Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479379
Fang Shao, Zhanqiang Liu, Y. Wan
In this paper a finite element analysis (FEA) of machining for AISI1045 is presented. In particular, the thermodynamical constitutive equation(T-C-E) in FEA is applied for both workpiece material and tool material. Cutting temperature and tool wear depth are predicted. The comparison between the predicted and experimental cutting temperature and tool wear depth are presented and discussed. The results indicated that a good prediction accuracy of both principal cutting temperature and tool wear depth can be achieved by the method of FEA with thermodynamical constitutive equation.
{"title":"Finite element simulation of machining of aisi1045 with thermodynamical constitutive equation","authors":"Fang Shao, Zhanqiang Liu, Y. Wan","doi":"10.1109/ICNDS.2010.5479379","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479379","url":null,"abstract":"In this paper a finite element analysis (FEA) of machining for AISI1045 is presented. In particular, the thermodynamical constitutive equation(T-C-E) in FEA is applied for both workpiece material and tool material. Cutting temperature and tool wear depth are predicted. The comparison between the predicted and experimental cutting temperature and tool wear depth are presented and discussed. The results indicated that a good prediction accuracy of both principal cutting temperature and tool wear depth can be achieved by the method of FEA with thermodynamical constitutive equation.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130011062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479470
Jun Liu, Xiao-ling Wang, Xuanzheng Liu, Fan Yang
How to provide students with personalized physical education (P.E) course has become particularly urgent with the development of information technology in teaching of P.E and the increasing personalized demands of contemporary college students. This paper starts with the analysis of college students' demands for P.E classes, introducing ideas and technology about personalized recommendation, analyzes the functions and processes of the personalized recommendation system for P.E course at universities. Then, this paper designs the system application architecture.
{"title":"Analysis and design of personalized recommendation system for university physical education","authors":"Jun Liu, Xiao-ling Wang, Xuanzheng Liu, Fan Yang","doi":"10.1109/ICNDS.2010.5479470","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479470","url":null,"abstract":"How to provide students with personalized physical education (P.E) course has become particularly urgent with the development of information technology in teaching of P.E and the increasing personalized demands of contemporary college students. This paper starts with the analysis of college students' demands for P.E classes, introducing ideas and technology about personalized recommendation, analyzes the functions and processes of the personalized recommendation system for P.E course at universities. Then, this paper designs the system application architecture.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130125776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479617
Haiping Wang
Online stickiness means that the attributes website owns to absorb and retain consumers in e-marketing from marketing perspective. It can help to create and retain websites' abilities to competition and sustainable development. This paper reviews previous research related to online stickiness, and figures out its meanings, driving factors and its effects. Based on these, evaluation is discussed, limitations on present researches are pointed out and future research directions are put forward.
{"title":"Review of online stickiness research from consumer perspective","authors":"Haiping Wang","doi":"10.1109/ICNDS.2010.5479617","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479617","url":null,"abstract":"Online stickiness means that the attributes website owns to absorb and retain consumers in e-marketing from marketing perspective. It can help to create and retain websites' abilities to competition and sustainable development. This paper reviews previous research related to online stickiness, and figures out its meanings, driving factors and its effects. Based on these, evaluation is discussed, limitations on present researches are pointed out and future research directions are put forward.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133861982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479407
Shengnan Xu, Shouyu Wang
In this paper, we briefly introduce the AVS-M, including its system structure, coding tools, and so on. And then, we analyze in detail the main program flow from three functions: Main(), Encode_I_Frame() and Encode_P_Frame(). The results of the analysis are very important for us to understand the coding of AVS-M.
{"title":"Main program flow analysis in AVS-M","authors":"Shengnan Xu, Shouyu Wang","doi":"10.1109/ICNDS.2010.5479407","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479407","url":null,"abstract":"In this paper, we briefly introduce the AVS-M, including its system structure, coding tools, and so on. And then, we analyze in detail the main program flow from three functions: Main(), Encode_I_Frame() and Encode_P_Frame(). The results of the analysis are very important for us to understand the coding of AVS-M.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133872436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479427
Zhao Quan-yi, Huang Wei
This paper analyzes the application and role of digital electronic media in the mass advertising and explores the interaction, similarities and differences between digital electronic media and traditional media. The applications of the mobile TV advertising, Internet advertising, SMS advertising in real life are interpreted in detail. The development trends of digital electronic media are forecast. It is summarized that digital electronic media is the bond between advertising and audience.
{"title":"The Prospects of modern digital electronic media advertising","authors":"Zhao Quan-yi, Huang Wei","doi":"10.1109/ICNDS.2010.5479427","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479427","url":null,"abstract":"This paper analyzes the application and role of digital electronic media in the mass advertising and explores the interaction, similarities and differences between digital electronic media and traditional media. The applications of the mobile TV advertising, Internet advertising, SMS advertising in real life are interpreted in detail. The development trends of digital electronic media are forecast. It is summarized that digital electronic media is the bond between advertising and audience.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134052345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479396
Yang Lin, Xing Chang-ming
Petersen graph has good performance in parallel and distributed computation because of its properties such as short diameter and regularity. Based on the simple scalable properties of ring and the short network diameter of Petersen graph, a new interconnection network RPn(k) is proposed and the properties of the RPn(k) are analyzed. It is proved that RPn(k) not only has good regularity and extensibility, but also has shorter diameter and smaller construction costs than the RP(k) network. Additionally, The conditions satisfying that the network diameter of RPn(k) are better than those of 2D Torus are presented.
{"title":"An interconnection network RPn(k) and its properties","authors":"Yang Lin, Xing Chang-ming","doi":"10.1109/ICNDS.2010.5479396","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479396","url":null,"abstract":"Petersen graph has good performance in parallel and distributed computation because of its properties such as short diameter and regularity. Based on the simple scalable properties of ring and the short network diameter of Petersen graph, a new interconnection network RPn(k) is proposed and the properties of the RPn(k) are analyzed. It is proved that RPn(k) not only has good regularity and extensibility, but also has shorter diameter and smaller construction costs than the RP(k) network. Additionally, The conditions satisfying that the network diameter of RPn(k) are better than those of 2D Torus are presented.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133684904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479238
Long Shigong, W. Lijun
In this paper, we present how the LTL (Linear Temporal Logic) language can be used to specify security protocols and discuss the analysis process using LTL. To illustrate the feasibility of our approach, we analyse the Needham-Schroeder public-key protocol and reproduce the error found by Gavin Lowe. We also extend LTL and we use LTL of knowledge to reason about situations where the knowledge of an agent is important, and where change may occur in this knowledge over time. In the end, we discuss some possible directions for future work.
{"title":"Analysis of cryptographic protocols using LTL of knowledge","authors":"Long Shigong, W. Lijun","doi":"10.1109/ICNDS.2010.5479238","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479238","url":null,"abstract":"In this paper, we present how the LTL (Linear Temporal Logic) language can be used to specify security protocols and discuss the analysis process using LTL. To illustrate the feasibility of our approach, we analyse the Needham-Schroeder public-key protocol and reproduce the error found by Gavin Lowe. We also extend LTL and we use LTL of knowledge to reason about situations where the knowledge of an agent is important, and where change may occur in this knowledge over time. In the end, we discuss some possible directions for future work.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133105694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479236
Hua Jiang, Jing Yang
The paper analyzed China's modern rural logistics situation and proposed 23 evaluation indexes from seven aspects to establish an evaluation index system of modern rural logistics construction, and finally applied Analytic Hierarchical Model (AHM) to calculate the importance weight of each index in the evaluation system, which provided basis for decision making of building a modern logistics system in rural areas.
{"title":"Analysis on evaluation index system of China's modern rural logistics construction based on AHM","authors":"Hua Jiang, Jing Yang","doi":"10.1109/ICNDS.2010.5479236","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479236","url":null,"abstract":"The paper analyzed China's modern rural logistics situation and proposed 23 evaluation indexes from seven aspects to establish an evaluation index system of modern rural logistics construction, and finally applied Analytic Hierarchical Model (AHM) to calculate the importance weight of each index in the evaluation system, which provided basis for decision making of building a modern logistics system in rural areas.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131400963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479456
Xu Young, Huang Qiqi
This paper presents a framework for the fourth party mobile integrated payment platform based on cloud computing. The purposes of this paper are as follows: to solve the problem of departments segmentation during mobile payment development, to realize the barrier-free communication and integration of mobile payment industrial Chains, to cut down customer attrition cause by low usability of mobile payment. The research method is: analysis the problems of mobile payment, as well as the characteristics of cloud computing, combined with fourth-party payment platform related concepts, proposing a complete framework of the fourth party mobile integrated payment platform based on cloud computing, and describing functions of each part, then concluded the advantage of the fourth party mobile integrated payment platform based on cloud computing.
{"title":"The framework of the fourth party mobile integrated payment platform based on cloud computing","authors":"Xu Young, Huang Qiqi","doi":"10.1109/ICNDS.2010.5479456","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479456","url":null,"abstract":"This paper presents a framework for the fourth party mobile integrated payment platform based on cloud computing. The purposes of this paper are as follows: to solve the problem of departments segmentation during mobile payment development, to realize the barrier-free communication and integration of mobile payment industrial Chains, to cut down customer attrition cause by low usability of mobile payment. The research method is: analysis the problems of mobile payment, as well as the characteristics of cloud computing, combined with fourth-party payment platform related concepts, proposing a complete framework of the fourth party mobile integrated payment platform based on cloud computing, and describing functions of each part, then concluded the advantage of the fourth party mobile integrated payment platform based on cloud computing.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131735065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479369
Jian Mao, Shiqing Liu
CAD models are required to transmit through network in many occasions, and the information security must be ensured. A transmission framework depending on progressive mesh is proposed in this paper. The description method level-of-detail (LOD) is introduced, which is a method to reduce the number of polygons for rendering, storage, transmission and following processing by using different-resolution details for the objects in a scene, while ensuring the image quality or geometrical accuracy. By using LOD structure tree, the model with the most appropriate resolution is transmitted automatically according to the bandwidth and the requirement of users. The data volume of transmission is reduced and the resolution is adjusted freely. Further more, by combining Christopher's role-based viewing envelopes for information protection, the information security in collaborative design environment is ensured, and the leakage risk of important data is reduced in the muti-organization cooperation environment.
{"title":"Application of LOD in collaborative design and information security","authors":"Jian Mao, Shiqing Liu","doi":"10.1109/ICNDS.2010.5479369","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479369","url":null,"abstract":"CAD models are required to transmit through network in many occasions, and the information security must be ensured. A transmission framework depending on progressive mesh is proposed in this paper. The description method level-of-detail (LOD) is introduced, which is a method to reduce the number of polygons for rendering, storage, transmission and following processing by using different-resolution details for the objects in a scene, while ensuring the image quality or geometrical accuracy. By using LOD structure tree, the model with the most appropriate resolution is transmitted automatically according to the bandwidth and the requirement of users. The data volume of transmission is reduced and the resolution is adjusted freely. Further more, by combining Christopher's role-based viewing envelopes for information protection, the information security in collaborative design environment is ensured, and the leakage risk of important data is reduced in the muti-organization cooperation environment.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124312852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}