Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479307
Chu Chen, Pinghong Ren, Baoxiang Cao, Jiguo Yu
Characters of state transition graph and corresponding treatments are not considered in current algorithms for minimizing deterministic finite automata. On this problem, a pretreatment algorithm for minimizing deterministic finite automata based on state transition symmetry is put forward. First, the concept that state transition graph symmetry is defined and the equivalence of symmetric states is proved. Second, the pretreatment algorithm is given. In the end, an experiment is carried out and the result shows that this algorithm is fairly efficient.
{"title":"A pretreatment algorithm for minimizing deterministic finite automata based on state transition symmetry","authors":"Chu Chen, Pinghong Ren, Baoxiang Cao, Jiguo Yu","doi":"10.1109/ICNDS.2010.5479307","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479307","url":null,"abstract":"Characters of state transition graph and corresponding treatments are not considered in current algorithms for minimizing deterministic finite automata. On this problem, a pretreatment algorithm for minimizing deterministic finite automata based on state transition symmetry is put forward. First, the concept that state transition graph symmetry is defined and the equivalence of symmetric states is proved. Second, the pretreatment algorithm is given. In the end, an experiment is carried out and the result shows that this algorithm is fairly efficient.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123560575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479274
Gang Zong, Wei Sun
Because knowledge transmission plays an important role in economic growth, agents often wish to accelerate the flow of knowledge. Marrying a complex network with the small world characteristics, the knowledge transfer takes place through a myopic barter exchange and takes the barter initiative unconditionally in the Cowan model to be amended. The factor that impact the trust and examine knowledge transmission between cognitive-based trust and emotional trust could be analyzed and knowledge transmission model based on trust mechanism of complex network could be introduced. It find that the efficiency of knowledge transmission is high and easy when the trust level is maximal.
{"title":"Method to analyze complex network of knowledge transmission based on trust mechanism","authors":"Gang Zong, Wei Sun","doi":"10.1109/ICNDS.2010.5479274","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479274","url":null,"abstract":"Because knowledge transmission plays an important role in economic growth, agents often wish to accelerate the flow of knowledge. Marrying a complex network with the small world characteristics, the knowledge transfer takes place through a myopic barter exchange and takes the barter initiative unconditionally in the Cowan model to be amended. The factor that impact the trust and examine knowledge transmission between cognitive-based trust and emotional trust could be analyzed and knowledge transmission model based on trust mechanism of complex network could be introduced. It find that the efficiency of knowledge transmission is high and easy when the trust level is maximal.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124800730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479467
Qin Ningning, Li Dong, Xue Baoguo
This paper designs a novel wireless surveillance system in greenhouse, in order to solve long-existing problems in traditional systems, such as high maintenance cost, low robustness and mobility, etc. We firstly introduce the system architecture, with hardware structure defined and carefully designed on sensor, then we proposed the wireless communication protocol including transmission and data format applicable in the greenhouse. Experiments showed sleep-wake mode increased lifetime of sensors quite efficiently. The introduction of WSN has remarkable meaning in the design of greenhouse surveillance systems, as it could not only simplify the design of communication circuitry so as to reduce the period of the whole system implementation; but also extend the function and performance of interfaces, then facilitate the maintenance and update of the system.
{"title":"The greenhouse surveillance system on wireless sensor networks","authors":"Qin Ningning, Li Dong, Xue Baoguo","doi":"10.1109/ICNDS.2010.5479467","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479467","url":null,"abstract":"This paper designs a novel wireless surveillance system in greenhouse, in order to solve long-existing problems in traditional systems, such as high maintenance cost, low robustness and mobility, etc. We firstly introduce the system architecture, with hardware structure defined and carefully designed on sensor, then we proposed the wireless communication protocol including transmission and data format applicable in the greenhouse. Experiments showed sleep-wake mode increased lifetime of sensors quite efficiently. The introduction of WSN has remarkable meaning in the design of greenhouse surveillance systems, as it could not only simplify the design of communication circuitry so as to reduce the period of the whole system implementation; but also extend the function and performance of interfaces, then facilitate the maintenance and update of the system.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123492766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479190
Zhang Juan
With the rapid development of tourism, the coverage of tourism land and the required land types have been expanding continuously. And the land quality is closely related to the quality of planning and design of the scenic spots. Therefore, the present study constructs an evaluation system of tourism land quality, and conducts a land quality evaluation based on evaluation system of tourism land quality.
{"title":"Discussion on quality evaluation of tourism land","authors":"Zhang Juan","doi":"10.1109/ICNDS.2010.5479190","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479190","url":null,"abstract":"With the rapid development of tourism, the coverage of tourism land and the required land types have been expanding continuously. And the land quality is closely related to the quality of planning and design of the scenic spots. Therefore, the present study constructs an evaluation system of tourism land quality, and conducts a land quality evaluation based on evaluation system of tourism land quality.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121720336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479411
Liu Xiaojian, Zheng Ying
In fact, dynamic component replacement is a relatively difficult problem in the practice of software engineering. This paper presents a new approach which based on architecture reflection to achieve the goal of dynamic component replacement. And what's more, through a concrete case study, the process and formal specification of component replacement were detailed illustrated.
{"title":"Research on dynamic component replacement and its formal specification","authors":"Liu Xiaojian, Zheng Ying","doi":"10.1109/ICNDS.2010.5479411","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479411","url":null,"abstract":"In fact, dynamic component replacement is a relatively difficult problem in the practice of software engineering. This paper presents a new approach which based on architecture reflection to achieve the goal of dynamic component replacement. And what's more, through a concrete case study, the process and formal specification of component replacement were detailed illustrated.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122549768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479131
Xun Duan, Guangqian Kong, Hongmei Wu
Lack of testing platform puzzled the research on overlay network. Recent research has shown that researcher can use Distributed Hash Tables (DHTs) to build certain applications, such as scalable, robust and efficient. Unfortunately, even though those applications have been implemented successfully, researcher is also hard to deploy large-scale distributed systems, nor are DHTs. Some worldwide platforms provide publicly accessible DHT service. Those kinds of platforms can issue at least put and get operations to any DHT node, which processes the operations on their behalf in contrast to the usual DHT model. This paper introduces overlay test-platform by an example of testing about resource location and concentrates on how to do the network testing based on it.
{"title":"Overlay network testing","authors":"Xun Duan, Guangqian Kong, Hongmei Wu","doi":"10.1109/ICNDS.2010.5479131","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479131","url":null,"abstract":"Lack of testing platform puzzled the research on overlay network. Recent research has shown that researcher can use Distributed Hash Tables (DHTs) to build certain applications, such as scalable, robust and efficient. Unfortunately, even though those applications have been implemented successfully, researcher is also hard to deploy large-scale distributed systems, nor are DHTs. Some worldwide platforms provide publicly accessible DHT service. Those kinds of platforms can issue at least put and get operations to any DHT node, which processes the operations on their behalf in contrast to the usual DHT model. This paper introduces overlay test-platform by an example of testing about resource location and concentrates on how to do the network testing based on it.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125524061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479341
Zhimin Zhou, Chen Zhongwen, Zhou Tiecheng, G. Xiaohui
Network security is a complex and systematic project. The intrusion detection system is the first line of defense against network security. Snort is a famous intrusion detection system in the field of open source software. It is widely used in the intrusion prevention and detection domain in the world. In this paper, we explain how Snort implements the intrusion detection, which includes building the compiling environment and analysizing the work-flow and rule tree. This paper will provide a valuable reference for the study of Snort.
{"title":"The study on network intrusion detection system of Snort","authors":"Zhimin Zhou, Chen Zhongwen, Zhou Tiecheng, G. Xiaohui","doi":"10.1109/ICNDS.2010.5479341","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479341","url":null,"abstract":"Network security is a complex and systematic project. The intrusion detection system is the first line of defense against network security. Snort is a famous intrusion detection system in the field of open source software. It is widely used in the intrusion prevention and detection domain in the world. In this paper, we explain how Snort implements the intrusion detection, which includes building the compiling environment and analysizing the work-flow and rule tree. This paper will provide a valuable reference for the study of Snort.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125560641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479245
Wang Zhong-sheng, Liang Chen-yan
This paper proposes a solution of filtering garbage information, in order to solve the problem of dynamic delivery of documents. The solution balances the technique of Black and White List Spam Filtering, as well as the advantages and disadvantages of and Bayesian Algorithm. It creates the Bayesian Model based on the analysis of probability distributions of Junk key words, as well as design and implement a set of information filtering system. The system implements information filtering accurately and intelligently.
{"title":"Application research for the information searching system based on Bayesian Algorithm","authors":"Wang Zhong-sheng, Liang Chen-yan","doi":"10.1109/ICNDS.2010.5479245","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479245","url":null,"abstract":"This paper proposes a solution of filtering garbage information, in order to solve the problem of dynamic delivery of documents. The solution balances the technique of Black and White List Spam Filtering, as well as the advantages and disadvantages of and Bayesian Algorithm. It creates the Bayesian Model based on the analysis of probability distributions of Junk key words, as well as design and implement a set of information filtering system. The system implements information filtering accurately and intelligently.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126401487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479450
Jiulong Zhu
Urban ecological safety evaluation is an important way to coordinate economic development and environmental protection and to promote urban sustainable development. This paper constructed an evaluation indicator system of urban ecological safety. The indicator system was composed of vigor, organization, resilience, maintenance of ecosystem service and human health. Then it discussed evaluation grads and standard values of indicators. Considering the illegibility and uncertainty in ecological safety evaluation, the paper combined fuzzy mathematics and matter-element theory to establish an evaluation model. Finally it developed a case study on Guangzhou city from 1991 to 2007. There is a tendency of gradual improvement in ecological safety of Guangzhou. However, safety conditions during the study period belong to “critically safe” grade, so ecological safety conditions of Guangzhou are unsatisfactory and need to be improved. Fuzzy matter-element theory is scientific, simple, and practical for multi-objective decision-making problems of safety evaluation.
{"title":"Modeling of urban ecological safety evaluation based on fuzzy matter-element theory","authors":"Jiulong Zhu","doi":"10.1109/ICNDS.2010.5479450","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479450","url":null,"abstract":"Urban ecological safety evaluation is an important way to coordinate economic development and environmental protection and to promote urban sustainable development. This paper constructed an evaluation indicator system of urban ecological safety. The indicator system was composed of vigor, organization, resilience, maintenance of ecosystem service and human health. Then it discussed evaluation grads and standard values of indicators. Considering the illegibility and uncertainty in ecological safety evaluation, the paper combined fuzzy mathematics and matter-element theory to establish an evaluation model. Finally it developed a case study on Guangzhou city from 1991 to 2007. There is a tendency of gradual improvement in ecological safety of Guangzhou. However, safety conditions during the study period belong to “critically safe” grade, so ecological safety conditions of Guangzhou are unsatisfactory and need to be improved. Fuzzy matter-element theory is scientific, simple, and practical for multi-objective decision-making problems of safety evaluation.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129399704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479232
Xing Jin-ling
Since the 1960s, organizational commitment has been one of the most important fields in Organizational Behavior; especially in recent 20 years, organizational commitment attracted great interest of Human Resources Management researchers, and a lot of valuable literatures were produced. But there was still not enough research on the organizational commitment of China private enterprises. This article describes the relevant theory of organizational commitment and analyzes the restricting factors of organizational commitment of private enterprises. Besides, it puts forwards some measures on how to maintain the talents by improving employees' organizational commitment. The measures include: speeding up the transformation from family management mode to modern enterprise system mode; establishing equitable salary system; improving emotional commitment by strengthening respects and communications with staff; putting emphasis on career management and providing more opportunities and broad space for development; paying attention to enterprise cultural construction and reaching a shared vision to unite and motivate employees.
{"title":"Talents maintaining strategies of private enterprises based on organizational commitment","authors":"Xing Jin-ling","doi":"10.1109/ICNDS.2010.5479232","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479232","url":null,"abstract":"Since the 1960s, organizational commitment has been one of the most important fields in Organizational Behavior; especially in recent 20 years, organizational commitment attracted great interest of Human Resources Management researchers, and a lot of valuable literatures were produced. But there was still not enough research on the organizational commitment of China private enterprises. This article describes the relevant theory of organizational commitment and analyzes the restricting factors of organizational commitment of private enterprises. Besides, it puts forwards some measures on how to maintain the talents by improving employees' organizational commitment. The measures include: speeding up the transformation from family management mode to modern enterprise system mode; establishing equitable salary system; improving emotional commitment by strengthening respects and communications with staff; putting emphasis on career management and providing more opportunities and broad space for development; paying attention to enterprise cultural construction and reaching a shared vision to unite and motivate employees.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129675142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}