Pub Date : 2010-10-25DOI: 10.1109/ICEIT.2010.5608354
Xingbing Cao, Lili Liu
Long Term Evolution system represents the latest developments in the direction of UMTS standard. Radio Resource Control layer protocol is an important component of LTE, and its IDLE state plays an important role in the LTE. This paper is established in a study of cell selection and reselection of RRC IDLE and state transitions. Mainly focuses on the design of MSC of cell selection and reselection process.
{"title":"Research of the RRC layer IDLE State in TD-LTE","authors":"Xingbing Cao, Lili Liu","doi":"10.1109/ICEIT.2010.5608354","DOIUrl":"https://doi.org/10.1109/ICEIT.2010.5608354","url":null,"abstract":"Long Term Evolution system represents the latest developments in the direction of UMTS standard. Radio Resource Control layer protocol is an important component of LTE, and its IDLE state plays an important role in the LTE. This paper is established in a study of cell selection and reselection of RRC IDLE and state transitions. Mainly focuses on the design of MSC of cell selection and reselection process.","PeriodicalId":346498,"journal":{"name":"2010 International Conference on Educational and Information Technology","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132776718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-10-25DOI: 10.1109/ICEIT.2010.5608452
Xianmin Wei
This paper introduces the relationship between various encoding methods and JAVA, For various reasons such as the garbled from file and stream, from the Web application and from database application, the garbled reasons are dissected from the analysis, their own solutions are put forward.
{"title":"Chinese problems analysis in JAVA language","authors":"Xianmin Wei","doi":"10.1109/ICEIT.2010.5608452","DOIUrl":"https://doi.org/10.1109/ICEIT.2010.5608452","url":null,"abstract":"This paper introduces the relationship between various encoding methods and JAVA, For various reasons such as the garbled from file and stream, from the Web application and from database application, the garbled reasons are dissected from the analysis, their own solutions are put forward.","PeriodicalId":346498,"journal":{"name":"2010 International Conference on Educational and Information Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133128176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper aims to improve the core ability of the computer science and technology majors in local university. It does some researches on three aspects: the training system of the core abilities of the students of the computer science and technology major in local university; the teaching reform of the computer science and technology major, and the courses construction of the computer science and technology major. For this purpose the research is very instructive for students in local university.
{"title":"Research on teaching reform of the computer science and technology major in local university","authors":"Zeng-gang Xiong, Xue-wen Xia, Xue-min Zhang, Jianxin Chen","doi":"10.1109/ICEIT.2010.5608373","DOIUrl":"https://doi.org/10.1109/ICEIT.2010.5608373","url":null,"abstract":"This paper aims to improve the core ability of the computer science and technology majors in local university. It does some researches on three aspects: the training system of the core abilities of the students of the computer science and technology major in local university; the teaching reform of the computer science and technology major, and the courses construction of the computer science and technology major. For this purpose the research is very instructive for students in local university.","PeriodicalId":346498,"journal":{"name":"2010 International Conference on Educational and Information Technology","volume":"398 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133235699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-10-25DOI: 10.1109/ICEIT.2010.5607768
Z. Falahiazar, M. Rohani
With the ever increasing development and expansion of database use, protection of database against hazards, which threaten the integrity, availability and confidentiality of database, is inevitable. However, traditional mechanisms of database security is concentrated on protection or prevention. The main objective of an intrusion tolerant database system is such that even if a number of attacks penetrated inside information system, specified levels of availability, integrity and confidentiality are yet guaranteed. A key part of intrusion tolerant database system is intrusion detection which informs system about attacks. However, detection latency will result in damage spreading. Two novel techniques are used for containment of damage in intrusion tolerant database system: Attack isolation and multiphase damage Confinement. These techniques have been posed as general solutions and in real applications, they may cause outbreak of problems in integrity and availability. In this paper, we present a practical architecture for an intrusion tolerant database system with the aim of safeguarding integrity and availability in the presence of successful attacks through taking advantages of these two techniques.
{"title":"The architecture of an intrusion tolerant database system","authors":"Z. Falahiazar, M. Rohani","doi":"10.1109/ICEIT.2010.5607768","DOIUrl":"https://doi.org/10.1109/ICEIT.2010.5607768","url":null,"abstract":"With the ever increasing development and expansion of database use, protection of database against hazards, which threaten the integrity, availability and confidentiality of database, is inevitable. However, traditional mechanisms of database security is concentrated on protection or prevention. The main objective of an intrusion tolerant database system is such that even if a number of attacks penetrated inside information system, specified levels of availability, integrity and confidentiality are yet guaranteed. A key part of intrusion tolerant database system is intrusion detection which informs system about attacks. However, detection latency will result in damage spreading. Two novel techniques are used for containment of damage in intrusion tolerant database system: Attack isolation and multiphase damage Confinement. These techniques have been posed as general solutions and in real applications, they may cause outbreak of problems in integrity and availability. In this paper, we present a practical architecture for an intrusion tolerant database system with the aim of safeguarding integrity and availability in the presence of successful attacks through taking advantages of these two techniques.","PeriodicalId":346498,"journal":{"name":"2010 International Conference on Educational and Information Technology","volume":"256 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131861193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-10-25DOI: 10.1109/ICEIT.2010.5607665
Mingchao Sun, Bao Zhang, Jinghong Liu, Yongyang Wang, Quan Yang
In order to solve the registration problem of different source image existed on aerial image fusion, algorithms based on Particle Swarm Optimization (PSO) are applied as search strategy in this paper, and Alignment Metric (AM) is used as judgment. This study has realized the different source image registration of infrared and visible light with high speed, high accuracy and high reliability. Basically, with little restriction of gray level properties, a new alignment measure is applied, which can efficiently measure the image registration extent and tolerate noise well. Even more, the intelligent optimization algorithm - Particle Swarm Optimization (PSO) is combined to improve the registration precision and rate of infrared and visible light. Experimental results indicate that, the study attains the registration accuracy of pixel level, and every registration time is cut down over 40 percent compared to traditional method. The match algorithm based on AM, solves the registration problem that greater differences between different source images are existed on gray and characteristic. At the same time, the adoption of combining the intelligent optimization algorithms significantly improves the searching efficiency and convergence speed of the algorithms, and the registration result has higher accuracy and stability, which builds up solid foundation for different source image fusion. The method in this paper has a magnificent effect, and is easy for application and very suitable for engineering use.
{"title":"The registration of aerial infrared and visible images","authors":"Mingchao Sun, Bao Zhang, Jinghong Liu, Yongyang Wang, Quan Yang","doi":"10.1109/ICEIT.2010.5607665","DOIUrl":"https://doi.org/10.1109/ICEIT.2010.5607665","url":null,"abstract":"In order to solve the registration problem of different source image existed on aerial image fusion, algorithms based on Particle Swarm Optimization (PSO) are applied as search strategy in this paper, and Alignment Metric (AM) is used as judgment. This study has realized the different source image registration of infrared and visible light with high speed, high accuracy and high reliability. Basically, with little restriction of gray level properties, a new alignment measure is applied, which can efficiently measure the image registration extent and tolerate noise well. Even more, the intelligent optimization algorithm - Particle Swarm Optimization (PSO) is combined to improve the registration precision and rate of infrared and visible light. Experimental results indicate that, the study attains the registration accuracy of pixel level, and every registration time is cut down over 40 percent compared to traditional method. The match algorithm based on AM, solves the registration problem that greater differences between different source images are existed on gray and characteristic. At the same time, the adoption of combining the intelligent optimization algorithms significantly improves the searching efficiency and convergence speed of the algorithms, and the registration result has higher accuracy and stability, which builds up solid foundation for different source image fusion. The method in this paper has a magnificent effect, and is easy for application and very suitable for engineering use.","PeriodicalId":346498,"journal":{"name":"2010 International Conference on Educational and Information Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115379221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-10-25DOI: 10.1109/ICEIT.2010.5607799
R. Davidrajuh, R. Davidrajuh
This paper proposes a simple yet robust approach for enterprise architecture development. The approach centers on the three most important phases of the enterprise architecture namely modeling, evaluation, and extension. This paper also identifies a set of resources (tools and frameworks) for this approach.
{"title":"Developing enterprise archiecture with “model-evaluate-extend” approach","authors":"R. Davidrajuh, R. Davidrajuh","doi":"10.1109/ICEIT.2010.5607799","DOIUrl":"https://doi.org/10.1109/ICEIT.2010.5607799","url":null,"abstract":"This paper proposes a simple yet robust approach for enterprise architecture development. The approach centers on the three most important phases of the enterprise architecture namely modeling, evaluation, and extension. This paper also identifies a set of resources (tools and frameworks) for this approach.","PeriodicalId":346498,"journal":{"name":"2010 International Conference on Educational and Information Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124285163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-10-25DOI: 10.1109/ICEIT.2010.5607766
Claus A. Usener, S. Gruttmann, Tim A. Majchrzak, H. Kuchen
Most conventional e-assessment systems are not suited for examining analytic, creative and constructive skills and the few existing ones have too limited functionality to appropriately support Computer Science assessments. On this account the e-assessment system EASy has been developed which e.g. provides relevant exercise modules for Computer Science tasks. Recently the system has been extended by a module for the computer-supported examination of software verification proofs based on the Hoare Logic. In this work we discuss this module and evaluate its applicability, usability and acceptance in terms of a lecture on Formal Specification.
{"title":"Computer-Supported Assessment of Software Verification Proofs","authors":"Claus A. Usener, S. Gruttmann, Tim A. Majchrzak, H. Kuchen","doi":"10.1109/ICEIT.2010.5607766","DOIUrl":"https://doi.org/10.1109/ICEIT.2010.5607766","url":null,"abstract":"Most conventional e-assessment systems are not suited for examining analytic, creative and constructive skills and the few existing ones have too limited functionality to appropriately support Computer Science assessments. On this account the e-assessment system EASy has been developed which e.g. provides relevant exercise modules for Computer Science tasks. Recently the system has been extended by a module for the computer-supported examination of software verification proofs based on the Hoare Logic. In this work we discuss this module and evaluate its applicability, usability and acceptance in terms of a lecture on Formal Specification.","PeriodicalId":346498,"journal":{"name":"2010 International Conference on Educational and Information Technology","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116366679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-10-25DOI: 10.1109/ICEIT.2010.5608352
W. Liang, Zhifang Liu
Region-based image fusion schemes have been studied a lot, but they are all based on some common decomposition, such as pyramid, wavelet and contourlet transform. In this paper, we present a novel region-based image fusion scheme using BEMD (Bidimensional Empirical Mode Decomposition) for infrared and visible images. BEMD is a new 2D signal analysis method extended from EMD and it decomposes the signal into a series of IMFs (Intrinsic Mode Functions) from finest to coarsest. Region segmentation is of vital importance in the fusion process. Real images are always intensity inhomogeneous, e.g. infrared and visible images, so we use an LBF (Local Binary Fitting) model which aims at segmenting intensity inhomogeneous images to extract our regions. Experiments show that the proposed fusion scheme works effectively compared with traditional fusion schemes.
{"title":"Region-based fusion of infrared and visible images using Bidimensional Empirical Mode Decomposition","authors":"W. Liang, Zhifang Liu","doi":"10.1109/ICEIT.2010.5608352","DOIUrl":"https://doi.org/10.1109/ICEIT.2010.5608352","url":null,"abstract":"Region-based image fusion schemes have been studied a lot, but they are all based on some common decomposition, such as pyramid, wavelet and contourlet transform. In this paper, we present a novel region-based image fusion scheme using BEMD (Bidimensional Empirical Mode Decomposition) for infrared and visible images. BEMD is a new 2D signal analysis method extended from EMD and it decomposes the signal into a series of IMFs (Intrinsic Mode Functions) from finest to coarsest. Region segmentation is of vital importance in the fusion process. Real images are always intensity inhomogeneous, e.g. infrared and visible images, so we use an LBF (Local Binary Fitting) model which aims at segmenting intensity inhomogeneous images to extract our regions. Experiments show that the proposed fusion scheme works effectively compared with traditional fusion schemes.","PeriodicalId":346498,"journal":{"name":"2010 International Conference on Educational and Information Technology","volume":"626 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116467815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-10-25DOI: 10.1109/ICEIT.2010.5608400
J. Duan, Jian Jiao, Chunhe Xia, Shan Yao, Xiaojian Li
Peer-to-peer (P2P) Botnets, which are more resilient and robust than centralized botnets, have emerged as the peer-to-peer technology evolves. Better understanding of this new phenomenon will help researchers develop detection and mitigation methods. Most of existing work is case study of typical P2P botnets. In this paper, we focus on systematically analyzing structures of P2P botnets. We propose a descriptive model of P2P botnet structures, which consists of features of P2P bot, definitions of structures, and structural properties. Firstly, we detail two key functionalities of P2P bot, command-and-control (C&C) functionality and peer-to-peer (P2P) functionality, and give several features of P2P bot. And then, we define two structures of P2P botnets: C&C structure and P2P structure. To characterize these structures, we propose several properties and corresponding quantitative methods. Finally, we conduct experiments to verify our results.
{"title":"Descriptive model of peer-to-peer Botnet structures","authors":"J. Duan, Jian Jiao, Chunhe Xia, Shan Yao, Xiaojian Li","doi":"10.1109/ICEIT.2010.5608400","DOIUrl":"https://doi.org/10.1109/ICEIT.2010.5608400","url":null,"abstract":"Peer-to-peer (P2P) Botnets, which are more resilient and robust than centralized botnets, have emerged as the peer-to-peer technology evolves. Better understanding of this new phenomenon will help researchers develop detection and mitigation methods. Most of existing work is case study of typical P2P botnets. In this paper, we focus on systematically analyzing structures of P2P botnets. We propose a descriptive model of P2P botnet structures, which consists of features of P2P bot, definitions of structures, and structural properties. Firstly, we detail two key functionalities of P2P bot, command-and-control (C&C) functionality and peer-to-peer (P2P) functionality, and give several features of P2P bot. And then, we define two structures of P2P botnets: C&C structure and P2P structure. To characterize these structures, we propose several properties and corresponding quantitative methods. Finally, we conduct experiments to verify our results.","PeriodicalId":346498,"journal":{"name":"2010 International Conference on Educational and Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117192570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-10-25DOI: 10.1109/ICEIT.2010.5607510
Xihong Su, Hongwei Liu, Zhibo Wu, Decheng Zuo, Xiaozong Yang
Software architecture (SA) has been widely advocated as an effective abstraction for modeling, implementing, and evolving complex software systems such as those in distributed, decentralized, heterogeneous, mobile, and pervasive environments. We intend to investigate two problems related to the domain of those environments: software deployment and reliability. Software deployment is a post-production activity that is performed for or by the customer of a piece of software. Though many approaches for Architecture-based reliability research, little work has been done in incorporating software deployment into architecture-based reliability estimation. Thus, this paper describes which information constitute SA based software deployment reliability model and how to obtain available information for the model. The system reliability estimation at an architectural level includes software deployment, architectural style and component replica.
{"title":"SA based software deployment reliability estimation: Problem space, challenges and strategies","authors":"Xihong Su, Hongwei Liu, Zhibo Wu, Decheng Zuo, Xiaozong Yang","doi":"10.1109/ICEIT.2010.5607510","DOIUrl":"https://doi.org/10.1109/ICEIT.2010.5607510","url":null,"abstract":"Software architecture (SA) has been widely advocated as an effective abstraction for modeling, implementing, and evolving complex software systems such as those in distributed, decentralized, heterogeneous, mobile, and pervasive environments. We intend to investigate two problems related to the domain of those environments: software deployment and reliability. Software deployment is a post-production activity that is performed for or by the customer of a piece of software. Though many approaches for Architecture-based reliability research, little work has been done in incorporating software deployment into architecture-based reliability estimation. Thus, this paper describes which information constitute SA based software deployment reliability model and how to obtain available information for the model. The system reliability estimation at an architectural level includes software deployment, architectural style and component replica.","PeriodicalId":346498,"journal":{"name":"2010 International Conference on Educational and Information Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124485020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}