Volume 10 Issue 2 April 2012


Research and Practice of Characteristic Teaching Resources Sharing and Interactive Platform

Wu Yun

https://doi.org/

Abstract By using advanced cloud computing, virtualization and distributed video load balance technology, the paper constructs an interactive platform which shares the teaching resources. On the one hand it provides a beyond time and space, free and equal interactive teaching and learning platform for the teachers and students. On the other hand it offers teaching resources Networked storage, utilization, communication and... Read More


CMCCR: Classification Based on Multiple Class-Correlation Rules

Zhongmei Zhou, Xuejun Wang, Guiying Pan

https://doi.org/

Abstract Previous studies show that associative classification achieves higher classification accuracy than traditional classification approaches. However, associative classification suffers from two major deficiencies and thus sometimes has lower classification accuracy. First, it often generates a large number of rules when the minimum support is set to be low. It is not only time consuming to discover so many itemsets, but also... Read More


Review on Virtual Human's Affective Model and Related Applied Algorithm

Zhao Liang

https://doi.org/

Abstract The artificial intelligence simulation with virtual humans in virtual environment is considered as a research focus after movement simulation in field of artificial intelligence and simulation with virtual human include affective model and influence of affection to movement planning of virtual human. It's necessary to review on virtual human's affective model and related applied algorithm. A* algorithm is the main... Read More


SERCID: A Secure Mechanism for Data Collection in Wireless Sensor Networks

Yuxin Mao

https://doi.org/

Abstract The unattended nature of wireless sensor networks makes them very vulnerable to malicious attacks. An adversary can physically compromise a subset of sensor nodes in a wireless sensor network to eavesdrop information. Due to some intrinsic features of wireless sensor network, it is difficult to perform efficient intrusion detection against malicious nodes in such a resource-restricted environment. In this paper,... Read More


Mechanism Analysis of Protocols Based on the FPCPN Model

Wei Wang

https://doi.org/

Abstract Focusing on the protection of privacy and non- publicity of special networks, the CPN model is extended to PCPN by the protocol factor and the formal model. The FPCPN (Formal Protocol Colored Petri Net) is presented to analyze the operation mechanism of protocols. It is introduced by four steps, such as the whole structure, the network element conversion, the conditions... Read More


A Feature Points Matching Algorithm Based on Wavelet Analysis

Wang Lijun, Xu Xin, Xu Guang

https://doi.org/

Abstract In this paper, we present an application of wavelet analysis on feature points matching. Wavelet coefficients which produced by wavelet transform can best display part character of the image. Through the new feature description and feature matching method, we can build a feature point database for each image and improve the efficiency of feature points matching. The experimental results show... Read More


An Equivalent Circuit Model for On-chip Inductors with Gradual Changed Structure

Xi Li, Zheng Ren, Yanling Shi

https://doi.org/

Abstract Inductor with gradual changed metal width and space by good design can get better Q factor than the inductor with fixed metal width and space. In this paper, a simple wide-band inductor model is presented considering both the increase of resistance and the decrease of inductance due to the skin and proximity effects. This model has been verified with simulation... Read More


Story Segmentation of Xinwenlianbo based on Three-level Criterion of Content Analysis

Ji-chen Yang

https://doi.org/

Abstract To detect the story boundary (SB) of Xinwenlianbo precisely, this paper proposes a method of three-level criterion story segmentation (SS) based on content analysis. For the story with anchorperson, this paper uses penny distance to judge whether the anchorperson gotten by video feature is true or not to look for SB; for the story without anchorperson, this paper looks for... Read More


A Taxonomic relationship Learning Approach for Log Ontology Content Event

Sun Ming, Shang Qinghong, Chen Bo

https://doi.org/

Abstract To construct the log ontology is one of the main tasks of semantic Web usage mining. In order to discover the hierarchy of users visit interesting for web sites, we propose a taxonomic relationship learning approach for content events on log ontology. In this method, event is used to express the users visiting action, and content event is the semantic... Read More


Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks

Chang Su, Lili Zheng, Xiaohai Si, Fengjun Shang

https://doi.org/

Abstract At present, Mobile Ad Hoc Networks (MANET) have become a hot research field, in view that the mobile nodes have the characteristics of mobility, limited energy, limited storage space and so on. Thus to design a simple and high-efficiency routing protocol is an important issue. AODV routing protocol can resolve the routing problem of Mobile Ad Hoc Networks, but it... Read More


A Constrained Optimization Evolutionary Algorithm Based on Membrane Computing

Haizhu Chen, Jianyun Lu

https://doi.org/

Abstract Based on membrane computing (MCCOP for short), a constrained optimization evolutionary algorithm is proposed with the evolutionary operations and strategies designed. In MCCOP, a membrane is associated with a constraint and the tentative solutions evolved according to the rules in the membrane. And it is evaluated by the constraint function value as the fitness. The subpopulations can communicate efficiently during... Read More


A Comparison of Pattern Classification Approaches for Structural Damage Identification

Zhou Qingqing, Zhou Qifeng, Ning Yongpeng, Yang Fan , Lei Jiayan,Tian Run,Liu Minda

https://doi.org/

Abstract A structural damage identification approach based on wavelet packet decomposition (WPD) and random forests (RF) was proposed and compared with other pattern classification approachs. The main procedure involves extracting energy features from vibration acceleration data through wavelet packet decomposition and then using these features as input for a RF classifier. The experiment was carried on an 8-storey steel shear building... Read More


Semantic-Oriented Integration and Simulation-based Analysis Approach for Healthcare Information Systems (HIS)

Li-li SONG, Jun XIE, Zheng-dong HUANG

https://doi.org/

Abstract According to the unsystematic state of current health information systems integration and aiming to improve semantic interoperability, the approach for health information systems under SOA is studied in detailed. As for the system engineering, the concept of HIS integration is discussed. After that, a SOA-based health information system architecture and MDA-based modeling and simulation analysis approach are explored. Finally, a... Read More


Research on Face Recognition Based on Wavelet Transform and PCA-ANN

Wang Yuanzhi, Luo Xiao

https://doi.org/

Abstract By using advanced cloud computing, virtualization and distributed video load balance technology, the paper constructs an interactive platform which shares the teaching resources. On the one hand it provides a beyond time and space, free and equal interactive teaching and learning platform for the teachers and students. On the other hand it offers teaching resources Networked storage, utilization, communication and... Read More


Research and Analysis of Improved Extraction Based on Information Processing Technology

Yongqin Wei, Yinjing Guo

https://doi.org/

Abstract This paper analyzes the problem of research topics. The key words are extracted from the academic papers published in the key journals based on information processing technology, and these words have the cooccurrence relationship between clustered. Research topics in the academic field analysis applications, researchers can provide a clear outline; in the information retrieval process, you can help clarify the... Read More


Exploration in to Reform in Computer Application Technology Major in Higher Vocational Colleges Based on Tripartite Linkage

Tian Qiming

https://doi.org/

Abstract It has become an important subject to reform Computer Application Technology (CAT) major in higher vocational colleges against the backdrop of fierce competition. Firstly, this paper analyzes the prevailing problems in this major and their causes. Secondly, this paper proposes that reform in CAT major can only be realized based on the tripartite linkage of industry, enterprise and college. Thirdly,... Read More