Besides traditional verification of system functions, performance evaluation in modern hardware and software systems has received extensive attention. Performance evaluation aims at obtaining quantitative measures of the system to test whether reliability-related properties are warranted. In this paper, model of the system is expressed in the form of IMC, a mixed model for describing both action-based and state-based systems. And by converting performance properties of the system into aCSL formulae, we can formally verify them by model checking. To accelerate the process of IMC performance evaluation, a modified version of ant colony algorithm is proposed in the paper. Compared with other numerical methods, the ant colony algorithm reduces unnecessary model elements and the execution efficiency is largely improved to tackle more complex system performance evaluation problems.
{"title":"Performance Evaluation by Ant Colony Algorithm","authors":"Jianfeng Chen, Jinzhao Wu","doi":"10.1109/ITCS.2010.40","DOIUrl":"https://doi.org/10.1109/ITCS.2010.40","url":null,"abstract":"Besides traditional verification of system functions, performance evaluation in modern hardware and software systems has received extensive attention. Performance evaluation aims at obtaining quantitative measures of the system to test whether reliability-related properties are warranted. In this paper, model of the system is expressed in the form of IMC, a mixed model for describing both action-based and state-based systems. And by converting performance properties of the system into aCSL formulae, we can formally verify them by model checking. To accelerate the process of IMC performance evaluation, a modified version of ant colony algorithm is proposed in the paper. Compared with other numerical methods, the ant colony algorithm reduces unnecessary model elements and the execution efficiency is largely improved to tackle more complex system performance evaluation problems.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125549780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Through literature consulting and correlation analysis, this paper selects seven important indicators which have close relation with CPI. Then on the basis of neural network theory and MATLAB neural network toolbox, this paper constructs a CPI prediction model. Finally, by using test samples to make a emulate experiment, the simulation result indicates that the model is feasible and effectual.
{"title":"Study on the Model of CPI Prediction Based on BP Neural Network","authors":"Hu Wang, Gengyao Fan","doi":"10.1109/ITCS.2010.147","DOIUrl":"https://doi.org/10.1109/ITCS.2010.147","url":null,"abstract":"Through literature consulting and correlation analysis, this paper selects seven important indicators which have close relation with CPI. Then on the basis of neural network theory and MATLAB neural network toolbox, this paper constructs a CPI prediction model. Finally, by using test samples to make a emulate experiment, the simulation result indicates that the model is feasible and effectual.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126637969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Interlocking system is the key equipment of railway signaling. New-type all-electronic execution unit (AEEU) for computer interlocking system is introduced. As an example of AEEU, characters and fail-safety of DC switches execution module is discussed in detail. Then some advantages of AEEU are emphasized such as reliable, a little space equipment, powerful function, building a network conveniently, easy to maintain, automatic protection while short circuit happened and so on. At the end part of paper, application on AEEU is introduced briefly.
{"title":"Application on the All-electronic Execution Unit for Railway Signaling","authors":"T. He","doi":"10.1109/ITCS.2010.144","DOIUrl":"https://doi.org/10.1109/ITCS.2010.144","url":null,"abstract":"Interlocking system is the key equipment of railway signaling. New-type all-electronic execution unit (AEEU) for computer interlocking system is introduced. As an example of AEEU, characters and fail-safety of DC switches execution module is discussed in detail. Then some advantages of AEEU are emphasized such as reliable, a little space equipment, powerful function, building a network conveniently, easy to maintain, automatic protection while short circuit happened and so on. At the end part of paper, application on AEEU is introduced briefly.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121400533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Because of nodes in P2P networks are self-organization, part of nodes in P2P networks appear selfish and P2P sharing of network resources do not achieve the desired efficiency. This paper presents an incentive mechanism based on game theory integrate with Mixed Strategy Nash Equilibrium, it is used to detect selfish nodes in P2P networks and urge them to join the network nodes consciously. Finally, this incentive mechanism is verified to be availability with simulation tools named Gambit.
{"title":"Incentive Mechanism Based on Game Theory in P2P Networks","authors":"Chunzhi Wang, Li Chen, Hongwe Chen, Ke Zhou","doi":"10.1109/ITCS.2010.53","DOIUrl":"https://doi.org/10.1109/ITCS.2010.53","url":null,"abstract":"Because of nodes in P2P networks are self-organization, part of nodes in P2P networks appear selfish and P2P sharing of network resources do not achieve the desired efficiency. This paper presents an incentive mechanism based on game theory integrate with Mixed Strategy Nash Equilibrium, it is used to detect selfish nodes in P2P networks and urge them to join the network nodes consciously. Finally, this incentive mechanism is verified to be availability with simulation tools named Gambit.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122465752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The fashion enterprise has faced more and faster changes in recent years due to the different requirements of customers and the variations of global economic environments. For leaders of these enterprises, they must make decision on correct strategies to keep competitiveness in such complex networked environment. E-HRM is the application of information technology for both networking and supporting at least two individual or collective actors in their shared performing of HR activities. Fashion enterprise could make better use of their human capital through E-HRM information system. The development of strategic E-HRM information systems in fashion enterprise is studied in this paper and the architecture is also discussed here.
{"title":"A Framework of E-HRM Information Systems in Fashion Enterprise","authors":"Xin-long Ma","doi":"10.1109/ITCS.2010.81","DOIUrl":"https://doi.org/10.1109/ITCS.2010.81","url":null,"abstract":"The fashion enterprise has faced more and faster changes in recent years due to the different requirements of customers and the variations of global economic environments. For leaders of these enterprises, they must make decision on correct strategies to keep competitiveness in such complex networked environment. E-HRM is the application of information technology for both networking and supporting at least two individual or collective actors in their shared performing of HR activities. Fashion enterprise could make better use of their human capital through E-HRM information system. The development of strategic E-HRM information systems in fashion enterprise is studied in this paper and the architecture is also discussed here.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132944039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
When designing the water level measuring instrument, incremental optical grating scale is used as position sensor. Since the water level must be measured repeatedly and continuously, cumulative error of measuring is the critical issue. Using asynchronous sequential logic circuit-level design approach, abstracting signal timing diagram from various moments of changing direction, designing of incentive state and output function expression and writing the expression to a programmable device, a grating scale processing circuit can be constructed. The water level measuring instrument based on this circuit is running perfectly on the model of Yangtze River flood proofing, indicating no cumulative errors are produced. The device can also be used for optical encoder position measurement and other measurements.
{"title":"Processing Method of Optical Grating Scale Output Signal","authors":"Xiwei Yang, Tianxiao Yang, Huazhong Jin, Z. Ye","doi":"10.1109/ITCS.2010.102","DOIUrl":"https://doi.org/10.1109/ITCS.2010.102","url":null,"abstract":"When designing the water level measuring instrument, incremental optical grating scale is used as position sensor. Since the water level must be measured repeatedly and continuously, cumulative error of measuring is the critical issue. Using asynchronous sequential logic circuit-level design approach, abstracting signal timing diagram from various moments of changing direction, designing of incentive state and output function expression and writing the expression to a programmable device, a grating scale processing circuit can be constructed. The water level measuring instrument based on this circuit is running perfectly on the model of Yangtze River flood proofing, indicating no cumulative errors are produced. The device can also be used for optical encoder position measurement and other measurements.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134228380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The rapid development of information technology and E-commerce proposes new requirements for enterprise’s information construction and the suitable evaluation of existing information system (IS) is the important step for that process. In this paper, treating the E-commerce application requirements as the starting points, the author extracts the main factors affecting the IS evaluation from the dimensions of reliability, coordination and integration. Then a multidimensional evaluation model is established using entropy weight method and ideal point method. Finally, the application of the model is discussed.
{"title":"A Multidimensional Evaluation Model Study on Information System from E-commerce Perspective","authors":"Song Wang, Xinmin Liu, Fang Li","doi":"10.1109/ITCS.2010.113","DOIUrl":"https://doi.org/10.1109/ITCS.2010.113","url":null,"abstract":"The rapid development of information technology and E-commerce proposes new requirements for enterprise’s information construction and the suitable evaluation of existing information system (IS) is the important step for that process. In this paper, treating the E-commerce application requirements as the starting points, the author extracts the main factors affecting the IS evaluation from the dimensions of reliability, coordination and integration. Then a multidimensional evaluation model is established using entropy weight method and ideal point method. Finally, the application of the model is discussed.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130374377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
File carving is a digital forensic technique. It aims to reconstitute a file from unstructured data sources with no knowledge of the file system. This paper presents an automatically carving method for RAR files. Since RAR is one of the most popular archive formats,and it is widely used on the digital devices to package data for transport or storage. It is important for forensic investigation to obtain the information of RAR files. We apply mapping function to locate the header and footer of an archived file, utilize the distance between the header and footer of an archived file to determine whether the archived file is fragmented, and apply enumeration to reassemble bi-fragmentation of an archived file. Finally we validate the integrity of archived file and RAR file, repairing RAR files which miss header or footer. Based on artificial data and real world data, experiments show our method can automatically carve continuous and fragmented RAR files. Moreover, the comparative experiments demonstrate that this method is better than other’s in accurateness and effectiveness.
{"title":"An Automatic Carving Method for RAR File Based on Content and Structure","authors":"Yingjie Wei, Ning Zheng, Ming Xu","doi":"10.1109/ITCS.2010.23","DOIUrl":"https://doi.org/10.1109/ITCS.2010.23","url":null,"abstract":"File carving is a digital forensic technique. It aims to reconstitute a file from unstructured data sources with no knowledge of the file system. This paper presents an automatically carving method for RAR files. Since RAR is one of the most popular archive formats,and it is widely used on the digital devices to package data for transport or storage. It is important for forensic investigation to obtain the information of RAR files. We apply mapping function to locate the header and footer of an archived file, utilize the distance between the header and footer of an archived file to determine whether the archived file is fragmented, and apply enumeration to reassemble bi-fragmentation of an archived file. Finally we validate the integrity of archived file and RAR file, repairing RAR files which miss header or footer. Based on artificial data and real world data, experiments show our method can automatically carve continuous and fragmented RAR files. Moreover, the comparative experiments demonstrate that this method is better than other’s in accurateness and effectiveness.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114468279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wireless Sensor Networks(WSNs) have been widely discussed in many applications. But a key design challenge is to solve power consumption, the reliability of radio communication and self-organizing of network. This paper proposes a design scheme of wireless sensor networks node architecture, builds a computer monitoring platform for experimenting with several of these nodes and designs a flexible PC-monitoring program. The design of a wireless sensor node adopts low power sensors, microcontroller and a Zigbee-based wireless transceiver, the server is based on .Net Framework architecture with database supported. The platform realizes such functions as network monitoring, collection and storage of required data, and so on. The prototyping results verify that our ideas are practical and feasible.
{"title":"A WSN-Based Experiment Platform for Monitoring","authors":"Deng Chen, Chen Yiping, Song Wanqing","doi":"10.1109/ITCS.2010.111","DOIUrl":"https://doi.org/10.1109/ITCS.2010.111","url":null,"abstract":"Wireless Sensor Networks(WSNs) have been widely discussed in many applications. But a key design challenge is to solve power consumption, the reliability of radio communication and self-organizing of network. This paper proposes a design scheme of wireless sensor networks node architecture, builds a computer monitoring platform for experimenting with several of these nodes and designs a flexible PC-monitoring program. The design of a wireless sensor node adopts low power sensors, microcontroller and a Zigbee-based wireless transceiver, the server is based on .Net Framework architecture with database supported. The platform realizes such functions as network monitoring, collection and storage of required data, and so on. The prototyping results verify that our ideas are practical and feasible.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124215918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. A. Hosseini, M. Khalilzadeh, M. Naghibi-Sistani, V. Niazmand
This paper proposes an emotional stress recognition system with EEG signals using higher order spectra (HOS). A visual induction based acquisition protocol is designed for recording the EEG signals in five channels (FP1, FP2, T3, T4 and Pz) under two emotional stress states of participants, Calm neutral and Negatively exited. After pre-processing the signals, higher order spectra are employed to extract the features for classifying human emotions. We used Genetic Algorithm for optimum features selection for the classifier. Using the SVM classifier, our study achieved an average accuracy of 82% for the two-abovementioned emotional stress states. We concluded that HOS analysis could be an accurate tool in the assessment of human emotional stress states. We achieved to same results compared to our previous studies.
{"title":"Higher Order Spectra Analysis of EEG Signals in Emotional Stress States","authors":"S. A. Hosseini, M. Khalilzadeh, M. Naghibi-Sistani, V. Niazmand","doi":"10.1109/ITCS.2010.21","DOIUrl":"https://doi.org/10.1109/ITCS.2010.21","url":null,"abstract":"This paper proposes an emotional stress recognition system with EEG signals using higher order spectra (HOS). A visual induction based acquisition protocol is designed for recording the EEG signals in five channels (FP1, FP2, T3, T4 and Pz) under two emotional stress states of participants, Calm neutral and Negatively exited. After pre-processing the signals, higher order spectra are employed to extract the features for classifying human emotions. We used Genetic Algorithm for optimum features selection for the classifier. Using the SVM classifier, our study achieved an average accuracy of 82% for the two-abovementioned emotional stress states. We concluded that HOS analysis could be an accurate tool in the assessment of human emotional stress states. We achieved to same results compared to our previous studies.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125880674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}