Pub Date : 2011-09-01DOI: 10.1109/CCIENG.2011.6008125
D. Zhong, Chun Chen
With the rapid development of multimedia technology, digital watermarking technology has become an effective mean for the protection of multimedia courseware. The paper proposed an improved digital watermarking algorithm for the protection of multimedia courseware based on using MATLAB to study digital watermarking and used the algorithm and MATLAB, Visual C to achieve the digital watermarking system for the protection of multimedia courseware, introducing the function, using methods and test results of the system in detail. Analysis shows that the system can merge with the advantages of current watermarking system and can protect multimedia courseware and information security simultaneously, so the system has some practical value.
{"title":"The study of digital watermarking system for the protection of multimedia courseware","authors":"D. Zhong, Chun Chen","doi":"10.1109/CCIENG.2011.6008125","DOIUrl":"https://doi.org/10.1109/CCIENG.2011.6008125","url":null,"abstract":"With the rapid development of multimedia technology, digital watermarking technology has become an effective mean for the protection of multimedia courseware. The paper proposed an improved digital watermarking algorithm for the protection of multimedia courseware based on using MATLAB to study digital watermarking and used the algorithm and MATLAB, Visual C to achieve the digital watermarking system for the protection of multimedia courseware, introducing the function, using methods and test results of the system in detail. Analysis shows that the system can merge with the advantages of current watermarking system and can protect multimedia courseware and information security simultaneously, so the system has some practical value.","PeriodicalId":6316,"journal":{"name":"2011 IEEE 2nd International Conference on Computing, Control and Industrial Engineering","volume":"10 1","pages":"304-307"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91516828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-01DOI: 10.1109/CCIENG.2011.6008097
Kai Chang, S. Wang, Hao Chang
Convenience yields convey the difference of expected yields on EUA futures contracts with different delivery dates. We present options pricing formula of futures spread with zero strike price and constant convenience yields, and compare options value of futures spread with different maturities. Empirical results show convenience yields of EUA daily futures are a strong similarity of time-varying trend. Holding long-maturity futures are considered as call options of futures spread. The hedgers can adjust flexible trading policies of assets portfolio on EUA futures with different maturities by the behavioral characteristics of convenience yields. Empirical results show holding long-maturity EUA futures with higher negative convenience yields can be created obvious options value of futures spread.
{"title":"Convenience yields and options value on futures spread for carbon emission","authors":"Kai Chang, S. Wang, Hao Chang","doi":"10.1109/CCIENG.2011.6008097","DOIUrl":"https://doi.org/10.1109/CCIENG.2011.6008097","url":null,"abstract":"Convenience yields convey the difference of expected yields on EUA futures contracts with different delivery dates. We present options pricing formula of futures spread with zero strike price and constant convenience yields, and compare options value of futures spread with different maturities. Empirical results show convenience yields of EUA daily futures are a strong similarity of time-varying trend. Holding long-maturity futures are considered as call options of futures spread. The hedgers can adjust flexible trading policies of assets portfolio on EUA futures with different maturities by the behavioral characteristics of convenience yields. Empirical results show holding long-maturity EUA futures with higher negative convenience yields can be created obvious options value of futures spread.","PeriodicalId":6316,"journal":{"name":"2011 IEEE 2nd International Conference on Computing, Control and Industrial Engineering","volume":"22 1","pages":"182-185"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84642594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-01DOI: 10.1109/CCIENG.2011.6008011
Yongchang Ren, Deyi Jiang, Tao Xing, P. Zhu
Improving the software quality unceasingly, is an important work of throughout the software life cycle, is a reliable guarantee of software projects which is successful implemented and completed. For the problems exist in the process of software quality management, researching with control chart. Based on the study of control chart theory, control chart application examples are given. The research of control chart theory including the control chart structure, the "3c" principles of normal distribution, control limits, control line calculations and determine the control points of the rules and so on. Control chart application examples according to the application process, including calculate control limits, draw control chart, results analysis. The difficulty in using control chart is results analysis and control, using the process need to follow the principle "found different reasons, take measures, no longer appears, inclusion criteria ". The results show that the control chart supplies the scientific management methods and technical support for quality control, is the effective ways and means to achieve the software quality control objectives.
{"title":"Research on software quality control method based on control chart","authors":"Yongchang Ren, Deyi Jiang, Tao Xing, P. Zhu","doi":"10.1109/CCIENG.2011.6008011","DOIUrl":"https://doi.org/10.1109/CCIENG.2011.6008011","url":null,"abstract":"Improving the software quality unceasingly, is an important work of throughout the software life cycle, is a reliable guarantee of software projects which is successful implemented and completed. For the problems exist in the process of software quality management, researching with control chart. Based on the study of control chart theory, control chart application examples are given. The research of control chart theory including the control chart structure, the \"3c\" principles of normal distribution, control limits, control line calculations and determine the control points of the rules and so on. Control chart application examples according to the application process, including calculate control limits, draw control chart, results analysis. The difficulty in using control chart is results analysis and control, using the process need to follow the principle \"found different reasons, take measures, no longer appears, inclusion criteria \". The results show that the control chart supplies the scientific management methods and technical support for quality control, is the effective ways and means to achieve the software quality control objectives.","PeriodicalId":6316,"journal":{"name":"2011 IEEE 2nd International Conference on Computing, Control and Industrial Engineering","volume":"17 1","pages":"274-277"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88643743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-01DOI: 10.1109/CCIENG.2011.6008027
Ge Bin, Zhang Jun-li
A detailed nonlinear model for a typical PWR secondary system is developed for the development of simulation software. Each component in the system has been represented by appropriate differential or algebraic equations. The effects of compressible steam flows, non-equilibrium two-phase heat exchange and the characteristics of initial parameters and volume flow rate of PWR nuclear power unit are considered. A fluid flow network package was used for solving nonlinear equations to simulate steady-state and transient operational conditions. Overall system has been constructed by connecting individual components to each other. The validity of models for individual components and overall system has been verified. The simulation result shows that the model can get high accuracy and reasonable transient behavior of the secondary system and can be used for full scope, normal operation conditions and abnormal accident events in real time simulation for PWR nuclear power unit.
{"title":"Modeling of main steam and two-phase heat exchanger for nuclear power unit","authors":"Ge Bin, Zhang Jun-li","doi":"10.1109/CCIENG.2011.6008027","DOIUrl":"https://doi.org/10.1109/CCIENG.2011.6008027","url":null,"abstract":"A detailed nonlinear model for a typical PWR secondary system is developed for the development of simulation software. Each component in the system has been represented by appropriate differential or algebraic equations. The effects of compressible steam flows, non-equilibrium two-phase heat exchange and the characteristics of initial parameters and volume flow rate of PWR nuclear power unit are considered. A fluid flow network package was used for solving nonlinear equations to simulate steady-state and transient operational conditions. Overall system has been constructed by connecting individual components to each other. The validity of models for individual components and overall system has been verified. The simulation result shows that the model can get high accuracy and reasonable transient behavior of the secondary system and can be used for full scope, normal operation conditions and abnormal accident events in real time simulation for PWR nuclear power unit.","PeriodicalId":6316,"journal":{"name":"2011 IEEE 2nd International Conference on Computing, Control and Industrial Engineering","volume":"50 1","pages":"337-340"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84724932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-01DOI: 10.1109/CCIENG.2011.6007999
Chunli Lu
Thirty "Nike" image ads were selected as an example for classified comparative study. According to the influence of human psychological state, it was concluded that ads can be classified into three types including dominant-advertising namely consciousness level advertisement, recessive-advertising namely subconscious level advertisement and the intermediate state that preconscious level advertisement in between. Nine ads were converted into slides and divided into three groups. One hundred and fifty college students were used as subjects for the study. Based on perceptual engineering semantic differential measurement, the psychological effects of advertising design in three awareness levels were evaluated and analyzed from six dimensions including credibility, degree of cognition, affinity, level of memory, behavior, reliability and innovative degree.
{"title":"Psychological evaluation on the effect of three level of awareness advertising","authors":"Chunli Lu","doi":"10.1109/CCIENG.2011.6007999","DOIUrl":"https://doi.org/10.1109/CCIENG.2011.6007999","url":null,"abstract":"Thirty \"Nike\" image ads were selected as an example for classified comparative study. According to the influence of human psychological state, it was concluded that ads can be classified into three types including dominant-advertising namely consciousness level advertisement, recessive-advertising namely subconscious level advertisement and the intermediate state that preconscious level advertisement in between. Nine ads were converted into slides and divided into three groups. One hundred and fifty college students were used as subjects for the study. Based on perceptual engineering semantic differential measurement, the psychological effects of advertising design in three awareness levels were evaluated and analyzed from six dimensions including credibility, degree of cognition, affinity, level of memory, behavior, reliability and innovative degree.","PeriodicalId":6316,"journal":{"name":"2011 IEEE 2nd International Conference on Computing, Control and Industrial Engineering","volume":"24 1","pages":"227-230"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77300448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-01DOI: 10.1109/CCIENG.2011.6008045
D. Zhong, Chun Chen
Identity authentication is the very important component for information security technologies. It is the key to protect the security of information systems. This paper proposes a kind of new hybrid identity authentication technology based on the identity authentication technology of traditional information systems, which is combined with a smart card technology, the chaos theory and fingerprint recognition technology. The new hybrid identity authentication technology has been implemented to apply to a mixed information system, the information system has been designed in the paper. Experimental results show that the security of identity authentication in the information system has been improved. It provides a better research direction to protect the security of information systems.
{"title":"The design and implementation of information system based on the hybrid identity authentication technology","authors":"D. Zhong, Chun Chen","doi":"10.1109/CCIENG.2011.6008045","DOIUrl":"https://doi.org/10.1109/CCIENG.2011.6008045","url":null,"abstract":"Identity authentication is the very important component for information security technologies. It is the key to protect the security of information systems. This paper proposes a kind of new hybrid identity authentication technology based on the identity authentication technology of traditional information systems, which is combined with a smart card technology, the chaos theory and fingerprint recognition technology. The new hybrid identity authentication technology has been implemented to apply to a mixed information system, the information system has been designed in the paper. Experimental results show that the security of identity authentication in the information system has been improved. It provides a better research direction to protect the security of information systems.","PeriodicalId":6316,"journal":{"name":"2011 IEEE 2nd International Conference on Computing, Control and Industrial Engineering","volume":"134 1","pages":"409-412"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90665761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-01DOI: 10.1109/CCIENG.2011.6008054
Xiaowei Shi, Xu-Yi Qu, Weijian Mi, Daofang Chang
This study was designed to evaluate the eye movement parameter of visual fatigue induced during the VDT work, using the sensors to simultaneously record focal eye movement. Inside different time and tasks, the changes in these physiological measures, taken during different VDT tasks, were used to propose an index for evaluating visual fatigue. Test under different experimental conditions takes time as the most important factor observe the changes of eyelid opening, blinking frequency and pupil diameter. These eye movement parameters show significant difference (p<0.05) between the two measurement times. On the basis of the results, the correlation of the eyelid diameter and of the pupil diameter used for evaluation of the visual fatigue was discussed. As a result, there exists the positive relation between pupil diameter and the eyelid opening after long working hours.
{"title":"Study on index of visual fatigue of VDT work","authors":"Xiaowei Shi, Xu-Yi Qu, Weijian Mi, Daofang Chang","doi":"10.1109/CCIENG.2011.6008054","DOIUrl":"https://doi.org/10.1109/CCIENG.2011.6008054","url":null,"abstract":"This study was designed to evaluate the eye movement parameter of visual fatigue induced during the VDT work, using the sensors to simultaneously record focal eye movement. Inside different time and tasks, the changes in these physiological measures, taken during different VDT tasks, were used to propose an index for evaluating visual fatigue. Test under different experimental conditions takes time as the most important factor observe the changes of eyelid opening, blinking frequency and pupil diameter. These eye movement parameters show significant difference (p<0.05) between the two measurement times. On the basis of the results, the correlation of the eyelid diameter and of the pupil diameter used for evaluation of the visual fatigue was discussed. As a result, there exists the positive relation between pupil diameter and the eyelid opening after long working hours.","PeriodicalId":6316,"journal":{"name":"2011 IEEE 2nd International Conference on Computing, Control and Industrial Engineering","volume":"60 1","pages":"9-12"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90893452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-01DOI: 10.1109/CCIENG.2011.6008080
Gao Chun-ming, Xu Si-yuan
The evolution of domain ontology and the extension of its boundary's make common-sense knowledge being a core support of the ontology research. To solve the problem of ontology construction in the multi-discipline field, we propose a method which takes common-sense knowledge in the dictionary as the source of ontology, and combines the method of ontology consruction based on the dictionary with the ontology expansion mechanism based on free text to construct Chinese common-sense ontology in this paper. And the experiment shows that the method can construct ontology semi-automatically.
{"title":"A method of Chinese common-sense ontology construction","authors":"Gao Chun-ming, Xu Si-yuan","doi":"10.1109/CCIENG.2011.6008080","DOIUrl":"https://doi.org/10.1109/CCIENG.2011.6008080","url":null,"abstract":"The evolution of domain ontology and the extension of its boundary's make common-sense knowledge being a core support of the ontology research. To solve the problem of ontology construction in the multi-discipline field, we propose a method which takes common-sense knowledge in the dictionary as the source of ontology, and combines the method of ontology consruction based on the dictionary with the ontology expansion mechanism based on free text to construct Chinese common-sense ontology in this paper. And the experiment shows that the method can construct ontology semi-automatically.","PeriodicalId":6316,"journal":{"name":"2011 IEEE 2nd International Conference on Computing, Control and Industrial Engineering","volume":"23 1","pages":"114-117"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91061859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-01DOI: 10.1109/CCIENG.2011.6008101
Feng He, Xia Huang, Lulu Li
While testing the software of communication network monitoring system, it is best to use real data to test the environment. However, in the lab environment, the resource is limited, and cannot mirror the data of real network totally. In order to fully complete test, we need to generate traffic following the real data that we captured in the real network to simulate the date in real network. Along with the development of network technology, XML plays an important role with its excellent characteristics in data exchange and data processing, in order to reuse the traffic in maximum and reduce work load, we adopt the XML scheme to generate traffic and we can change the information of the sus through XML file.
{"title":"XML solution for test data of communication network monitoring system","authors":"Feng He, Xia Huang, Lulu Li","doi":"10.1109/CCIENG.2011.6008101","DOIUrl":"https://doi.org/10.1109/CCIENG.2011.6008101","url":null,"abstract":"While testing the software of communication network monitoring system, it is best to use real data to test the environment. However, in the lab environment, the resource is limited, and cannot mirror the data of real network totally. In order to fully complete test, we need to generate traffic following the real data that we captured in the real network to simulate the date in real network. Along with the development of network technology, XML plays an important role with its excellent characteristics in data exchange and data processing, in order to reuse the traffic in maximum and reduce work load, we adopt the XML scheme to generate traffic and we can change the information of the sus through XML file.","PeriodicalId":6316,"journal":{"name":"2011 IEEE 2nd International Conference on Computing, Control and Industrial Engineering","volume":"7 1","pages":"200-203"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89670259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-01DOI: 10.1109/CCIENG.2011.6008144
Tong Jia
The bearing was the key part of asynchronous motors, and the bearings would be damaged with multi-degree modal from slightly to badly if they were used for a long time. This paper proposed a method for multi-degree damage modal identification of motors based on wavelet and neural networks. the vibration signals of asynchronous motor were considered to be researched, and the feature vectors were extracted by wavelet-packet transform, and the feature vectors were computed as the form of energy spectrum of the wavelet-packet coefficient, and combined with the classifying tool RBF neural networks for identification of many damaged modals of bearings for motors. The experiment results had proofed its' rationality and validity, and provided a new method for fault analysis and system identification of asynchronous motors.
{"title":"A new approach of multi-degree damage modal identification for motors","authors":"Tong Jia","doi":"10.1109/CCIENG.2011.6008144","DOIUrl":"https://doi.org/10.1109/CCIENG.2011.6008144","url":null,"abstract":"The bearing was the key part of asynchronous motors, and the bearings would be damaged with multi-degree modal from slightly to badly if they were used for a long time. This paper proposed a method for multi-degree damage modal identification of motors based on wavelet and neural networks. the vibration signals of asynchronous motor were considered to be researched, and the feature vectors were extracted by wavelet-packet transform, and the feature vectors were computed as the form of energy spectrum of the wavelet-packet coefficient, and combined with the classifying tool RBF neural networks for identification of many damaged modals of bearings for motors. The experiment results had proofed its' rationality and validity, and provided a new method for fault analysis and system identification of asynchronous motors.","PeriodicalId":6316,"journal":{"name":"2011 IEEE 2nd International Conference on Computing, Control and Industrial Engineering","volume":"1 1","pages":"382-385"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90406984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}