This paper designs and implements a C-like language interpreter using C++ based on the idea of modularity. The whole system can be divided into three modules, namely, lexical analyzer, syntactic analyzer and evaluation of expression. During the design, token is being used. The design puts great emphasis towards code reusability and extensibility, which makes it easy to embed the code into other C++ programs. The final testing result shows that the implemented interpreter realizes almost all the interpretation functions of C-like language, including the interpretation of interface function call. It can also be used as script engine of games to control game logic through text, and games can be modified during running without recompiling the source code. Moreover, it has good portability. It can successfully run on different operating systems like Windows XP, MAC OS X 10.6.1, and iPhone OS 3.0.
本文基于模块化思想,用c++语言设计并实现了一个类C语言解释器。整个系统可分为三个模块,即词法分析器、句法分析器和表达式求值。在设计期间,使用令牌。该设计非常强调代码的可重用性和可扩展性,这使得将代码嵌入到其他c++程序中变得很容易。最终的测试结果表明,所实现的解释器几乎实现了类c语言的所有解释功能,包括接口函数调用的解释。它也可以作为游戏的脚本引擎,通过文本来控制游戏逻辑,并且可以在运行过程中修改游戏,而无需重新编译源代码。此外,它具有良好的可移植性。它可以在Windows XP、MAC OS X 10.6.1和iPhone OS 3.0等不同的操作系统上成功运行。
{"title":"The Design and Implementation of C-like Language Interpreter","authors":"Xiaohong Xiao, You Xu","doi":"10.1109/IPTC.2011.33","DOIUrl":"https://doi.org/10.1109/IPTC.2011.33","url":null,"abstract":"This paper designs and implements a C-like language interpreter using C++ based on the idea of modularity. The whole system can be divided into three modules, namely, lexical analyzer, syntactic analyzer and evaluation of expression. During the design, token is being used. The design puts great emphasis towards code reusability and extensibility, which makes it easy to embed the code into other C++ programs. The final testing result shows that the implemented interpreter realizes almost all the interpretation functions of C-like language, including the interpretation of interface function call. It can also be used as script engine of games to control game logic through text, and games can be modified during running without recompiling the source code. Moreover, it has good portability. It can successfully run on different operating systems like Windows XP, MAC OS X 10.6.1, and iPhone OS 3.0.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134314526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To solve the subjective and uncertainly about trust in e-commerce system, a new trust model based on multidimensional trust cloud is proposed, which is on the basis of the past research on cloud model. History evaluation data is regard as the quantitative universe of discourse, trust cloud of entities' property is based on the weighted backward generation cloud algorithm, so the history behavior of an entity can be reflected very well through three numerical characteristics of cloud model. The results of experiments show that the model proposed in the paper can reflect a seller's property more accurately and can provide a favorable reference for a buyer entity in e-commerce.
{"title":"A New Trust Evaluation Model Based on Cloud Theory in E-Commerce Environment","authors":"Hongyun Cai, Z. Li, Junfeng Tian","doi":"10.1109/IPTC.2011.42","DOIUrl":"https://doi.org/10.1109/IPTC.2011.42","url":null,"abstract":"To solve the subjective and uncertainly about trust in e-commerce system, a new trust model based on multidimensional trust cloud is proposed, which is on the basis of the past research on cloud model. History evaluation data is regard as the quantitative universe of discourse, trust cloud of entities' property is based on the weighted backward generation cloud algorithm, so the history behavior of an entity can be reflected very well through three numerical characteristics of cloud model. The results of experiments show that the model proposed in the paper can reflect a seller's property more accurately and can provide a favorable reference for a buyer entity in e-commerce.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133550929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hilbert Huang Transform (HHT), which is based on EMD (Empirical Mode Decomposition) and Hilbert transform method, is a new signal analysis method. It suits for analyzing the non-linear and non-stationary signals, such as EEG signal particularly. The traditional EMD method has the Mode Mixing problem. Therefore a new method basing on Ensemble Empirical Mode Decomposition (EEMD) for processing the signal has been approached in this paper. This method can effectively ensure the integrity of signal's mapping in the different regions through adding random white noise component into the original data, and overcome the mode mixing problem of traditional EMD decomposition.
{"title":"The EEG Signal Process Based on EEMD","authors":"Xiao-jun Zhu, Shi-qin Lv, L. Fan, Xue-li Yu","doi":"10.1109/IPTC.2011.67","DOIUrl":"https://doi.org/10.1109/IPTC.2011.67","url":null,"abstract":"Hilbert Huang Transform (HHT), which is based on EMD (Empirical Mode Decomposition) and Hilbert transform method, is a new signal analysis method. It suits for analyzing the non-linear and non-stationary signals, such as EEG signal particularly. The traditional EMD method has the Mode Mixing problem. Therefore a new method basing on Ensemble Empirical Mode Decomposition (EEMD) for processing the signal has been approached in this paper. This method can effectively ensure the integrity of signal's mapping in the different regions through adding random white noise component into the original data, and overcome the mode mixing problem of traditional EMD decomposition.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130524334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer notary system is an arbitrator or a notary public in the digital signature system, the process of arbitration, whether the signature is A communication sent to U, or U data are issued to B, after two and a signature encrypted password handling, you can ensure the security of communications. However, there is a signature of the arbitration serious problem: an intermediary can be replaced counterfeit information, and the agreement can not resist the replay attack. Article in the back of improved vulnerability of the agreement, and analyzes a new protocol security.
{"title":"An Improved Computer Notary System Protocols","authors":"Zhang Chao-yang","doi":"10.1109/IPTC.2011.71","DOIUrl":"https://doi.org/10.1109/IPTC.2011.71","url":null,"abstract":"Computer notary system is an arbitrator or a notary public in the digital signature system, the process of arbitration, whether the signature is A communication sent to U, or U data are issued to B, after two and a signature encrypted password handling, you can ensure the security of communications. However, there is a signature of the arbitration serious problem: an intermediary can be replaced counterfeit information, and the agreement can not resist the replay attack. Article in the back of improved vulnerability of the agreement, and analyzes a new protocol security.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124491163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hadoop provides a sophisticated framework for cloud platform programmers, which, MapReduce is a programming model for large-scale data sets of parallel computing. By MapReduce distributed processing framework, we are not only capable of handling large-scale data, and can hide a lot of tedious details, scalability is also wonderful. This paper analyzes the Hadoop architecture and MapReduce Working principle, described how to perform a MapReduce job in the cloud platform, how to write Mapper and Reducer classes, and how to use the object, proposed a program based on the MapReduce framework that enables distributed programming, Comparison results show that use of MapReduce architecture simplifies distributed programming.
{"title":"The Application of MapReduce in the Cloud Computing","authors":"Gaizhen Yang","doi":"10.1109/IPTC.2011.46","DOIUrl":"https://doi.org/10.1109/IPTC.2011.46","url":null,"abstract":"Hadoop provides a sophisticated framework for cloud platform programmers, which, MapReduce is a programming model for large-scale data sets of parallel computing. By MapReduce distributed processing framework, we are not only capable of handling large-scale data, and can hide a lot of tedious details, scalability is also wonderful. This paper analyzes the Hadoop architecture and MapReduce Working principle, described how to perform a MapReduce job in the cloud platform, how to write Mapper and Reducer classes, and how to use the object, proposed a program based on the MapReduce framework that enables distributed programming, Comparison results show that use of MapReduce architecture simplifies distributed programming.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114660288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mobile ad hoc network especially follows multihopping mechanism for routing to make a path from source to destination. If we have a sound and solid routing path that would be efficient, reliable and adaptable to the different scenarios of network too by following the next hop mechanism and also should be the farthest node with in the cluster then we could achieve better performance by the network. This paper gives more emphasis on the same phenomenon by simulating the protocol EPSAR over ADOV (reactive) and DSDV (proactive) existing protocol and also elaborates the mobility issue. This paper also presents the couple of simulations of EPSAR over multiple network (i.e. grows in terms of number of node) and also examines the performance and the feasibility of EPSAR by considering the different network parameters i.e. Data Packet sent, Delivery Ratio and End-to-End Delay.
{"title":"Efficient Power Saving Adaptive Routing Protocol (EPSAR) for MANETs Using AODV and DSDV: Simulation and Feasibility Analysis","authors":"A. Jangra, N. Goel, Priyanka","doi":"10.1109/IPTC.2011.13","DOIUrl":"https://doi.org/10.1109/IPTC.2011.13","url":null,"abstract":"Mobile ad hoc network especially follows multihopping mechanism for routing to make a path from source to destination. If we have a sound and solid routing path that would be efficient, reliable and adaptable to the different scenarios of network too by following the next hop mechanism and also should be the farthest node with in the cluster then we could achieve better performance by the network. This paper gives more emphasis on the same phenomenon by simulating the protocol EPSAR over ADOV (reactive) and DSDV (proactive) existing protocol and also elaborates the mobility issue. This paper also presents the couple of simulations of EPSAR over multiple network (i.e. grows in terms of number of node) and also examines the performance and the feasibility of EPSAR by considering the different network parameters i.e. Data Packet sent, Delivery Ratio and End-to-End Delay.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116197224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the rapid development of computer networks, network security has become a hot topic of concern to people, not just a simple network security threat network needs normal people, but also the pursuit of networking technology in innovative source of power. To address this issue, this article on network security solution to the problem definition and further discussion, and propose how to establish network security management.
{"title":"Network Security Mechanisms Research","authors":"Kuobin Dai","doi":"10.1109/IPTC.2011.65","DOIUrl":"https://doi.org/10.1109/IPTC.2011.65","url":null,"abstract":"With the rapid development of computer networks, network security has become a hot topic of concern to people, not just a simple network security threat network needs normal people, but also the pursuit of networking technology in innovative source of power. To address this issue, this article on network security solution to the problem definition and further discussion, and propose how to establish network security management.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130272779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recently the research on the technology of the internet of things has become the hot spot, and how to lead it into the management system is the most difficult. The use of EPC system in the SCM system is the hot spot in the supply chain araa presently. This article has raised a conception and the basic framework of the Internet of Tings, and focused on the analysis to the Internet of Things especially the Chang Xiang SCMS, then clarify the application of principles of the EPC system in the SCM, finally interpret the details of the construction of the system and describe the implementation of the system.
{"title":"Research of SCM System Based on the Internet of Things on EPC","authors":"Ying Xue","doi":"10.1109/IPTC.2011.59","DOIUrl":"https://doi.org/10.1109/IPTC.2011.59","url":null,"abstract":"Recently the research on the technology of the internet of things has become the hot spot, and how to lead it into the management system is the most difficult. The use of EPC system in the SCM system is the hot spot in the supply chain araa presently. This article has raised a conception and the basic framework of the Internet of Tings, and focused on the analysis to the Internet of Things especially the Chang Xiang SCMS, then clarify the application of principles of the EPC system in the SCM, finally interpret the details of the construction of the system and describe the implementation of the system.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132857741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Over the past 20 years, IPv4 network development for the computer to make a great contribution, however, gradually revealed its flaws. IPv6 to replace IPv4 with its inevitability. However, because these two protocols are very different. And the transition to equipment and software with updates and upgrades, and how to minimize the cost to achieve the campus network from IPv4 to IPv6 transition is the key. This article focuses on the excessive cost of programs and methods to achieve the minimum.
{"title":"IPv4 to IPv6 Transition Research Based on the Campus Network","authors":"Kuobin Dai","doi":"10.1109/IPTC.2011.58","DOIUrl":"https://doi.org/10.1109/IPTC.2011.58","url":null,"abstract":"Over the past 20 years, IPv4 network development for the computer to make a great contribution, however, gradually revealed its flaws. IPv6 to replace IPv4 with its inevitability. However, because these two protocols are very different. And the transition to equipment and software with updates and upgrades, and how to minimize the cost to achieve the campus network from IPv4 to IPv6 transition is the key. This article focuses on the excessive cost of programs and methods to achieve the minimum.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128310040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A Byzantine Fault Tolerant Algorithm suiting web services is proposed considering the features of web services. There are significant differences between the algorithm and the Castro and Liskov's well-known practical Byzantine fault tolerance method. First, we have to create replicas on both sides of communicating web services, while in CLBFT's method, replicas are created only on the server side. Second, due to the autonomous behavior of web services, we have to synchronize the timing of the receiving of messages among replicas. The I/O automata model of the algorithm is presented, and it's correctness is formally specified and verified.
{"title":"Formal Specification for Byzantine Fault Tolerant Algorithm Suiting Web Services","authors":"Wei Zhou, Liu Chen","doi":"10.1109/IPTC.2011.16","DOIUrl":"https://doi.org/10.1109/IPTC.2011.16","url":null,"abstract":"A Byzantine Fault Tolerant Algorithm suiting web services is proposed considering the features of web services. There are significant differences between the algorithm and the Castro and Liskov's well-known practical Byzantine fault tolerance method. First, we have to create replicas on both sides of communicating web services, while in CLBFT's method, replicas are created only on the server side. Second, due to the autonomous behavior of web services, we have to synchronize the timing of the receiving of messages among replicas. The I/O automata model of the algorithm is presented, and it's correctness is formally specified and verified.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133670150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}