2010 Third International Symposium on Intelligent Information ... · EstimatingTyphoonRainfall...

13
2010 Third International Symposium on Intelligent Information Technology and Security Informatics (IITSI 2010) Jian, China 2-4 April 2010 Editors: Fei Yu Haiwen Liu Roy Ng Xuange Peng Jian Shu 4 IEEE IEEE Catalog Number: CFP1007G-PRT ISBN: 978-1-4244-6730-3 TIBAJB Hannover

Transcript of 2010 Third International Symposium on Intelligent Information ... · EstimatingTyphoonRainfall...

Page 1: 2010 Third International Symposium on Intelligent Information ... · EstimatingTyphoonRainfall overSeafrom SSM/ISatellite DataUsing a Back-PropagatedNetwork 263 Wen-Huan Chine, Hsiao-Ping

2010 Third International

Symposium on IntelligentInformation Technology and

Security Informatics

(IITSI 2010)

Jian, China

2-4 April 2010

Editors:

Fei Yu

Haiwen Liu

Roy Ng

Xuange PengJian Shu

4 IEEE IEEE Catalog Number: CFP1007G-PRT

ISBN: 978-1-4244-6730-3

TIBAJB Hannover

Page 2: 2010 Third International Symposium on Intelligent Information ... · EstimatingTyphoonRainfall overSeafrom SSM/ISatellite DataUsing a Back-PropagatedNetwork 263 Wen-Huan Chine, Hsiao-Ping

Third International Symposiumon Intelligent Information

Technology and SecurityInformatics

ViMtiifMM^^

IITSI2010

Table of Contents

Message from the IITSI 2010 Symposium Chairs xvii

IITSI 2010 Organizing Committee xviii

IITSI Committee Members xix

IITSI 2010 Technical Papers

Skin Segmentation Based on Double-Models 3

Hao-kui Tang and Zhi-quan Feng

A Small World Network Based Grid Resource Discovery Mechanism 8

Weichun Huang, Min Chen, andJian Liu

Adaptive Hybrid Function Projective Synchronization for Two Different

Chaotic System with Uncertain Parameters 12

Chengrong Xie and Yuhua Xu

A Quay Crane Assignment Approach for Berth Allocation Problem

in Container Terminal 17

Zhi-Hua Hit

Performance Analysis of an Improved Single Neuron Adaptive PID Control 22

Wu Wang and Zheng-min Bai

A Mixture Conjugate Gradient Method for Unconstrained Optimization 26

Hailin Liu

Distributed Key Management Scheme for Large Scale Pay-TV Application 30

Jia-Yin Tian, Cheng Yang, Yi-chun Zhang, andJian-Bo Liu

SECTrust: A Secure and Effective Distributed P2P Trust Model 34

Jianli Hu, Xiaohua Li, Bin Zhou, and Yonghua Li

v

Page 3: 2010 Third International Symposium on Intelligent Information ... · EstimatingTyphoonRainfall overSeafrom SSM/ISatellite DataUsing a Back-PropagatedNetwork 263 Wen-Huan Chine, Hsiao-Ping

Representing Non-deterministic Actions within the Situation Calculus

for Autonomous Characters 39

Xiangyang Huang, Xiao Xin, and Wenjun Wu

Study on Service Selections Based on Ontology and Qos 43

Wang Gang and Yin Fengxia

On the Way to Design an Optical Camera Lens for River Sediment

in Underwater Imaging 48

Xu-yan Zhou, Bing Tan, BingZhu, Xuan-ge Peng, and Xue-mou Liu

Research on MAC Communication Mechanism of Air-to-Ground Data Link

Based on 3G: The MSDU Frame Subsection and RTS/CTS Handshake

Mechanism 54

Minghui Li, Jingbo Xia, and Yaoguo Wang

The Application Research of Wireless Sensor Network in the Prison

Monitoring System 58

Wan Zhou, ZhangXuehua, XiongXin, and WuJiande

Research on k-means Clustering Algorithm: An Improved k-means Clustering

Algorithm 63

Shi Na, Liu Xumin, and Guan Yong

A Verifiable Copyright-Proving Scheme Based on Lifting Wavelet

Transformation 68

Li Lizong, Gao Tiegang, Git Qiaohtn, and Bi Lei

Design and Implementation for Real-Time Property of Serial Communication

Based on WINDOWS CE 73

YuXiang Jiang, Cheng Xu, LaLu Zhang, and ShanQin Wang

Design of Panoramic Mosaic Surveillance Platform in Severe Circumstance 77

Yu Liu, Jimchan Du, andFeng Ji

Analysis on the Integration of ERP with E-business 81

Wu Qunli

An Integrated P2P Mobile Learning Model for Timely Farming Guidance 84

Xiaoming Yao, WencaiDu, Baodan Chen, andZhongzhi Yuan

An Integrated Network Performance Monitor System 88

Hungjie Sun

Pattern-Based Blind Spatial Image Watermarking 92

Xiaoming Yao, WencaiDu, Mei Huang, Weihua Wu, andJundongFu

Genetic Algorithm-Based Evaluation Model of Teaching Quality 97

Hongfa Wang, Feng Yu, Chen Xing, andZhimin Zhou

Study on Incremental Data Mining Based on Rough Set Theory 101

ShanGuo Lv andHongLi Chen

Study on Ontology Model Based on Rough Set 105

HongLi Chen and ShanGuo Lv

vi

Page 4: 2010 Third International Symposium on Intelligent Information ... · EstimatingTyphoonRainfall overSeafrom SSM/ISatellite DataUsing a Back-PropagatedNetwork 263 Wen-Huan Chine, Hsiao-Ping

A General Method ofConstructing the Reversible Full-Adder 109

Lihui Ni, Zhijin Guan, and Wenying Zhu

Automatic Construction of Web-Based English/Chinese Parallel Corpora 114

Bin Tan andXu-yan Zhou

Research on Component Composition with Formal Semantics 118

RuzhiXu, Quansheng Wu, Hongquan Gong, and Leqiu Qian

Multi-modal Medical Image Registration Based on Gradient of Mutual

Information and Hybrid Genetic Algorithm 125

Xiaosheng Huang and Fang Zhang

An Improved Ant Colony Algorithm for VRP Problem 129

Geng-Sheng Wang and Yun-Xin Yu

A Robust EMD-Like Stegnographic Scheme 134

Xiaoming Yao, Wencai Du, Weihua Wu, Mei Huang, andJimdong Fu

SOM-Based Classification Method for Moving Object in Traffic Video 138

Jie Xia, Jian Wu, Yan-yan Cao, and Zhi-ming Cui

The Study ofElectrocardiograph Based on Radial Basis Function Neural

Network 143

Guangying Yang and Yue Chen

SAR Image Segmentation Based on SWT and Improved AFSA 146

Miao Ma, Jian-hui Liang, Li Sun, and Min Wang

The Research of High Noise Image's Restoration and Recognition of Train's

Plates 150

Xiangang Jiang, Dean Ma, and Longfeng Tao

Property Preservation of Time Petri Net Reduction 154

ChuanliangXia and Zhendong Liu

Regional Logistics System Bi-level Programming with Elastic Demand

by Using Fuzzy C-means Clustering 160

Ming-bao Pang, Fang Dong, andXin-ping Zhao

A Strong Deviation Theorem Based on Laplace Transform on

a Non-homogeneous Tree 165

Shaohua Jin, Chongguang Ding, Yongxue Wang, Yanmin Zhang, andJie Lv

Some Strong Limit Theorems for Hidden Markov Models Indexed by

a Non-homogeneous Tree 169

Shaohua Jin, Yongxue Wang, Huitao Liu, Ying Tian, and Hui Li

Dynamic Evolution Simulation of Corporate Governance Based on Swarm 173

Rong-jie Lv and Yu-hongAn

Integrated Security Framework for Secure Web Services 178

Wenjun Zhang

A Preferable Method on Digital Filter in ECG Signal's Processing Based

onFPGA 184

Nianqiang Li, Yongbing Wang, and Guoyi Zhao

vii

Page 5: 2010 Third International Symposium on Intelligent Information ... · EstimatingTyphoonRainfall overSeafrom SSM/ISatellite DataUsing a Back-PropagatedNetwork 263 Wen-Huan Chine, Hsiao-Ping

A New Scheme on Multifunction Wireless Medical Surveillance System

Based on FPGA 188

Nianqiang Li, Yongbing Wang, and Guoyi Zhao

Research on Application of Region-of-Interest in Face Detection 192

Deng-feng Zhou, Shui-sheng Ye, and Shao-hua Hu

A Study of Image-Based Algorithms of River Sediment Measurement 195

Bing Zhu, Xu-yan Zhou, Bin Tan, Xuan-ge Peng, andXue-mou Liu

A Hybrid Model ofRST and DST with its Application in Intrusion Detection 202

Qing Ye, Xiaoping Wu, Yongqing Liv, and Gaofeng Huang

Detection of Aircraft In-flight Icing in Non-steady Atmosphere Using

Artificial Neural Network 206

Sibin Ying and Jianliang Ai

Two Sub-swarms Quantum-Behaved Particle Swarm Optimization Algorithm

Based on Exchange Strategy 212

Zhihua Liu, Hui Sun, and Haizhi Hu

A Quantifying Metric for Privacy Protection Based on Information Theory 216

Feng Gao, Jingsha He, Shufen Peng, andXu Wu

A Cloud Model Inference System Based Alpha-Beta Filter for Tracking

of Maneuvering Target 221

Huang Jianjun, Zhong Jiali, and Li Pengfei

A PSO Based Array Shape Calibration Utilizing Cyclostationarity 226

Jianjun Huang

ZigBee-based Vehicle Access Control System 232

RongZhou, Chunyue Zhao, LiliFu, Ao Chen, and Meiqian Ye

The Design and Implementation of Electronic Farm System Based on Google

Maps 236

Meiyu Zhang and Jinghua Mei

A Method of Honey Plant Classification Based on IR Spectrum: Extract

Feature Wavelength Using Genetic Algorithm and Classify Using Linear

Discriminate Analysis 241

Yan Yang, Peng-Cheng Nie, and Yong He

Classification Based on Particle Swarm Optimization for Least Square Support

Vector Machines Training 246

Lin Yang andHui Ting Wang

Automated Assessment System for Subjective Questions Based on LSI 250

Xinming Hu andHuosong Xia

A Study of User Downloading Behavior in Mobile Internet Using Clickstream

Data 255

Yanbin Liu and Ping Yuan

Vehicle Edge Detection Based on Multi-structure Mathematical Morphology 258

Yanyan Cao, Hengjun Yue, Man Wu, Jianming Chen, and Zhiming Cui

viii

Page 6: 2010 Third International Symposium on Intelligent Information ... · EstimatingTyphoonRainfall overSeafrom SSM/ISatellite DataUsing a Back-PropagatedNetwork 263 Wen-Huan Chine, Hsiao-Ping

Estimating Typhoon Rainfall over Sea from SSM/I Satellite Data Using

a Back-Propagated Network 263

Wen-Huan Chine, Hsiao-Ping Wei, Keh-Chia Yeh, Li Chen, Gin-Rong Liu,

and Chang-Hung Chiu

Preparation and Piezomagnetic Effect of FeSiB Amorphous Powders /IIR

Composite Film 268

Da-guo Jiang and Zhao-hui Liu

Design and Implementation of ICAP-Client Based on Improved LRU

Algorithm 271

Shi Lan, Shao Xia, and Zhao Ying

Air Conditioning Load Prediction Based on DE-SVM Algorithm 276

Zhonghai Chen, Yong Sun, Guoli Yang, Tengfei Wit, Guizhu Li, and Longbiao Xin

Comparative Study between the Magic Formula and the Neural Network Tire

Model Based on Genetic Algorithm 280

Chen Long and Huang Chen

The Security Issues of Scientific-Workflow Technique in Network Grid

Computing 285

Feng Wang, Hid Deng, Wei Dai, Sheng Zheng, andBo Liang

A Historical Role-Based Fast Negotiation Model in Open Network 289

Ding Hong and Zhao Yizhu

Design and Application ofNew Topology of Transverse Flux

Permanent-Magnet Motor with Driving System 294

Huan Wang, Yi-kai Shi, Jian-kang Lu, andXiao-qing Yuan

Emotion Recognition of Electromyography Based on Support Vector Machine 298

Guangying Yang and Shanxiao Yang

A Test Platform for Evaluation of Web Service Composition Algorithm 302

Dong Li and Chun-Hui Yang

A Trust Evaluation Model for Web Service Selection 306

Dong Li and Chun-Hui Yang

DW 2.0-Oriented Metadata Evolution Management 311

Ding Pan

The Application of Random Forest and Morphology Analysis to Fault

Diagnosis on the Chain Box of Ships 315

Zhiyuan Yang and Qinming Tan

Threshold Secret Sharing Based Trust Security in Structured P2P Network 320

Cai Biao, Li Zhishu, and Luo Zhen

The Research of Privacy-Preserving Clustering Algorithm 324

Yanguang Shen, Junnii Han, andHuifang Shan

An Improved Algorithm of Collision Detection in 2D Grapple Games 328

Kaiqiang Guo andJiewu Xia

ix

Page 7: 2010 Third International Symposium on Intelligent Information ... · EstimatingTyphoonRainfall overSeafrom SSM/ISatellite DataUsing a Back-PropagatedNetwork 263 Wen-Huan Chine, Hsiao-Ping

Game Theory Based View to the Quantum Key Distribution BB84 Protocol 332

Mahboobeh Houshmand, Monire Houshmand, andHabib Rajabi Mashhadi

A New Method for Tracing by Using Corner Detecting and

k-Nearest Neighbor 337

Zhang Yang, Gao Liqun, and Ye Shufan

SPIHT Algorithm Combined with Huffman Encoding 341

Wei Li, Zhen Peng Pang, and Zhi Jie Liu

Research on the Knowledge Flow in Supply Chain Based on the Core

Enterprise 344

Liang Xu and Yuanyuan Sun

Efficient Scheduling of Task Graphs to Multiprocessors Using a Combination

of Modified Simulated Annealing and List Based Scheduling 350

Mahboobeh Houshmand, Elaheh Soleymanpour, Hossein Salami, Mahya Amerian,

andHossein Deldari

A Noise Robust Endpoint Detection Algorithm for Whispered Speech Based

on Empirical Mode Decomposition and Entropy 355

Xue-Dan Tan, He-Ming Zhao, Ji-Hua Gu, and Zhi Tao

IRC Botnets' Homology Identifying Method Based on Improved LB_PAA

Distance ofCommunication Characteristic Curves 360

Yan Jia, Runheng Li, Liang Gan, and Guangqiang Chen

A Novel Measure of Diversity for Support Vector Machine Ensemble 366

Kai Li and Hongtao Gao

An Improved Genetic Algorithm Based on Polygymy 371

Gu Min and Yang Feng

Reconstruction of Normal Speech from Whispered Speech Based on RBF

Neural Network 374

Zhi Tao, Xue-Dan Tan, Tao Han, Ji-Hua Gu, Yi-Shen Xu, andHe-Ming Zhao

An NPT Watermarking Algorithm Using Wavelet Image Combination 378

Ji-Hua Git, Yun Shang, andBei-jing Huang

Modeling Document Summarization as Multi-objective Optimization 382

Lei Huang, Yanxiang He, Furu Wei, and Wenjie Li

New Lattice-Based Public-Key Cryptosystem 387

Yali Jiang, XiulingJu, andFeng Shi

A Route-Nearest Neighbor Algorithm for Large-Scale Vehicle Routing

Problem 390

Ruhan He, Weibin Xu, Ying Wang, and Wei Zhan

The Algorithm Study ofSensor Compensation in MWD Instrument Based

on Genetic Elman Neural Network 394

Li-li Jit, Xhi-fang Wang, Sai Ma, and Chun-ming Wei

X

Page 8: 2010 Third International Symposium on Intelligent Information ... · EstimatingTyphoonRainfall overSeafrom SSM/ISatellite DataUsing a Back-PropagatedNetwork 263 Wen-Huan Chine, Hsiao-Ping

Identification of Nutrition Elements in Orange Leaves by Laser Induced

Breakdown Spectroscopy 398

Mingyin Yao, Mulma Liu, Jinhui Zhao, andLin Huang

An Adaptive Fast Algorithm for Coding Block Mode Selection 402

Weixing Zhu, Yong Ma, and Rixia Wang

The Analysis and Enhancement of Voting Behaviors in P2P Networks 407

Bowei Yang, Guanghua Song, and Yao Zheng

Efficient Group Key Management Scheme in Wireless Sensor Networks 411

GuoruiLi, Ying Wang, and Jingsha He

An Improved Key Management of ZigBee Protocol 416

Bing Zhang and Li Chen

An Improved Method for Similar Handwritten Chinese Character Recognition 419

Fang Yang, Xue-Dong Tian, Xin Zhang, andXin-Biao Jia

Application of Clipboard Monitoring Technology in Graphic and Document

Information Security Protection System 423

Shaobo Li, Shulin Lv, Xiaolmi Jia, and Zhisheng Shao

Optimization of a Subset of Apple Features Based on Modified Particle

Swarm Algorithm 427

Weixing Zhu, Dajun Hou, Jin Zhang, and Jian Zhang

Automated Monitoring System of Pig Behavior Based on RFID

and ARM-LINUX 431

Weixing Zhu, Fangkui Zhong, andXiangping Li

The Solution of Printing on University Human Management System 435

Wei Yang, Chen Guo, andXuan Ge Peng

Research and Application of USB Filter Driver Based on Windows Kernel 438

Shaobo Li, Xiaohui Jia, Shulin Lv, and Zhisheng Shao

The Feasible Control Lyapunov Function of Nonlinear Affine-Control

Systems 442

XiaoDan Chen and ShaoBai Chen

On the Upper Completeness of Quasi-metric Spaces 446

XiaoDan Chen andShaoBai Chen

P2PKMM: A Hybrid Clustering Algorithm over P2P Network 450

Zhong/un Deng, Wei Song, andXuefeng Zheng

The Modeling and Simulation ofNegotiation Process for High-Tech Virtual

Enterprise Based on UML and Petri Net 455

Changyuan Gao, Shuchen Zhang, andXiaoxing Zhang

RFID System Security Using Identity-Based Cryptography 460

Youqin Chen, Zhide Chen, and Li Xu

Intrusion Detection Model Based on Improved Support Vector Machine 465

Jingbo Yuan, Haixiao Li, Shunli Ding, andLimin Cao

xi

Page 9: 2010 Third International Symposium on Intelligent Information ... · EstimatingTyphoonRainfall overSeafrom SSM/ISatellite DataUsing a Back-PropagatedNetwork 263 Wen-Huan Chine, Hsiao-Ping

Dynamic Replica Selection Using Improved Kernel Density Estimation 470

Yin Pang, Kan Li, Xin Sun, and Kaili Bu

Design of Temperature Control System for a Special Shortwave Infrared

Spatial Remote Sensor Based on FPGA 475

ZhipengXu, Qianting Zhou, and Jim Wei

Associating IDS Alerts by an Improved Apriori Algorithm 478

Wang Taihua and Guo Fan

Three-Dimensional Multiscale Texture Synthesis 483

Junyu Dong, Yuliang Wang, Yan Song, and Guanglin Cheng

Aesthetic Evolution of Staged L-systems for Tiling Pattern Design 488

Yang Li and Chong-chong Zhao

Study on the Convergence of Hybrid Ant Colony Algorithm for Job Shop

Scheduling Problems 493

Xiaoyu Song and Lihua Sun

Negotiation Problem Processing System ofHigh-Tech Virtual Enterprise 498

Lili Zhai andFuguo Chang

A Flexible Fuzzy Comprehensive Evaluation Method 502

Juan Chen

A High Security Dynamic Secret Key Management Scheme for Wireless

Sensor Networks 507

Lanying Li and Xin Wang

An Efficient and Secure Key Establishment Scheme for Wireless Sensor

Network 511

Eric Ke Wang and Yunming Ye

A Focused Crawler Based on Naive Bayes Classifier 517

Wenxian Wang, Xingshu Chen, Yongbin Zou, Haizhou Wang, and Zongkun Dai

Economic Grid Resource Scheduling Based on Utility Optimization 522

Juan Chen

A Study on CRL Issue by P2P Network 526

Zhao Qiu, Mingrui Chen, andJun Huang

Design of Multi-mode E-commerce Recommendation System 530

Zhao Qiu, Mingrui Chen, andJun Huang

4-Step Face Authentication Algorithm Based on SVM 534

Fang-jun Luan, Lan Lin, and Yong-hui Wang

A Security Architecture for Intranet Based on Security Area Division 539

Gao Fuxiang, Li Sha, Wang Xiaolu, and Yao Lan

Attack Simulation and Signature Extraction of Low-Rate DoS 544

Zenghui Liu andLiguo Guan

Research on the Directional Interferences Canceling 549

Bin Zhang

xii

Page 10: 2010 Third International Symposium on Intelligent Information ... · EstimatingTyphoonRainfall overSeafrom SSM/ISatellite DataUsing a Back-PropagatedNetwork 263 Wen-Huan Chine, Hsiao-Ping

An Ontology for Vulnerability Lifecycle 553

Ratsameetip Wila, Nattanatch Jiamnapanon, and Yunyong Teng-anvmay

A Prototype System of Software Reliability Prediction and Estimation 558

Jintao Zeng, Jinzhong Li, Xiaohui Zeng, and WenlangLuo

How to Construct a Divisible Online/Offline Signature 562

Yilian Zhang, Zhide Chen, and LiXu

Mining Maximal Patterns Based on Improved FP-tree and Array Technique 567

Hua-jin Wang and Chun-an Hu

Research on Active Controllable Defense Model Based on Zero-PDR Model 572

Kehe Wu, Tong Zhang, and Fei Chen

Optimization Design of Supervising and Controlling on the SOFC Integration

System 576

Suying Yang, Meng Wang, Jianying Lin, and Kuijun Meng

A Visual Domain Recognition Method Based on Function Mode for Source

Code Plagiarism 580

Suying Yang andXin Wang

A Multi-mode P2P Live Media Broadcasting Middleware 585

Yin Zhou and Wei Zhu

Automatic Summarization for Chinese Text Based on Combined Words

Recognition and Paragraph Clustering 591

Chang-jin Jiang, Hong Peng, Qian-li Ma, andJian-chao Chen

The Design and Implementation ofHost-Based Intrusion Detection System 595

Ying Lin, Yan Zhang, and Yang-jia Ou

An Improved Pattern Matching Algorithm 599

Jingbo Yuan, Jisen Zheng, and Shunli Ding

Autonomy-Oriented, Self-Equilibrium Routing Model in Traffic Networks 604

Chunyan Yu, Dong)>i Ye, Xiaosheng He, and Mmghui Wu

A New Agent Oriented Model for AutoMotive Computing Platform 609

Chunyan Yu, Dongyi Ye, and Minghui Wu

Mediated Hierarchical Identity-Based Combined Public Key Schemes 614

Pingjian Wang, Jingqiang Lin, Jiwu Jing, and Yongquan Xie

IIS Security Mechanisms 619

Ping Zhang, Yan Zhang, Zhengjiang Wu, and Weifeng Du

The Research on Two Important Counter-Examples of Four-Color Problem 623

Jinbiao Wang and Shu Qin

Characteristics of Network Non-optimum and Extensionality Security Mode 627

Teng Ping and He Ping

Electronic Commerce Technology and its Security Problems 631

Xinqiang Ma and Youyuan Liu

xiii

Page 11: 2010 Third International Symposium on Intelligent Information ... · EstimatingTyphoonRainfall overSeafrom SSM/ISatellite DataUsing a Back-PropagatedNetwork 263 Wen-Huan Chine, Hsiao-Ping

An Implementation of Object-Based Storage System Access Control Based

on IBE 635

Junjicm Chen, Dan Feng, andJingningLiu

Cascaded SVMs in Pattern Classification for Time-Sensitive Separating 640

Ruihu Wang, Bin Fang, Zhangping Hu, Liang Chen, and Weihua Wang

The Detecting Methods of Geostationary Orbit Objects 645

Min Wei, HaiNing Chen, TianYun Yan, QinZhang Wu, andBin Xu

Research on the Key Technology of Secure Computer Forensics 649

Yan Zhang and Ying Lin

The Method of Early Real-Time Fault Diagnosis for Technical Process Based

on Neural Network 653

Yingjun Guo, Lihua Sun, and Haichao Ran

Overcoming Disadvantages by Making Full Use of Extrinsic Objects:

Advancing Information Resource Construction by ISA 658

Zhonghua Deng and Ying Wu

Efficient Modeling of Spam Images 663

Qiao Liu, Zhiguang Qin, Hongrong Cheng, andMingcheng Wan

Mobile Intelligence Sharing Based on Agents in Mobile Peer-to-Peer

Environment 667

Ye Liang

A Novel Real-Time Face Tracking Algorithm for Detection of Driver Fatigue 671

Qiufen Yangon, Weihua Gui, andHuosheng Hu

Research on High Performance RFID Code Resolving Technology 677

Huifang Deng and Haiyan Kang

An Improved Task Scheduling Algorithm in Embedded Systems 682

Xiong Yumei and Chen Yimin

Product Feature Extraction with a Combined Approach 686

Zhixing Li

An Algorithm of Webpage Information Hiding Based on Class Selectors 691

Guang Sun

An Improved Particle Swarm Optimization Algorithm with Synthetic Update

Mechanism 695

Fei Li

Study of Privacy Preserving Data Mining 700

Haisheng Li

Model of CSR in Chinese Medicine E-commerce Finn: Strategic Management

Perspective 704

Jian Li and Wengeng Shi

Modeling and Simulating of Ecological Community in Digital Creative

Industry 708

Xiaojun Ma, Sa Li, and Weihui Dai

xiv

Page 12: 2010 Third International Symposium on Intelligent Information ... · EstimatingTyphoonRainfall overSeafrom SSM/ISatellite DataUsing a Back-PropagatedNetwork 263 Wen-Huan Chine, Hsiao-Ping

Modeling and Simulation of Double-tube Hydraulic Damper External

Characteristic 713

Changcheng Zhou and Jie Meng

Research on a High Efficient Intrusion Prevention Model 720

Xiao-hiii Zeng, Wen-lang Luo, Jin-iao Zeng, Yan-ping Chen, and Shi-yao Jin

Application of Data Mining for Decision Tree Model of Multi-variety Discrete

Production and Manufacture 724

Jianfang Sun

A Multiple Population Genetic Algorithm and its Application in Fuzzy

Controller 729

Yukang Tian and Huy Quan Vu

Knowledge Mining for Intelligent Decision Making in Small and Middle

Business 734

Huamin Li, Xingsen Li, and Zhengxiang Zhu

A New Method of Sea-Sky-Line Detection 740

Chunliang Jiang, Hanhong Jiang, Chaoliang Zhang, andJie Wang

Modeling and Dynamic Simulation of Electric Power Steering System

of Automobile Using Bond Graph Technique 744

Lin-an Wang, QiangLi, and Xiao-juan Liang

Design and Implementation of Quantum Factorization Algorithm 748

Xiangqun Fu, Wansu Bao, and Chun Zhou

A Medium Field Multivariate Public Key Signature Scheme with External

Perturbation 753

Li Tian and Wansu Bao

Towards a Theory of Cloud Computing in the Protocol-Composition

Framework 758

Huafei Zhu

Research on Logistics System Architecture Based on SOA 763

Xin Yu and Zhiguang Wei

The Construction and Test for a Small Beowulf Parallel Computing System 767

Wen-lang Luo, An-dong Xie, and Wen Ruan

Research of Image Acquisition Device for River Sediment 771

Xuange Peng, YingXiao, and Bing Zhu

A Collaborative Filtering Algorithm Based on Time Period Partition 777

Yuchuan Zhang and Yuzhao Liu

A Blind Watermark Algorithm for Color Image Based on Dual Scrambling

Technique 781

Hongqin Shi and Fangliang Lv

Artificial Neural Network Method for the Analysis of 1-D Defected Ground

Structure 786

Shan Wang, Yang Jiang, Minghua Gao, Chuanyun Wang, andHaiwen Liu

XV

Page 13: 2010 Third International Symposium on Intelligent Information ... · EstimatingTyphoonRainfall overSeafrom SSM/ISatellite DataUsing a Back-PropagatedNetwork 263 Wen-Huan Chine, Hsiao-Ping

Volume Rendering Effect Analysis with Image Preprocessing Technology

Based on Three Dimension Anisotropic Diffusion 789

Xiangang Jiang, Lunlun Xu, and Dean Ma

An Intelligent Security Defensive Software Scheme and Realization 793

Kim Wang, Jin-dong Wang, Liu-qing Shen, and Zhen-hua Han

Author Index 797

xvi