC switches execution module is discussed in detail. Then some advantages of AEEU are emphasized such as reliable, a little space equipment, powerful function, building a network conveniently, easy to maintain, automatic protection while short circuit happened and so on. At the end part of paper, application on AEEU is introduced briefly.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121400533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Because of nodes in P2P networks are self-organization, part of nodes in P2P networks appear selfish and P2P sharing of network resources do not achieve the desired efficiency. This paper presents an incentive mechanism based on game theory integrate with Mixed Strategy Nash Equilibrium, it is used to detect selfish nodes in P2P networks and urge them to join the network nodes consciously. Finally, this incentive mechanism is verified to be availability with simulation tools named Gambit.
{"title":"Incentive Mechanism Based on Game Theory in P2P Networks","authors":"Chunzhi Wang, Li Chen, Hongwe Chen, Ke Zhou","doi":"10.1109/ITCS.2010.53","DOIUrl":"https://doi.org/10.1109/ITCS.2010.53","url":null,"abstract":"Because of nodes in P2P networks are self-organization, part of nodes in P2P networks appear selfish and P2P sharing of network resources do not achieve the desired efficiency. This paper presents an incentive mechanism based on game theory integrate with Mixed Strategy Nash Equilibrium, it is used to detect selfish nodes in P2P networks and urge them to join the network nodes consciously. Finally, this incentive mechanism is verified to be availability with simulation tools named Gambit.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122465752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The fashion enterprise has faced more and faster changes in recent years due to the different requirements of customers and the variations of global economic environments. For leaders of these enterprises, they must make decision on correct strategies to keep competitiveness in such complex networked environment. E-HRM is the application of information technology for both networking and supporting at least two individual or collective actors in their shared performing of HR activities. Fashion enterprise could make better use of their human capital through E-HRM information system. The development of strategic E-HRM information systems in fashion enterprise is studied in this paper and the architecture is also discussed here.
{"title":"A Framework of E-HRM Information Systems in Fashion Enterprise","authors":"Xin-long Ma","doi":"10.1109/ITCS.2010.81","DOIUrl":"https://doi.org/10.1109/ITCS.2010.81","url":null,"abstract":"The fashion enterprise has faced more and faster changes in recent years due to the different requirements of customers and the variations of global economic environments. For leaders of these enterprises, they must make decision on correct strategies to keep competitiveness in such complex networked environment. E-HRM is the application of information technology for both networking and supporting at least two individual or collective actors in their shared performing of HR activities. Fashion enterprise could make better use of their human capital through E-HRM information system. The development of strategic E-HRM information systems in fashion enterprise is studied in this paper and the architecture is also discussed here.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132944039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
When designing the water level measuring instrument, incremental optical grating scale is used as position sensor. Since the water level must be measured repeatedly and continuously, cumulative error of measuring is the critical issue. Using asynchronous sequential logic circuit-level design approach, abstracting signal timing diagram from various moments of changing direction, designing of incentive state and output function expression and writing the expression to a programmable device, a grating scale processing circuit can be constructed. The water level measuring instrument based on this circuit is running perfectly on the model of Yangtze River flood proofing, indicating no cumulative errors are produced. The device can also be used for optical encoder position measurement and other measurements.
{"title":"Processing Method of Optical Grating Scale Output Signal","authors":"Xiwei Yang, Tianxiao Yang, Huazhong Jin, Z. Ye","doi":"10.1109/ITCS.2010.102","DOIUrl":"https://doi.org/10.1109/ITCS.2010.102","url":null,"abstract":"When designing the water level measuring instrument, incremental optical grating scale is used as position sensor. Since the water level must be measured repeatedly and continuously, cumulative error of measuring is the critical issue. Using asynchronous sequential logic circuit-level design approach, abstracting signal timing diagram from various moments of changing direction, designing of incentive state and output function expression and writing the expression to a programmable device, a grating scale processing circuit can be constructed. The water level measuring instrument based on this circuit is running perfectly on the model of Yangtze River flood proofing, indicating no cumulative errors are produced. The device can also be used for optical encoder position measurement and other measurements.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134228380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The rapid development of information technology and E-commerce proposes new requirements for enterprise’s information construction and the suitable evaluation of existing information system (IS) is the important step for that process. In this paper, treating the E-commerce application requirements as the starting points, the author extracts the main factors affecting the IS evaluation from the dimensions of reliability, coordination and integration. Then a multidimensional evaluation model is established using entropy weight method and ideal point method. Finally, the application of the model is discussed.
{"title":"A Multidimensional Evaluation Model Study on Information System from E-commerce Perspective","authors":"Song Wang, Xinmin Liu, Fang Li","doi":"10.1109/ITCS.2010.113","DOIUrl":"https://doi.org/10.1109/ITCS.2010.113","url":null,"abstract":"The rapid development of information technology and E-commerce proposes new requirements for enterprise’s information construction and the suitable evaluation of existing information system (IS) is the important step for that process. In this paper, treating the E-commerce application requirements as the starting points, the author extracts the main factors affecting the IS evaluation from the dimensions of reliability, coordination and integration. Then a multidimensional evaluation model is established using entropy weight method and ideal point method. Finally, the application of the model is discussed.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130374377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wireless Sensor Networks(WSNs) have been widely discussed in many applications. But a key design challenge is to solve power consumption, the reliability of radio communication and self-organizing of network. This paper proposes a design scheme of wireless sensor networks node architecture, builds a computer monitoring platform for experimenting with several of these nodes and designs a flexible PC-monitoring program. The design of a wireless sensor node adopts low power sensors, microcontroller and a Zigbee-based wireless transceiver, the server is based on .Net Framework architecture with database supported. The platform realizes such functions as network monitoring, collection and storage of required data, and so on. The prototyping results verify that our ideas are practical and feasible.
{"title":"A WSN-Based Experiment Platform for Monitoring","authors":"Deng Chen, Chen Yiping, Song Wanqing","doi":"10.1109/ITCS.2010.111","DOIUrl":"https://doi.org/10.1109/ITCS.2010.111","url":null,"abstract":"Wireless Sensor Networks(WSNs) have been widely discussed in many applications. But a key design challenge is to solve power consumption, the reliability of radio communication and self-organizing of network. This paper proposes a design scheme of wireless sensor networks node architecture, builds a computer monitoring platform for experimenting with several of these nodes and designs a flexible PC-monitoring program. The design of a wireless sensor node adopts low power sensors, microcontroller and a Zigbee-based wireless transceiver, the server is based on .Net Framework architecture with database supported. The platform realizes such functions as network monitoring, collection and storage of required data, and so on. The prototyping results verify that our ideas are practical and feasible.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124215918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud computing is a rapid developing technology which spreads the computer power in to different computers locates different physical position. This outcome can lead to the enormous performance of dealing with large computing requirements, includes nuclear simulation, image processing or data analyzing. But, since cloud computing largely depend on the network performance, it is possible to consider the security issues in several areas. This paper addresses the potential threats and provides the areas which need to be carefully audited.
{"title":"Understanding the Approach for Auditing of Cloud Computing System","authors":"Jian Chen, Wenrong Jiang, Jihong Yan","doi":"10.1109/ITCS.2010.149","DOIUrl":"https://doi.org/10.1109/ITCS.2010.149","url":null,"abstract":"Cloud computing is a rapid developing technology which spreads the computer power in to different computers locates different physical position. This outcome can lead to the enormous performance of dealing with large computing requirements, includes nuclear simulation, image processing or data analyzing. But, since cloud computing largely depend on the network performance, it is possible to consider the security issues in several areas. This paper addresses the potential threats and provides the areas which need to be carefully audited.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133824235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The current examination arrangement algorithm takes little attention to the examination arrangement for invigilator, the paper proposes a improved algorithm to achieve automatic examination arrangement for invigilator based on greedy method, the algorithm can support the priorities better, set maximum frequency of invigilating and satisfy other personalization examination arrangement requirements, and also it can configure resources reasonable and solve various software and hardware condition restrict to get the satisfactory solution. The practical application shows that the algorithm is highly efficient, low-cost, and can be widely used in various colleges and universities.
{"title":"Research on Automatic Examination Arrangement Algorithms for Invigilator","authors":"Y. Ouyang, Hong Li","doi":"10.1109/ITCS.2010.134","DOIUrl":"https://doi.org/10.1109/ITCS.2010.134","url":null,"abstract":"The current examination arrangement algorithm takes little attention to the examination arrangement for invigilator, the paper proposes a improved algorithm to achieve automatic examination arrangement for invigilator based on greedy method, the algorithm can support the priorities better, set maximum frequency of invigilating and satisfy other personalization examination arrangement requirements, and also it can configure resources reasonable and solve various software and hardware condition restrict to get the satisfactory solution. The practical application shows that the algorithm is highly efficient, low-cost, and can be widely used in various colleges and universities.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132565209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}