The Community for Technology Leaders
2010 11th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (2007)
Haier International Training Center, Qingdao, China
July 30, 2007 to Aug. 1, 2007
ISBN: 0-7695-2909-7
TABLE OF CONTENTS
Introduction

Organization Staff (PDF)

pp. xviii

Committee Members (PDF)

pp. xix-xxiii

Keynote 1 (PDF)

pp. xxiv

Keynote 2 (PDF)

pp. xxv
Papers

Research on Threshold Denoising of FPRGA (Abstract)

XinXiang Zhang , Henan University of Finance & Economics, China
MingYi Cui , Henan University of Finance & Economics, China
HuiChao Mi , Henan University of Finance & Economics, China
pp. 3-8

Study on Heuristic Algorithm for Dynamic Scheduling Problem of Earth Observing Satellites (Abstract)

Ju-fang Li , National University of Defense Technology, China
Yue-jin Tan , National University of Defense Technology, China
Jun-min Wang , National University of Defense Technology, China
pp. 9-14

Leveraging Single-user OpenOffice Writer for Collaboration by Transparent Adaptation (Abstract)

Haifeng Shen , Nanyang Techological University, Singapore
Suiping Zhou , Nanyang Techological University, Singapore
Chengzheng Sun , Nanyang Techological University, Singapore
pp. 15-20

Distributed, Integrated, and Collaborative Research Environment (DiCore): An Architectural Design (Abstract)

Hongjun Su , Armstrong Atlantic State University, USA
Ray Hashemi , Armstrong Atlantic State University, USA
Hong Zhang , Armstrong Atlantic State University, USA
pp. 21-26

Integrating Agents and Web Services into Cooperative Design Platform of Vehicle Headlights (Abstract)

Tingting Fu , Hangzhou Dianzi University, China
Yigang Wang , Hangzhou Dianzi University, China
Yehua Du , Zhejiang University, China
Peng Liu , Hangzhou Dianzi University, China
pp. 27-32

An Approach To QoS-Driven Engine For Spatial Knowledge Processing (Abstract)

Mingjun Xin , Shanghai University, China
Weihua Li , NWPU, China
Yingyong Chen , Shanghai University, China
Quan Qian , Shanghai University, China
pp. 33-38

Trusted Code Remote Execution through Trusted Computing and Virtualization (Abstract)

Huanguo Zhang , Wuhan University, China
Lu Chen , Wuhan University, China
Fei Yan , Wuhan University, China
Liqiang Zhang , Wuhan University, China
pp. 39-44

Research of Real-time Forecast Technology in Fault of Missile Guidance System Based on Grey Model and Data Fusion (Abstract)

Aihua Li , Xi'an Research Inst. Of High-Tech, China
Xinguo Wang , Xi'an Research Inst. Of High-Tech, China
Xiaogang Zhou , Xi'an Research Inst. Of High-Tech, China
Hualong Xu , Xi'an Research Inst. Of High-Tech, China
pp. 45-49

Comparison of Adaptive Receivers for DS-CDMA Systems (Abstract)

Sun Xu-bao , Shandong University of Science and Technology, China
Li Xu-jian , Shandong University of Science and Technology, China
pp. 50-53

A Shared-Path-Protection Based Heuristic Algorithm for the Capacity Placement Problem in Mesh Networks (Abstract)

Wei Xu , University of Electronic Science and Technology of China Chengdu, China
Xing-ming Li , University of Electronic Science and Technology of China Chengdu, China
pp. 54-59

A Mixed Shared and Multi Paths Protection Scheme with SRLG Constraints (Abstract)

Xing-Ming Li , University of Electronic Science and Technology of China Chengdu, China
Zong-Li Tang , University of Electronic Science and Technology of China Chengdu, China
pp. 60-65

Traffic Measurement Mechanisms for High Precision Internet Applications (Abstract)

Jin Liu , North China Electric Power University, China
Zhenqi Wang , North China Electric Power University, China
pp. 66-69

Dual-tree Complex Wavelets Transforms for Image Denoising (Abstract)

Yang Yang , Guilin Air Force Academy, China
Chen Bo , Information Engineering University of PLA, China
Shen Tianshuang , Guilin Air Force Academy, China
Geng Zexun , Information Engineering University of PLA, China
pp. 70-74

Application of the Rough Set to Image Median Denoising (Abstract)

Chen Bo , Information Engineering University of PLA, China
Yang Yang , Guilin Air Force Academy, China
Geng Zexun , Information Engineering University of PLA, China
Liu Xiaosong , Guilin Air Force Academy, China
pp. 75-78

A Novel Algorithm for Detecting Air Holes in Steel Pipe Welding Based on Hopfield Neural Network (Abstract)

Tang Nan , Xian Shiyou University, China
Mu Xiangyang , Xian Shiyou University, China
Gao Weixin , Xian Shiyou University, China
pp. 79-83

Design of a High-speed FPGA-based 32-bit Floating-point FFT Processor (Abstract)

Shengmei Mou , National University of Defense Technology, China
Xiaodong Yang , National University of Defense Technology, China
pp. 84-87

Research on the RAW Dependency in Floating-point FFT Processors (Abstract)

Xiaodong Yang , National University of Defense Technology, China
Shengmei Mou , National University of Defense Technology, China
pp. 88-92

Research on Data Encryption Technology Based on Chaos Theory (Abstract)

Fuyou Wang , Harbin Engineering University, China
Yanling Hao , Harbin Engineering University, China
Gannan Yuan , Harbin Engineering University, China
pp. 93-98

A Proxy Blind Signature Scheme Based on Elliptic Curve with Proxy Revocation (Abstract)

Luo Yong-An , Yanshan University, China
Tong Feng , Yanshan University, China
Zhang Feng , Nanchang University, China
Liu Wenyuan , Yanshan University, China
pp. 99-104

A Proactive Secure Multisecret Sharing Threshold Scheme (Abstract)

Feng Li , Shandong University, China
Daxing Li , Shandong University, China
Jianwei Shang , Shandong University, China
pp. 105-110

A Strong RSA Signature Scheme and Its Application (Abstract)

Zhengjun Cao , Shanghai University, China
Lihua Liu , Shanghai Maritime University, China
pp. 111-115

Key Management Based on Elliptic Curve Paillier Scheme in Ad Hoc Networks (Abstract)

Shuping Zhao , Dalian Fisheries University, China
Huaqun Wang , Dalian Fisheries University, China
Guoxing Jiang , Dalian Fisheries University, China
pp. 116-119

Risk Evaluation for Host System Based on Theory of Evidence (Abstract)

Li Chun-yan , Beijing Jiaotong University, China
Guo Yi-zun , Lenovo Corporate Research & Development, China
pp. 120-124

Research of Technology on Making Linux Interrupts Tasked (Abstract)

Zhao Hong-wei , Jilin University, China
Fang Ke-chi , Jilin University, China
Zang Xue-bai , Jilin University, China
pp. 125-128

An Immune Middleware for Embedded System (Abstract)

Wei Zheng , Beijing University of Aeronautics and Astronautics, China
Qun Sun , Beijing University of Aeronautics and Astronautics, China
Xiaofeng Meng , Beijing University of Aeronautics and Astronautics, China
pp. 129-134

Study on Modular Design-based Reconfigurable Embedded Network Numerical Control (Abstract)

J. H. Zhang , Wuhan University of Technology, China
Z. D. Zhou , Wuhan University of Technology, China
pp. 135-139

Applications of On-chip Trace on Debugging Embedded Processor (Abstract)

Shuming Chen , National University of Defense Technology, China
Xiao Hu , National University of Defense Technology, China
pp. 140-145

A class of SIR epidemic model with saturation incidence and age of infection (Abstract)

Xiaoyan Wang , Yuncheng University, China
Junyuan Yang , Yuncheng University, China
Fengqin Zhang , Yuncheng University, China
pp. 146-149

Profitless delays for permanence in a pure-delayed nonautonomous Lotka-Volterra competitive system with infinite delays and discrete delays (Abstract)

Xinzhu Meng , Shandong University of Science and Technology, China
Huidong Cheng , Shandong University of Science and Technology, China
Lansun Chen , Dalian University of Technology, China
pp. 150-153

Asymptotic Weighted Periodic Oscillations for Dynamic Systems Caused by Impulse and Time Delay (Abstract)

Huifeng Li , Qingdao Technological University, China
Jinliang Wang , Chinese Academy of Sciences, China
pp. 154-157

Existence of Three Solutions for a Fourth-order Two-point Boundary Value Problem (Abstract)

Jietao Zou , North China University of Technology, China
Jinsheng Liu , Taiyuan University of Technology, China
pp. 158-161

A Camera Calibration Strategy in the Video-based Traffic Information Detection (Abstract)

Yu Yuan , Beihang University, China
Jiang Dan , Beihang University, China
pp. 162-166

A Real-time Vision-based Vehicle Tracking and Traffic Surveillance (Abstract)

Zhi-fang Liu , SiChuan University, China
Zhisheng You , SiChuan University, China
pp. 174-179

Probabilistic Logic Operator based on Zero-order N/T-Norms Complete Clusters (Abstract)

Ping Wang , Laiyang Agricultural College, China
Haiyang Xu , Laiyang Agricultural College, China
Wenshan Cui , Laiyang Agricultural College, China
pp. 180-184

Improved Particle Swarm Optimization for Realistic Portfolio Selection (Abstract)

Wei Chen , Capital University of Economics and Business, China
Ling Yang , Capital University of Economics and Business, China
Fasheng Xu , Jinan University, China
pp. 185-190

An Improved Anisotropic Diffusion PDE for Noise Removal and Edge Preservation (Abstract)

Xiaomao Li , Chinese Academy of Sciences, China
Yandong Tang , Chinese Academy of Sciences, China
Zhifeng Wang , Chinese Academy of Sciences, China
pp. 191-195

A New Face Recognition Method Based on 2DWPCA (Abstract)

Hui-yuan Wang , Shandong University, China
Ke Han , Nanjing University of Posts and Telecommunications, China
Quan Feng , Nanjing University of Posts and Telecommunications, China
Xiu-chang Zhu , Nanjing University of Posts and Telecommunications, China
pp. 196-199

Multi-view Face Detection Based on the Enhanced AdaBoost Using Walsh Features (Abstract)

Zhibo Guo , Nanjing University of Science and Technology, China
Yunyang Yan , Nanjing University of Science and Technology, China; Huaiyin Institute of Technology, China
Jingyu Yang , Nanjing University of Science and Technology, China
pp. 200-205

Voice Conversion Using Canonical Correlation Analysis Based on Gaussian Mixture Model (Abstract)

ZhiHua Jian , Nanjing University of Post and Telecommunication, China
Zhen Yang , Nanjing University of Post and Telecommunication, China
pp. 210-215

The Design and Optimization of H.264 Encoder Based on the Nexperia Platform (Abstract)

Yin Zhongcheng , Chongqing Communication College, China
Hu Shaobin , Chongqing Communication College, China
Wang Lei , Chongqing Communication College, China
Zeng Xianwen , Chongqing Communication College, China
Li Zhengdong , Chongqing Communication College, China; University of Science and Technology of China, China
pp. 216-219

IR Image Based Eye Gaze Estimation (Abstract)

Zongcai Ruan , Southeast University, China
Dongshi Xia , Southeast University, China
pp. 220-224

ICA based Noise Subtraction for Linear System Identification in Additive Noisy Output (Abstract)

Ying Gao , Jilin University, China
Baojun Yang , Jilin University, China
Yue Li , Jilin University, China
pp. 225-228

A Topology Set Method for Vectorization (Abstract)

Jinhe Wang , Qingdao Technological University, China
pp. 229-234

Fast Correlation Tracking Method based on Circular Projection (Abstract)

Huajun Song , China University of Petroleum, China
Zunnian Liu , Qingdao Technological University, China
Weiwei Sheng , Qingdao Technological University, China
Meili Shen , Qingdao Technological University, China
pp. 235-238

LQRD: An Improved ECN Algorithm (Abstract)

Sui-li Feng , South China University of Technology, China
Wu Ye , South China University of Technology, China
Jun Lai , South China University of Technology, China
pp. 239-244

Overlay Network Testing by OpenDHT (Abstract)

Xun Duan , Guizhou University, China
Jian-Shi Li , Guizhou University, China
pp. 245-248

A Sufficient and Necessary Condition for the Absolute Consistency of XML DTDs (Abstract)

Hao ZhongXiao , Harbin Institute of Technology, China
Dai Ran , Shandong University of Science and Technology, China
Lu Yan , Harbin Institute of Technology, China
pp. 249-254

D-S Theory-based Trust Model FIRE^+ in Multi-agent Systems (Abstract)

Ping-Ping Lu , Yangzhou University, China
Mao-Lin Xing , Yangzhou University, China
Bin Li , Nanjing University, China
Liang Li , Yangzhou University, China
pp. 255-260

A Policy Language for Adaptive Web Services Security Framework (Abstract)

Bin Li , Nanjing University, China
Tong-Sheng Che , Yangzhou University, China
Liang Li , Yangzhou University, China
Jian-Xin Li , Yangzhou University, China
pp. 261-266

An Adaptive Stable Link Selection Algorithm for Mobile Ad Hoc Networks (Abstract)

Hui Zhang , Nanjing University of Posts and Telecomunications, China; Suzhou University, China; Nanjing University, China
Yu-ning Dong , University of Posts and Telecomunications, China; Suzhou University, China; Nanjing University, China
pp. 267-272

Detecting Compromised Nodes in Wireless Sensor Networks (Abstract)

Mary Mathews , Old Dominion University, USA
Sachin Shetty , Old Dominion University, USA
Min Song , Old Dominion University, USA
Rick McKenzie , Old Dominion University, USA
pp. 273-278

Secure Routing Protocol based Trust for Ad Hoc Networks (Abstract)

Shejie Lu , University of Science & Technology, China
Zhiyuan Liu , Huazhong University of Science & Technology, China; HuangShi Institute of Technology, China
Jun Yan , University of Science & Technology, China
pp. 279-283

Novel Scheme based on Ping-pong Effect for Predictive Fast Handovers for Mobile IPv6 (Abstract)

Hongmei Wang , He'nan Polytechnic University, China
Zongpu Jia , He'nan Polytechnic University, China
Huan Zhao , He'nan Polytechnic University, China
pp. 284-287

Optimal Cluster-Cluster Design for Sensor Network with Guaranteed Capacity and Fault Tolerance (Abstract)

Jun Wei , University of Naval Engineering, China
Tao Hu , University of Naval Engineering, China
Bin Zeng , University of Naval Engineering, China
pp. 288-293

A Distributed Trust-based Reputation Model in P2P System (Abstract)

Yu-mei Liu , University of Science and Technology of China Hefei, China
Liang-min Guo , University of Science and Technology of China Hefei, China
Lei-tao Guo , University of Science and Technology of China Hefei, China
Shou-bao Yang , University of Science and Technology of China Hefei, China
Wan-ming Chen , University of Science and Technology of China Hefei, China
pp. 294-299

A Feasible Key Management Scheme in Adhoc Network (Abstract)

Ya-Ping Chi , Beijing Electronic Science & Technology Institute, China
Ya-tao Yang , Beijing Electronic Science & Technology Institute, China
Yong Fang , Beijing Electronic Science & Technology Institute, China
Ping Zeng , Beijing Electronic Science & Technology Institute, China
pp. 300-303

Study and Implementation of a Improved Group Key Protocol for Mobile Ad Hoc Networks (Abstract)

Qiuna Niu , Qingdao University of Science & Technology, China
pp. 304-308

Hybrid Ontology Integration for Distributed System (Abstract)

Hong Bao , Beijing Union University, China
Hongzhe Liu , Beijing Union University, China
Ye Liang , Beijing Union University, China
pp. 309-314

Applying Multiple Classifier Systems to SoftMan?s Perception System (Abstract)

Aizhong Mi , University of Science and Technology Beijing, China; Henan Polytechnic University, China
Xuyan Tu , University of Science and Technology Beijing, China
Xuefeng Zheng , University of Science and Technology Beijing, China
pp. 315-320

OBSI: Object Based Storage System for Massive Image Databases (Abstract)

Lihua Yu , Zhejiang University, China
Yijun Bei , Zhejiang University, China
JinXiang Dong , Zhejiang University, China
Gang Chen , Zhejiang University, China
Feng Shao , Zhejiang University, China
pp. 321-326

Optimizing Network Configurations Based on Potential Profit Loss (Abstract)

Peidong Zhu , National University of Defense Technology, China
Meng Wang , Institute of Logistics Sciences of the PLA
Feng Zhao , National University of Defense Technology, China
Baosheng Wang , National University of Defense Technology, China
pp. 327-332

A Reputation System with Privacy and Incentive (Abstract)

Yang Bo , South China Agricultural University, China
Zhou Min , South China Agricultural University, China
Li Guohuan , National Laboratory for Modern Communications, China
pp. 333-338

The Research of ID Strategy Based on Antigen Presenting Principle and its Adaptability (Abstract)

Fu-Xiong Sun , Zhongnan University of Economics and Law, China
Tao Sun , Wuhan University, China
Ping Xiong , Zhongnan University of Economics and Law, China
pp. 339-344

An Improved Identity-based Fault-tolerant Conference Key Distribution Scheme (Abstract)

Yongquan Cai , Beijing University of Technology, China
Xiuying Li , Beijing University of Technology, China
pp. 345-349

Description of Key Performance Index States based on Cloud Theory and Weight Mean method for Multi-sensor (Abstract)

Yanfeng Jin , Lanzhou University of Technology, China
Qiuyu Zhang , Lanzhou University of Technology, China
Lei Sun , Lanzhou University of Technology, China
pp. 350-354

A Half Face Recognition Scheme (Abstract)

Tongyuan Huang , Chongqing Institute of Technology, China
Shidu Dong , Chongqing Institute of Technology, China
Qun Jiang , Chongqing Institute of Technology, China
Huaqiu Wang , Chongqing Institute of Technology, China
Bo He , Chongqing Institute of Technology, China
pp. 355-358

Algorithm for Tracking of Fast Motion Objects with Adaptive Mean Shift (Abstract)

Zhao-hua Hu , Dalian Maritime University, China; Nanjing University of Science & Technology, China
De-qun Liang , Dalian Maritime University, China
Guo-liang Wang , Dalian Maritime University, China
Yan-chun Wang , Dalian Maritime University, China
pp. 359-363

A Fractal Watermarking Scheme for Image in DWT Domain (Abstract)

Shu-Guo Yang , Qingdao University of Science & Technology, China
Rong-Sheng Xie , Xiamen University of Technology, China
Chun-Xia Li , Qingdao University of Science & Technology, China
Sheng-He Sun , Harbin Institute of Technology, China
pp. 364-368

New Texture Features Based on Wavelet Transform Coinciding with Human Visual Perception (Abstract)

Muwei Jian , Ocean University of China, China
Dawei Gao , Ocean University of China, China
Zuojuan Liang , Qingdao Hotel Management College, China
Junyu Dong , Ocean University of China, China
pp. 369-373

An Algorithm for SAR Image Embedded Compression Based on Wavelet Transform (Abstract)

Wang Shuang , Xidian University, China
Li Kun , Xidian University, China
Jiao Licheng , Xidian University, China
Hou Biao , Xidian University, China
pp. 374-378

An Effective Method To Improve kNN Text Classifier (Abstract)

Xiulan Hao , Fudan University, China
Xiaopeng Tao , Fudan University, China
Chenghong Zhang , Fudan University, China
Yunfa Hu , Fudan University, China
pp. 379-384

A Novel SVM Decision Tree and its application to Face Detection (Abstract)

Gong-gui Wang , Hefei University of Technology, China
Jian-qing Sun , Hefei University of Technology, China
Shou-yi Li , Hefei University of Technology, China
Qiong Hu , Hefei University of Technology, China
pp. 385-389

Research on Technologies of Spatial Configuration Information Retrieval (Abstract)

Haibin Sun , Shandong University of Science and Technology, China
Xin Chen , Shandong University of Science and Technology, China
pp. 396-401

A Multi-object Motion-tracking Method for Video Surveillance (Abstract)

Yu Yuan , Beihang University, China
Jiang Dan , Beihang University, China
pp. 402-405

Oscillation Criteria of Second-Order Delay Dynamic Equations on Time Scales (Abstract)

Zhenlai Han , University of Jinan, China; Naval Aeronautical Engineering Institute, China
Shurong Sun , University of Jinan, China; Shandong Jianzhu University, China
pp. 406-411

Existence of Positive Solutions for Boundary Value Problems on a Measure Chain with a Parameter (Abstract)

Fang Mi , Taiyuan Teachers College, China
Huting Yuan , Shaxi Datong University, China
pp. 412-416

Clever Uses of Matrices for Neutral Delay Difference Systems (Abstract)

Bao Shi , Naval Aeronautical Engineering Institute, China
Guang Zhang , Tianjin University of Commerce, China
pp. 417-421

A Model for Tuberculosis with Various Latent Periods (Abstract)

Xiao-wen Li , Chinese Academy of Sciences, China
Zhong-wei Jia , Beijing University of Posts and Telecommunications, China; Beijing Institute of Microbiology and Epidemiology, China
Wu-chun Cao , Beijing Institute of Microbiology and Epidemiology, China
Dan Feng , Beijing Institute of Microbiology and Epidemiology, China
Zhen Jin , North University of China, China
pp. 422-425

Multi-Connection Mechanism of Mobile Agent in Grid (Abstract)

Wengang Cheng , North China Electric Power University, China
Zhirou Zhang , North China Electric Power University, China
Dawei Dong , North China Electric Power University, China
pp. 426-430

Using Trust and Reputation Information to Choose Both Request Responders and Servers in Peer-to-Peer Networks (Abstract)

Zhijie Ban , Beijing Institute of Technology, China; Inner Mongolia University, China
Zhimin Gu , Beijing Institute of Technology, China; Inner Mongolia University, China
Yu Jin , Beijing Institute of Technology, China; Inner Mongolia University, China
pp. 431-436

Communication Optimization on Automatic Program Parallelization (Abstract)

Li Dong-Hong , National Digital Switching System Engineering & Technology Research Center, China
Zhao Rong-Cai , National Digital Switching System Engineering & Technology Research Center, China
Ma Zhuo-Jie , National Digital Switching System Engineering & Technology Research Center, China
Dong Chun-Li , National Digital Switching System Engineering & Technology Research Center, China
pp. 437-442

A New Clustering Algorithm Based on Token Ring (Abstract)

Zhongying Zhao , Shandong University of Science and Technology, China
Yongquan Liang , Shandong University of Science and Technology, China
Jiancong Fan , Shandong University of Science and Technology, China
pp. 443-446

Feature Extraction by Foley-Sammon Transform with Kernels (Abstract)

Zhenzhou Chen , South China Normal University, China
pp. 453-457

Processing Global Nearest Neighbor Query (Abstract)

Liu Xiaofeng , Huazhong University of Science and Technology, China
Chen Chuanbo , Huazhong University of Science and Technology, China
Liu YunSheng , Huazhong University of Science and Technology, China
pp. 458-462

Quantum signature based on quantum one-way map and the stabilized quantum code (Abstract)

Yutao Zhang , Laiyang Agriculture College, China
Ying Guo , Central South University, China
Wenshan Cui , Laiyang Agriculture College, China
pp. 463-466

Perfect Concurrent Signature Protocol (Abstract)

Rufen Huang , Zhangzhou Normal University, China
Xuanzhi Lin , Zhangzhou Normal University, China
Zhenjie Huang , Zhangzhou Normal University, China; Chinese Academy of Sciences, China
pp. 467-472

ID-Based Threshold Signature and Mediated Signature Schemes (Abstract)

Yong Yu , Xidian University, China
Bo Yang , South China Agricultural University, China
Ying Sun , South China Agricultural University, China
pp. 473-478

An Encryption solution in Digital Trunking System (Abstract)

Wei Chongyu , Qingdao University of Science and Technology, China
Wang Chengjin , Qingdao University of Science and Technology, China
Zhou Chunlin , Hisense Group
pp. 479-482

A Practical Digital Watermarking Protocol Based On PKI-CA (Abstract)

Dali Zhu , Huazhong University of Science and Technology, China
Xiaosu Chen , Huazhong University of Science and Technology, China
Jian Liu , Wuhan University, China
pp. 483-488

Research of Asynchronous Communication Messaging Model Based on Time Decoupling in Distributed Object-Oriented Middleware (Abstract)

Shangwang Bai , Taiyuan University of Science and Technology, China
Yinzhang Guo , Taiyuan University of Science and Technology, China
Yanhong Zhao , Taiyuan University of Science and Technology, China
pp. 489-493

Research on Ontology-based Representation and Retrieval of Components (Abstract)

Long Yihong , Wuhan University of Technology, China
Jin Xinjuan , Wuhan University of Technology, China
Liu Quan , Wuhan University of Technology, China
pp. 494-499

Component-based Approach to Develop Integrated Diagnostic Platform (Abstract)

Chen Xiaomei , Beijing University of Aeronautics and Astronautics, China
Zhong Bo , Beijing University of Aeronautics and Astronautics, China
Ji Hong , Beijing University of Aeronautics and Astronautics, China
Meng Xiaofeng , Beijing University of Aeronautics and Astronautics, China
pp. 500-504

Domain-Analysis in Software Reuse - Application in Warehouse Management (Abstract)

Youxin Meng , Qingdao University of Science and Technology, China
Aiguang Young , Qingdao University of Science and Technology, China
Kun Shao , Webster University, USA
Xianwei Wang , Qingdao University of Science and Technology, China
pp. 505-510

A service-oriented methodology supporting automatic synthesis and verification of component behavior model (Abstract)

Yu Zhou , Southeast University, China
Pengcheng Zhang , Southeast University, China
Bixin Li , Southeast University, China
pp. 511-516

Research on Mobile IP Routing of Space Network that Based on IP over CCSDS (Abstract)

Shu-qian Liu , PLA NO.63999, China
Sheng-bo Hu , CAS, China
Xin Meng , CAS, China
Li-zheng Jiang , CAS, China; Graduate University of Chinese Academy of Science, China
pp. 517-520

Mobile-Agent-Based Information-Driven Multiresolution Algorithm for target tracking in Wireless Sensor Networks (Abstract)

Hu Haifeng , Nanjing University of Posts and Telecommunications, China
Yang Zhen , Nanjing University of Posts and Telecommunications, China
pp. 521-525

Energy-Efficient Power Control Game for Cognitive Radio Systems (Abstract)

Shilun Cheng , Nanjing University of Posts and Telecommunications, China
Zhen Yang , Nanjing University of Posts and Telecommunications, China
pp. 526-530

A New Algorithm for Weighted Proportional Fairness Based Spectrum Allocation of Cognitive Radios (Abstract)

Yang Zhen , Nanjing University of Posts and Telecommunications, China
Tian Feng , Nanjing University of Posts and Telecommunications, China
pp. 531-536

Research on User Applying Mode for Video Conference System (Abstract)

Jianfeng Zou , China University of Geosciences, China
Libin Zhang , China University of Geosciences, China
Xuezhi Tao , China University of Geosciences, China
Qun Wang , China University of Geosciences, China
Yuqing Zhang , China University of Geosciences, China
pp. 537-542

Voice Conversion Adopting SOLAFS (Abstract)

Lei Zhao , Qingdao Technological University, China
Yinqiu Gao , Nanjing University of Posts and Telecommunications, China
pp. 543-548

An RBF Network Based Beamformer for Mimo Wireless Communication Systems (Abstract)

Ling Zhang , Tsinghua University, China
X. Z. Zhang , Qingdao University, China
pp. 549-552

Lossless Compression of Hyperspectral Imagery Using Integer Principal Component Transform and 3-D Tarp Coder (Abstract)

Xin Luo , Northwestern Polytechnical University
Lei Guo , Northwestern Polytechnical Universit
Zhen Liu , University of Electronic Science and Technology of China
pp. 553-558

Segmentation and Recognition of Marrow Cells Image Based on Wavelet and Genetic Cluster (Abstract)

Pei Xichun , Inner Mongolia Agricultural University, China
Zhang Wei , HuNan University of Technology, China
Hou Zhenjie , Inner Mongolia Agricultural University, China
Ma Shuoshi , Inner Mongolia Agricultural University, China
pp. 559-563

Multi-Issue Negotiation Research Based On Niched Co-evolutionary Genetic Algorithm (Abstract)

Yong-quan Liang , Shandong University of Science and Technology, China
Yong Yuan , Shandong University of Science and Technology, China
pp. 564-569

A Hybrid Multi-objective Evolutionary Algorithm and Its Application in Component-based Product Design (Abstract)

Hong Liu , Shandong Normal University, China
Xiangwei Zheng , Shandong Normal University, China
Huichuan Duan , Shandong Normal University, China
pp. 570-575

Genetic Algorithm-based Study on Flow Allocation in a Multicommodity Stochastic-flow Network with Unreliable Nodes (Abstract)

Qiang Liu , Shandong Normal University, China
Xiaoxian Ma , Shandong Normal University, China
Qingzhen Zhao , Shandong Normal University, China
Hailin Zhang , Shandong Provincial Geo-mineral Engineering Exploration Institute, China
pp. 576-581

A New Hybrid Genetic Algorithm for the Stochastic Loader Problem (Abstract)

Pei-xin Zhao , Shandong University, China
Wang Hong , Shandong Institute of Light Industry, China
pp. 582-586

Chaotic Time Series Prediction Based on Radial Basis Function Network (Abstract)

Xiao Hongfei , Hangzhou Dianzi University, China
Ding Tao , Zhejiang Institute of Hydraulics and Estuary, China
pp. 595-599

Study of Ontology-based Semantic Matching of Model Function System (Abstract)

Qi-jia Tian , Shandong University of Science and Technology, China
Yong-quan Liang , Shandong University of Science and Technology, China
Hong-mei Zhu , Shandong University of Science and Technology, China; Shandong Agricultural University, China
Wen-juan Lian , Shandong University of Science and Technology, China
Yong Zhang , Shandong University of Science and Technology, China; Tai Shan Medical College, China
pp. 600-604

Self-Adaptive PD Control of Robot Manipulator (Abstract)

Ge Dongyuan , Shaoyang College, China
Jiang Shousheng , Shaoyang College, China
pp. 605-610

A Novel Strategy of Coalition Evolvement Based on Interest (Abstract)

Xiang Yin , Hefei University of Technology, China
Jianguo Jiang , Hefei University of Technology, China
Na Xia , Hefei University of Technology, China
pp. 611-615

Particle Swarm Optimization with Adaptive Parameters (Abstract)

Dongyong Yang , Zhejiang University of Technology, China
Jinyin Chen , Zhejiang University of Technology, China
Naofumi Matsumoto , Ashikaga Institute of Technology, Japan
pp. 616-621

A Study about the Mapping of Process- Processor based on Petri Nets (Abstract)

Zhicai Xu , Chuzhou University, China
Xianwen Fang , Anhui University of Science and Technology, China
Zhixiang Yin , Anhui University of Science and Technology, China
pp. 622-626

A Task Scheduling Algorithm of Single Processor Parallel Test System (Abstract)

Minghu Zou , Army of 65185, China
Jiajing Zhuo , College of Ordnance Engineering, China
Chen Meng , College of Ordnance Engineering, China
pp. 627-632

Research of multi-factors heuristics tasks scheduling model and its algorithms in grid environment (Abstract)

Cun-Chen Gao , Ocean University of China, China
Xian-Wu Zeng , Ocean University of China, China; Qingdao University of Science and Technology, China
Shu-Ping Bao , Qingdao University of Science and Technology, China
pp. 633-639

DYFARS: Boosting Reliability in Fault-Tolerant Heterogeneous Distributed Systems Through Dynamic Scheduling (Abstract)

Gang Tu , HuaZhong University of Science and Technology, China
Wei Luo , HuaZhong University of Science and Technology, China
LiPing Pang , HuaZhong University of Science and Technology, China
JunLin Li , Wuhan Digital Engineering Institute, China
FuMin Yang , HuaZhong University of Science and Technology, China
Lin Shu , HuaZhong University of Science and Technology, China
pp. 640-645

A Cluster-Based and Routing Balanced P2P Lookup Protocol (Abstract)

Ming Chen , China University of Petroleum, China
Yang Lu , China University of Petroleum, China
pp. 646-651

On Path-length and Routing-tag Algorithm for Hybrid Irregular Multi-stage Interconnection Networks (Abstract)

Vivek Kumar Sehgal , Jaypee University of Information Technology, India
Nitin , Jaypee University of Information Technology, India
Kunal Krishna , Jaypee University of Information Technology, India
Nakul Sharma , Jaypee University of Information Technology, India
Abhishek Bhatia , Jaypee University of Information Technology, India
pp. 652-657

Multiple Moving Prey Pursuit Algorithm Based on the Changeable Alliance (Abstract)

Yue-hai Wang , North China University of Technology, China
Meng-meng Zhang , North China University of Technology, China
pp. 658-662

Towards Quantitative Evaluation of UML based Software Architecture (Abstract)

Yun Zhao , Qingdao University, China
Zhenbo Guo , Qingdao University, China
Jinhua Li , Qingdao University, China
Ruijuan Pang , Qingdao University, China
Zhenhua Zhang , Qingdao University, China
pp. 663-669

Formalization of Architecture-Centric Model Mapping Using Category Theory (Abstract)

Jinkui Hou , Shandong University, China
Shuaiqiang Wang , Shandong University, China
Jiancheng Wan , Shandong University, China
pp. 670-675

Modeling and Practice on Component Based Software Design - a Case Study (Abstract)

Shushuang Man , Southwest Minnesota State University, USA
Peter O'Keefe , Trent University, Canada
Wenying Feng , Trent University, Canada
pp. 676-681

A Dynamic Reconfigurable Adaptive Software Architecture for Federate in HLA-based Simulation (Abstract)

Yang Hu , Northwestern Polytechnical University, China
Chen Hang , Northwestern Polytechnical University, China
pp. 682-687

Automatic Performance Evaluation of Palmprint Recognition (Abstract)

Zhenyu Qi , Nankai University, China
Jing Xu , Nankai University, China
pp. 688-693

Toward a Formalization of UML2.0 Metamodel using Z Specifications (Abstract)

Ahmed M. Mostafa , Helwan University, Egypt
E. M. Saad , Helwan University, Egypt
Manal A. Ismail , Helwan University, Egypt
Hatem EL-Bolok , Helwan University, Egypt
pp. 694-701

On Testing Multi-threaded Java Programs (Abstract)

Xufang Gong , Southeast University, China
Ying Zhou , Southeast University, China
Yanchen Wang , Southeast University, China
Bixin Li , Southeast University, China
pp. 702-706

Software Program Cohesion Notion Apply to Evaluating Product Process Assignment (Abstract)

Wenjian Liu , Harbin Institute of Technology, China
Fusheng Qiu , Harbin Institute of Technology, China
pp. 707-712

Image Fusion Based on Wavelet Transform (Abstract)

Junyu Dong , Ocean University of China
Muwei Jian , Ocean University of China
Yang Zhang , Qingdao Hotel Management College, China
pp. 713-718

Research on RAIM Algorithm under the Assumption of Simultaneous Multiple Satellites Failure (Abstract)

Zhang Qiang , Beijing University of Aeronautics and Astronautics, China
Chang Xiaoming , Beijing University of Aeronautics and Astronautics, China
Zhang Xiaolin , Beijing University of Aeronautics and Astronautics, China
pp. 719-724

Subframe Interpolation Optimized Coding of LSF Parameters (Abstract)

Linliang Chen , Zhejiang University, China
Kuang Wang , Zhejiang University, China
Yanping Yu , Zhejiang University, China
pp. 725-728

Region-based Image Fusion Using Energy Estimation (Abstract)

Zhang Yingjie , Xi'an Jiaotong University, China
Ge Liling , Xi'an University of Technology, China
pp. 729-734

A Hierarchical Segmentation Algorithm Based on Mumford and Shah Model (Abstract)

Zhang Yingjie , Xi'an Jiaotong University, China
Ge Liling , Xi'an University of Technology, China
pp. 735-740

A Synchronous Detection of the Road Boundary and Lane Marking for Intelligent Vehicles (Abstract)

Qingzhu Wang , Hebei Normal University of Science & Technology, China
Haifang Wang , Hebei Normal University of Science & Technology, China
Weina Lu , Hebei Normal University of Science & Technology, China
pp. 741-745

An Event Correlation Synchronization Algorithm for MMOG (Abstract)

Zhou Xing-hai , Liaoning University, China
Liu Fang , Liaoning University, China
Du Ling , Liaoning University, China
Xing Yuan-sheng , Liaoning University, China
Xiang-bin Shi , Shenyang Institute of Aeronautical Engineering, China
pp. 746-751

One Solution for Accurate Collision Detection in Virtual Assembly Environment (Abstract)

Zheng Yi , Shandong Academy of Sciences, China
Wang Yanfeng , Shandong University of Science and Technology, China
pp. 752-757

Reducing the Dimensionality of Feature Vectors for Texture Image Retrieval Based on Wavelet Decomposition (Abstract)

Junyu Dong , Ocean University of China
Muwei Jian , Ocean University of China
Shengke Wang , Ocean University of China
Dawei Gao , Qingdao Hotel Management College, China
pp. 758-763

Combining Color, Texture and Region with Objects of User's Interest for Content-Based Image Retrieval (Abstract)

Muwei Jian , Ocean University of China
Junyu Dong , Ocean University of China
Ruichun Tang , Ocean University of China
pp. 764-769

Parallel Particle Swarm Optimization for Attribute Reduction (Abstract)

Fengming Zhang , Air Force Engineering University, China
Lei Xu , Air Force Engineering University, China
pp. 770-775

Multidimensional Fuzzy Interpolative Reasoning Method Based on \lambda-Width Similarity (Abstract)

Yan Shi , Kyushu Tokai University, Japan
Baowen Wang , Yan Shan University, China
Qingda Zhang , Yan Shan University, China
Wenyuan Liu , Yan Shan University, China
pp. 776-781

SOSRA: Sewice-Oriented Semantic Representation Architecture (Abstract)

Lin Zhang , Wuhan Polytechnic University, China
pp. 782-787

Research of Information Fusion Evaluation Methodology Based on Dominance Relation (Abstract)

Jie Lin , East China University of Science and Technology, China
Weichang Wu , Shanghai Institute of Technology, China
Yunxiang Liu , Shanghai Institute of Technology, China; East China University of Science and Technology, China
pp. 788-793

A Design for an Online RSS Reader Based On AJAX (Abstract)

Yi Yu , Wuhan University of Technology, China
Shishi Huang , Wuhan University of Technology, China
Luo Zhong , Wuhan University of Technology, China
Peng Liu , Wuhan University of Technology, China
pp. 794-798

An Off-Line Divisible E-Cash Scheme Based on Smart Card (Abstract)

Liu Wen-yuan , Yanshan University, China
Wang Bao-wen , Yanshan University, China
Luo Yong-an , Yanshan University, China
Si Ya-li , Yanshan University, China
Li Feng , Yanshan University, China
pp. 799-804

Information Usage System by Static Portal Page (Abstract)

Kazuya Odagiri , Aichi Institute of Technology, Japan
Masaharu Tadauchi , Toyota Technological Institute, Japan
Rihito Yaegashi , Shibaura Institute of Technology, Japan
Naohiro Ishii , Aichi Institute of Technology, Japan
pp. 805-811

Study and Application of Web-based Data Mining in E-Business (Abstract)

Lili Xing , Hebei University of Engineering, China
Yanguang Shen , Hebei University of Engineering, China
Yiting Peng , National Natural Science Foundation of China
pp. 812-816

Credit based Fairness Control in Wireless Sensor Network (Abstract)

Xiangke Liao , National University of Defense Technology, China
Shanshan Li , National University of Defense Technology, China
Peidong Zhu , National University of Defense Technology, China
Jie Jiang , National University of Defense Technology, China
Shaoliang Peng , National University of Defense Technology, China
pp. 817-822

An Efficient Clustering-Based Method for Data Gathering and Compressing in Sensor Networks (Abstract)

Jianzhong Li , Harbin Institute of Technology, China
Jinbao Li , Heilongjiang University, China
Qianqian Ren , Heilongjiang University, China
pp. 823-828

Throughput Performance of Marine STDMA Ad-hoc Network (Abstract)

Huafeng Wu , Fudan University; Shanghai Maritime University, China
Chuanshan Gao , Fudan University
Qiang Zhou , Fudan University
Haiguang Chen , Fudan University
pp. 829-834

A QoS Multicast Routing Algorithm for Wireless Mesh Networks (Abstract)

Nianshen Chen , Hubei Normal University, China
Qiang Sun , Wuhan University of Technology, China
Zongwu Ke , Wuhan University of Technology, China; Hubei Normal University, China
Layuan Li , Wuhan University of Technology, China
pp. 835-840

Space-Time Codes Based on Bit-Interleaved Quasi-Super-Orthogonal Designs (PDF)

Li Zhengquan , Yangzhou University, China
Pan Libing , Yangzhou University, China
pp. 841-842

Segmentation of Color Images Using Multi-FART Network (Abstract)

Ma Guobing , Qingdao Technological University, China
Dou Yiwen , Anhui University of Technology and Science, China
pp. 843-847

A Lloyd-Max-based Non-Uniform Quantization Scheme for Distributed Video Coding (Abstract)

Fang Sheng , Shandong University of Science and Technology, China
Li Xu-Jian , Shandong University of Science and Technology, China
Zhang Li-Wei , Shandong University of Science and Technology, China
pp. 848-853

Region-based Image Fusion by Using Region Priorities (Abstract)

Zhang Yingjie , Xi'an Jiaotong University, China
Ge Liling , Xi'an University of Technology, China
pp. 854-859

Improved Approach of Seed Point Selection in RPCCL Algorithm for Aerial Remote Sensing Hyper-spectral Data Clustering with Data Dimensionality Reduction (Abstract)

Junna Cheng , Ocean University of China
Guangrong Ji , Ocean University of China
Xuefeng Liu , Ocean University of China
Wencang Zhao , Qingdao University of Science & Technology, China
pp. 860-865

A New Type of Proxy Ring Signature Scheme with Revocable Anonymity (Abstract)

Daxing Li , Shandong University, China
Chengyu Hu , Shandong University, China
pp. 866-868

Ring Blind Signature Scheme (Abstract)

Daxing Li , Shandong University, China
Chengyu Hu , Shandong University, China
pp. 869-871

Attack scenario construction with a new sequential mining technique (Abstract)

Lei Jie , Huazhong University of Science and Technology, China
Wang Li , Huazhong University of Science and Technology, China
Li Zhi-tang , Huazhong University of Science and Technology, China
Li Dong , Huazhong University of Science and Technology, China
pp. 872-877

Design and implementation of a personal firewall Based on NDIS Intermediate Drivers (Abstract)

He Chaokai , Nanjing University of Posts & communications, China
pp. 878-882

Efficient Identity-based Signature Scheme with Partial Message Recovery (Abstract)

Huiyan Chen , Graduate School of Chinese Academy of Sciences, China; Beijing Electronic Science and Technology Institute, China
Yong Li , Graduate School of Chinese Academy of Sciences, China
pp. 883-888
Author Index

Author Index (PDF)

pp. 889
102 ms
(Ver 3.1 (10032016))