Pub Date : 2009-09-15DOI: 10.1109/ITIME.2009.5236409
Lin Sun, Jing Yan, Yongming Chen, Songtao Luo
In this paper, we proposed a new data clustering method MATS that was inspired by animals, for example, the dog or the ant, which use scent to mark out their turf. MATS can automatically find clusters, depending on a few parameters that are not directly related to the data set. In addition, there are some existence technique was also utilized in our method, such as the density concept and cluster validity index (DB-index). The experiment results verified that MATS is able to discover clusters with varying shapes and is effective when applied to image segmentation.
{"title":"A new data clustering using multi-agent turf system","authors":"Lin Sun, Jing Yan, Yongming Chen, Songtao Luo","doi":"10.1109/ITIME.2009.5236409","DOIUrl":"https://doi.org/10.1109/ITIME.2009.5236409","url":null,"abstract":"In this paper, we proposed a new data clustering method MATS that was inspired by animals, for example, the dog or the ant, which use scent to mark out their turf. MATS can automatically find clusters, depending on a few parameters that are not directly related to the data set. In addition, there are some existence technique was also utilized in our method, such as the density concept and cluster validity index (DB-index). The experiment results verified that MATS is able to discover clusters with varying shapes and is effective when applied to image segmentation.","PeriodicalId":398477,"journal":{"name":"2009 IEEE International Symposium on IT in Medicine & Education","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126628460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-15DOI: 10.1109/ITIME.2009.5236444
Yongzhong Tang, B. Liu
Typical SOA platform orchestrates services centrally, through pre-defined processes, assuming that what should have already been triggered is defined in a process. Thus complex events should trigger a set of services is not accounted for in traditional SOA architecture. Event-driven SOA lets users monitor, analyze, and enrich events to make the connections among disparate events that do not at first appear to be intuitively obvious. This makes these enriched events visible to others, and also allows the event-driven SOA system to possibly automate actions to take to address some unique pattern. In this paper, we are proposing a novel approach based on event-driven SOA to re-construct traditional monitor and control system that utilizes the concept of service orientation to give flexibility, and provides a powerful solution to realize effective and adaptive service creation, deployment and service management. Furthermore, we also present and implement a high reliable monitor and control system for coal mining based on event-driven SOA to show the effectiveness and feasibility of event-driven SOA.
{"title":"Design high reliable monitor and control system using event-driven SOA philosophy","authors":"Yongzhong Tang, B. Liu","doi":"10.1109/ITIME.2009.5236444","DOIUrl":"https://doi.org/10.1109/ITIME.2009.5236444","url":null,"abstract":"Typical SOA platform orchestrates services centrally, through pre-defined processes, assuming that what should have already been triggered is defined in a process. Thus complex events should trigger a set of services is not accounted for in traditional SOA architecture. Event-driven SOA lets users monitor, analyze, and enrich events to make the connections among disparate events that do not at first appear to be intuitively obvious. This makes these enriched events visible to others, and also allows the event-driven SOA system to possibly automate actions to take to address some unique pattern. In this paper, we are proposing a novel approach based on event-driven SOA to re-construct traditional monitor and control system that utilizes the concept of service orientation to give flexibility, and provides a powerful solution to realize effective and adaptive service creation, deployment and service management. Furthermore, we also present and implement a high reliable monitor and control system for coal mining based on event-driven SOA to show the effectiveness and feasibility of event-driven SOA.","PeriodicalId":398477,"journal":{"name":"2009 IEEE International Symposium on IT in Medicine & Education","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127021960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-15DOI: 10.1109/ITIME.2009.5236378
Xiao Qiuhui
In light of the needs of interactive and personalized learning of information retrieval program, this paper designs a Web-based teaching system for information retrieval program, which consists of four subsystems: the teacher management subsystem, student learning subsystem, network class subsystem, and examination and assessment subsystem. Then, it introduces the web-based teaching process of information retrieval program as well as the contents and functions of navigation module of Internet information resources. Finally, it demonstrates the functions of the system through case study.
{"title":"Design of Web-based teaching system for information retrieval","authors":"Xiao Qiuhui","doi":"10.1109/ITIME.2009.5236378","DOIUrl":"https://doi.org/10.1109/ITIME.2009.5236378","url":null,"abstract":"In light of the needs of interactive and personalized learning of information retrieval program, this paper designs a Web-based teaching system for information retrieval program, which consists of four subsystems: the teacher management subsystem, student learning subsystem, network class subsystem, and examination and assessment subsystem. Then, it introduces the web-based teaching process of information retrieval program as well as the contents and functions of navigation module of Internet information resources. Finally, it demonstrates the functions of the system through case study.","PeriodicalId":398477,"journal":{"name":"2009 IEEE International Symposium on IT in Medicine & Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127463166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-15DOI: 10.1109/ITIME.2009.5236255
Lin Sun, Jian Wang, Ke-fa Gao, ChangWei Hu
Objective: To study the relationship between expression of IL-8 mRNA in peripheral blood and women with endometriosis and its clinical significance. Methods: The women with endometriosis were treated with Danazol and the level of IL-8 mRNA in their peripheral blood was detected by Real-time PCR. Results: The level of IL-8 mRNA in peripheral blood of women with endometriosis was 1.1339−0.1428. It was high significance between in endometriosis and without endometriosis (P≪0.01). However, the level of IL-8 mRNA in endometriosis in stage of I≈II and in stage of III were 1.1023−0.1371 and 1.1866−0.1543, few significance difference in two subgroups (P≫0.05). After treatment of Danazol for six months, the expression of IL-8 mRNA in peripheral blood was 1.0547−0.1299, without significantly difference between in endometriosis and controls (P≫0.05). Conclusion: IL-8 mRNA is over expressed in peripheral blood of women with endometriosis and play key role in course of disease. The over expression of endometrium and local inflammatory reaction caused by IL-8 can be inhibited by Danazol therapy.
{"title":"Relationship between expression of IL-8 mRNA in peripheral blood and women with endometriosis","authors":"Lin Sun, Jian Wang, Ke-fa Gao, ChangWei Hu","doi":"10.1109/ITIME.2009.5236255","DOIUrl":"https://doi.org/10.1109/ITIME.2009.5236255","url":null,"abstract":"Objective: To study the relationship between expression of IL-8 mRNA in peripheral blood and women with endometriosis and its clinical significance. Methods: The women with endometriosis were treated with Danazol and the level of IL-8 mRNA in their peripheral blood was detected by Real-time PCR. Results: The level of IL-8 mRNA in peripheral blood of women with endometriosis was 1.1339−0.1428. It was high significance between in endometriosis and without endometriosis (P≪0.01). However, the level of IL-8 mRNA in endometriosis in stage of I≈II and in stage of III were 1.1023−0.1371 and 1.1866−0.1543, few significance difference in two subgroups (P≫0.05). After treatment of Danazol for six months, the expression of IL-8 mRNA in peripheral blood was 1.0547−0.1299, without significantly difference between in endometriosis and controls (P≫0.05). Conclusion: IL-8 mRNA is over expressed in peripheral blood of women with endometriosis and play key role in course of disease. The over expression of endometrium and local inflammatory reaction caused by IL-8 can be inhibited by Danazol therapy.","PeriodicalId":398477,"journal":{"name":"2009 IEEE International Symposium on IT in Medicine & Education","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114432255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-15DOI: 10.1109/ITIME.2009.5236411
Wen He, Chao Qiu, Hongbin Niu, Zong-cai Wang
In this paper the structure of herbal medicine plaster was analyzed and a craft for automatic industrial production was put forward. The design idea for the main working procedure, which can resolve all of the technical problems of the product line, was introduced. It also can reach the requirements of automatic production.
{"title":"The research for the product line design of Chinese herbal medicine plaster","authors":"Wen He, Chao Qiu, Hongbin Niu, Zong-cai Wang","doi":"10.1109/ITIME.2009.5236411","DOIUrl":"https://doi.org/10.1109/ITIME.2009.5236411","url":null,"abstract":"In this paper the structure of herbal medicine plaster was analyzed and a craft for automatic industrial production was put forward. The design idea for the main working procedure, which can resolve all of the technical problems of the product line, was introduced. It also can reach the requirements of automatic production.","PeriodicalId":398477,"journal":{"name":"2009 IEEE International Symposium on IT in Medicine & Education","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121864471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-15DOI: 10.1109/ITIME.2009.5236402
Xiaoqing Tang, Ting Liu
This paper researches on selecting the agile, competitive and compatible partners, which is the key link in the establishment of virtual enterprise. According to the analysis of existing methods, this paper proposes a method based on Analytic Network Process(ANP) which is more applicable to the reality. In addition, it provides a specific example to prove this method.
{"title":"Partner selection method for supply chain virtual enterprises based on ANP","authors":"Xiaoqing Tang, Ting Liu","doi":"10.1109/ITIME.2009.5236402","DOIUrl":"https://doi.org/10.1109/ITIME.2009.5236402","url":null,"abstract":"This paper researches on selecting the agile, competitive and compatible partners, which is the key link in the establishment of virtual enterprise. According to the analysis of existing methods, this paper proposes a method based on Analytic Network Process(ANP) which is more applicable to the reality. In addition, it provides a specific example to prove this method.","PeriodicalId":398477,"journal":{"name":"2009 IEEE International Symposium on IT in Medicine & Education","volume":"44 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120816263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-15DOI: 10.1109/ITIME.2009.5236212
Xiao-li Chen, Pei-yu Liu, Zhen-fang Zhu, Y. Qiu
The problem of content-based spam filtering on machine learning methods actually is a binary classification. SVMs can separate the data into two categories optimally so SVMs suit to spam filtering. With used into spam filtering, the standard support vector machine involves the minimization of the error function and the accuracy of the SVM is very high, but the degree of misclassification of legitimate emails is high. In order to solve that problem, this paper proposed a method of spam filtering based on weighted support vector machines. Experimental results show that the algorithm can enhance the filtering performance effectively.
{"title":"A method of spam filtering based on weighted support vector machines","authors":"Xiao-li Chen, Pei-yu Liu, Zhen-fang Zhu, Y. Qiu","doi":"10.1109/ITIME.2009.5236212","DOIUrl":"https://doi.org/10.1109/ITIME.2009.5236212","url":null,"abstract":"The problem of content-based spam filtering on machine learning methods actually is a binary classification. SVMs can separate the data into two categories optimally so SVMs suit to spam filtering. With used into spam filtering, the standard support vector machine involves the minimization of the error function and the accuracy of the SVM is very high, but the degree of misclassification of legitimate emails is high. In order to solve that problem, this paper proposed a method of spam filtering based on weighted support vector machines. Experimental results show that the algorithm can enhance the filtering performance effectively.","PeriodicalId":398477,"journal":{"name":"2009 IEEE International Symposium on IT in Medicine & Education","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132853392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-15DOI: 10.1109/ITIME.2009.5236433
Xiaojiang Li, Qi'an Chen, Luanfang Mei, Juan Chen, Junfang Shi
Aimed at security problems in modern distance education management such as tuition fee and diploma management, this paper designs a kind of Electronic Student's Identification Card applying CPK (Combined Public Key) authentication technology. This can realize identification authentication and secure tuition fee management in distance education management system.
{"title":"CPK authentication technology applying of distance education management system","authors":"Xiaojiang Li, Qi'an Chen, Luanfang Mei, Juan Chen, Junfang Shi","doi":"10.1109/ITIME.2009.5236433","DOIUrl":"https://doi.org/10.1109/ITIME.2009.5236433","url":null,"abstract":"Aimed at security problems in modern distance education management such as tuition fee and diploma management, this paper designs a kind of Electronic Student's Identification Card applying CPK (Combined Public Key) authentication technology. This can realize identification authentication and secure tuition fee management in distance education management system.","PeriodicalId":398477,"journal":{"name":"2009 IEEE International Symposium on IT in Medicine & Education","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133082388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-15DOI: 10.1109/ITIME.2009.5236336
Li Gao, F. Wang, Xuefeng Jiang
In view of the paperless teaching and the test situation of programming curriculums, this paper employed the analytic hierarchy process (AHP) to construct achievement evaluation indicator system and the examination paper evaluation indicator system for programming curriculums group. This evaluation indicator system made full use of the wealth of information of the process of paperless teaching and examination. Finally an evaluation software system was formed based on this evaluation indicator system. This evaluation software system can be used as a basis of the teaching evaluation for the teaching management department as well as a method of analyzing student's study situation and teacher's teaching situation.
{"title":"The evaluation system of programming curriculums","authors":"Li Gao, F. Wang, Xuefeng Jiang","doi":"10.1109/ITIME.2009.5236336","DOIUrl":"https://doi.org/10.1109/ITIME.2009.5236336","url":null,"abstract":"In view of the paperless teaching and the test situation of programming curriculums, this paper employed the analytic hierarchy process (AHP) to construct achievement evaluation indicator system and the examination paper evaluation indicator system for programming curriculums group. This evaluation indicator system made full use of the wealth of information of the process of paperless teaching and examination. Finally an evaluation software system was formed based on this evaluation indicator system. This evaluation software system can be used as a basis of the teaching evaluation for the teaching management department as well as a method of analyzing student's study situation and teacher's teaching situation.","PeriodicalId":398477,"journal":{"name":"2009 IEEE International Symposium on IT in Medicine & Education","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131602414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-15DOI: 10.1109/ITIME.2009.5236455
Yang Huayuan, Xu Gang, Li Jing, Hu Zhuicheng, Liu Tang-yi
Based on the embedded ARM technology and Identification Research on AR Parameter Model, real-time acupuncture manipulation procession can abstract the coefficient of acupuncture manipulation model, build feature vector to identify various acupuncture manipulation, thus provide new ways for qualification and digitalization research on acupuncture manipulation.
{"title":"Real-time signal procession of acupuncture manipulation and Identification Research on AR Parameter Model","authors":"Yang Huayuan, Xu Gang, Li Jing, Hu Zhuicheng, Liu Tang-yi","doi":"10.1109/ITIME.2009.5236455","DOIUrl":"https://doi.org/10.1109/ITIME.2009.5236455","url":null,"abstract":"Based on the embedded ARM technology and Identification Research on AR Parameter Model, real-time acupuncture manipulation procession can abstract the coefficient of acupuncture manipulation model, build feature vector to identify various acupuncture manipulation, thus provide new ways for qualification and digitalization research on acupuncture manipulation.","PeriodicalId":398477,"journal":{"name":"2009 IEEE International Symposium on IT in Medicine & Education","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133389983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}