2008 International Symposium on Computer Science and Computational Technology - Volume 2 2008 International Symposium on Computer Science and Computational Technology Volume 2

ISCSCT 2008 20-2220-22 DecemberDecember 20082008 Shanghai,Shanghai, ChinaChina

Published by the IEEE Computer Society 10662 Los Vaqueros Circle P.O. Box 3014 Los Alamitos, CA 90720-1314

IEEE Computer Society Order Number P3498 ISBN 978-0-7695-3498-5 Library of Congress Number 2008908512 BMS Part Number CFP0851F-PRT Proceedings

International Symposium on Computer Science and Computational Technology ISCSCT 2008

Proceedings

International Symposium on Computer Science and Computational Technology ISCSCT 2008

Shanghai, 20 - 22 December 2008

Editors by Fei Yu Wen Chen Zhigang Chen Jie Yuan

Co-sponsored by Peoples’ Friendship University of Russia, Russia Shanghai Institute of Electronics, China Guangdong University of Business Studies National Chung Hsing University, Jiaxing University, China Hunan University, China

Los Alamitos, California Washington • Tokyo Copyright © 2008 by The Institute of Electrical and Electronics Engineers, Inc. All rights reserved.

Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries may photocopy beyond the limits of US copyright law, for private use of patrons, those articles in this volume that carry a code at the bottom of the first page, provided that the per-copy fee indicated in the code is paid through the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923.

Other copying, reprint, or republication requests should be addressed to: IEEE Copyrights Manager, IEEE Service Center, 445 Hoes Lane, P.O. Box 133, Piscataway, NJ 08855-1331.

The papers in this book comprise the proceedings of the meeting mentioned on the cover and title page. They reflect the authors’ opinions and, in the interests of timely dissemination, are published as presented and without change. Their inclusion in this publication does not necessarily constitute endorsement by the editors, the IEEE Computer Society, or the Institute of Electrical and Electronics Engineers, Inc.

IEEE Computer Society Order Number P3498 ISBN-13: 978-0-7695-3498-5 BMS Part # CFP0851F-PRT Library of Congress Number 2008908512

Additional copies may be ordered from:

IEEE Computer Society IEEE Service Center IEEE Computer Society Customer Service Center 445 Hoes Lane Asia/Pacific Office 10662 Los Vaqueros Circle P.O. Box 1331 Watanabe Bldg., 1-4-2 P.O. Box 3014 Piscataway, NJ 08855-1331 Minami-Aoyama Los Alamitos, CA 90720-1314 Tel: + 1 732 981 0060 Minato-ku, Tokyo 107-0062 Tel: + 1 800 272 6657 Fax: + 1 732 981 9667 JAPAN Fax: + 1 714 821 4641 http://shop.ieee.org/store/ Tel: + 81 3 3408 3118 http://computer.org/cspress [email protected] Fax: + 81 3 3408 3553 [email protected] [email protected]

Individual paper REPRINTS may be ordered at:

Editorial production by Silvia Ceballos and Patrick Kellenberger Cover art production by Mark Bartosik Printed in the of America by The Printing House LLC

IEEE Computer Society Conference Publishing Services (CPS) http://www.computer.org/cps 2008 International Symposium on Computer Science and Computational Technology ISCSCT 2008 Table of Contents Volume - 2

Message from the Symposium Chairs - Volume 2...... xvi Organizing Committee - Volume 2...... xvii Committee Members - Volume 2...... xviii

ISCSCT 2008 Paper Session - Volume 2 Normative Modeling for Personalized Clinical Pathway Using Organizational Semiotics Methods ...... 3 Weizi Li, Kecheng Liu, Shuzhang Li, and Hongqiao Yang Computer Aided Analysis of Bifurcation of a Spatial Dynamical System ...... 8 Wang Lin and Zhongyue Li A New Method for Modulation Classification Based on Bootstrap Technique ...... 11 Feng Wang and Bing-bing Li A Secure Web Services Model Based on the Combination of SOAP Registration Info and Token Proxy ...... 15 Youxiang Duan, Yongtang Bao, Lijiang Pan, Beibei Yan, Jiuyun Xun, and Nianyun Shi Normalization for Removing Code Variations in Modular Programs ...... 21 Tiantian Wang, Xiaohong Su, and Peijun Ma The Classification Diagram of Character Identification in Several Different and Similar Structures of Time Series ...... 25 Junhai Ma, Peiling Xiao, and Zhiqiang Wang Touched Human Object Segmentation Based on Mean Shift Algorithm ...... 29 Guo Sen, Liu Wei, and Wang JingHua R-Binder: Application of Using Service Binder in R-OSGi ...... 34 ZhiYu Feng and LinPeng Huang A Simple and Efficient Edge Detection Algorithm ...... 40 Guangyu Luan and Rensheng Che

v Detection of Non-iris Region in the Iris Recognition ...... 45 Zhongliang Luo and Tusheng Lin Barrier Coverage of Wireless Sensor Networks Based on Clifford Algebra ...... 49 Wenming Cao and Tiancheng He A P2P Traffic Classification Method Based on SVM ...... 53 Zhou Xusheng Research of Graph-Based Workflow Access Control ...... 58 Yonghe Wei and Chunjing Shi Study on Integrated Intelligent Control with Hierarchical Structure ...... 63 Wang Wu and Wang Hong-ling A Data Mining Application in Stellar Spectra ...... 66 Bin Jiang, Jing Chang Pan, Zhen Ping Yi, and Qiang Guo Influence Law of Pedestrian WAD in Vehicle/Pedestrian Collisions ...... 70 Yanhui Fan and Hongguo Xu Analysis and Improvement of Scheduling Algorithms Based on (m, k)-Firm Constraint ...... 74 Lanying Li and Yu Tan Research on Face Detection Classifier Using an Improved Adboost Algorithm ...... 78 Liuxia Lisu An Adaptive Development Framework for Web-Based Enterprise Information System ...... 82 Liu Xudong, Xu Xiaofei, Zhan Dechen, and Qiao Limin A Simpler Framework Based on the Applied Pi Calculus and Its Application to Electronic Cash Protocol ...... 87 Xiaojuan Cai and Yuxin Deng Seamless LBS Based on the Integration of WSN and GPS...... 91 Dejun Zou, Zhongliang Deng, Lianming Xu, and Weizheng Ren Multi-agent Based Distributed Video Surveillance System over IP ...... 97 Wu Chao and Xin Ming Jun A Bitmap Compression Algorithm for Vertical Association Rules Mining ...... 101 Liu Yang and Mei Qiao An Optimized Parallel FFT Algorithm on Multiprocessors with Cache Technology in Linux ...... 105 Jun Tan, Xingshu Chen, and Long Xiao Extending Sliding-Window Semantics over Data Streams ...... 110 Leisong Chen and Guoping Lin Research on a Behavior-Based Software Test Process Model ...... 114 Yongzhong Lu, Simeng Da, Jun Yang, Junli Song, and Songlin Nie Development of a Computerized Method to Inspect Empty Glass Bottle ...... 118 Huan-jun Liu and Yao-nan Wang Applying Data Fusion in Collaborative Alerts Correlation ...... 124 Xin Zhuang, Debao Xiao, Xuejiao Liu, and Yugang Zhang Application and Research of Numerical Integration in Cloth Simulation ...... 128 Yan Jiang and Zhengdong Liu

vi A New Approach of Extended Chirp Scaling Algorithm for High Squint Missile-Borne SAR Data Processing ...... 133 Zhou Qiang, Qu Chang-wen, Su Feng, and Wang Ying A CT/MRI Image Fusion Algorthim Combined Non-separble Wavelet Transform and Regional Priority ...... 137 Ge Wen, Gao Li-qun, and Ge Wen Superresolution Reconstruction of Multiframe Images Using Regularization with a Quadratic Form Observation Model ...... 141 Yajuan Wu, Minghhui Wang, Xiaofeng Liu, and Yi Zhan Single-View’s 3D Explanation Based on Prior Knowledge and Constraint Satisfaction ...... 146 Wei Zhang and Hui Wei Research on Information Fusion on Evaluation of Driver Fatigue ...... 151 Zhang Jun, Zhu Zhong-xiang, Song Zheng-he, and Mao En-rong Sensor Scheduling for Target Tracking in a Wireless Sensor Network Using Modified Particle Swarm Optimization ...... 156 Feng Mingyue, Yi Xianqing, Li Guohui, Du Zhanshuai, and Wang Xiangneng Hiding Informationin in Java Class File ...... 160 Daofu Gong, Fenlin Liu, Bin Lu, Ping Wang, and Lan Ding Modeling Object-Oriented Framework with Z ...... 165 Tiange Zhang, Xiaochun Xiao, and Leqiu Qian Model of Network Traffic Based on Network Applications and Network Users ...... 171 Peng Liu, Fang Liu, and Zhenming Lei Hierarchical Fuzzy Trust Management for Customer-to-Customer in Peer-to-Peer eCommerce ...... 175 Huaiqing Lin, Zhitang Li, Yejiang Zhang, and Chuiwei Lu Analysis and Representation on Workshop-Oriented Domain Ontology ...... 180 Chunjing Shi, YongXian Liu, and YongPing Hao Research and Simulation Analysis of Improved Dual-clocking Algorithm in EPON ...... 186 Aihan Yin and Peizhou Zhang The Design of a Low-Power Asynchronous DES Coprocessor for Sensor Network Encryption ...... 190 Yijun Liu, Chen, Guobo Xie, Zhusong Liu, and Zhenkun Li Chinese Recognition for a Vision-Based Multi-features Classifier ...... 194 Yang Quan and Peng Jinye Partial Relevance Feedback for 3D Model Retrieval ...... 198 Hu Baokun, Liu Yusheng, Gao Shuming, and Hu Jing A New Algorithm for Solving the Complex Nonlinear Ecosystem ...... 202 Yezhi Lin and Weiming Wang A Color Correction Algorithm of Multi-view Video Based on Depth Segmentation ...... 206 Yue Fei, Mei Yu, Feng Shao, and Gangyi Jiang Specification of Agent in Complex Adaptive System ...... 210 Ren Chuanjun, Huang Hongbing, and Jin Shiyao

vii A Text Digital Watermarking for Chinese Word Document ...... 217 Liu Jin'An, He Lu, Fang DingYi, and Gui XiaoLin SIM-Array: A Flexible Storage System Simulator ...... 221 Zhang Xiao, Zhao Xiao-Nan, and Chen Jian-Quan The Platform of Quick Development of Mobile 3D Game ...... 226 Zhao Jieyi, Tang Min, Tong Ruofeng, and Dong Jinxiang 3D Surface Texture Synthesis Based on Wavelet Transform ...... 230 Muwei Jian, Shuan Liu, and Junyu Dong A Novel Fingerprint Bifurcation Extraction Algorithm Based on Neural Network Template Matching ...... 234 Jianwei Leng, Jianyun Ni, and Jing Luo Combined Application of EMTDC and Simulink for Hybrid Simulation of IPS ...... 238 Feng Ji, Lijun Fu, and Hongwei Zhu A New Controlled Commutation Strategies for Matrix Converter ...... 242 Lv Hao, Nie Ziling, and Zhihao Ye A Genetic Algorithm for Solving RCPSP ...... 246 Hua Zhang, Hao Xu, and Wuliang Peng An ACO for Solving RCPSP ...... 250 Li Zhou, Dong Wang, and Wuliang Peng A New Approach to Fast Multiple Reference Frame Motion Estimation for H.264 ...... 254 Shufang Zhang, Yanling Wang, Jinhua Kang, and Hua Li Research and Development of MFNS Software Based on Software Engineering ...... 259 D.D. You, W.F. Li, and M. Shao Face Recognition Based on Local Feature Analysis ...... 264 Zhi-ming Qian, Peng-yu Su, and Dan Xu Research and Implementation of Signal Control Simulation for a Single Intersection Based on 3DS MAX ...... 268 Wen-bo Wang Simulation of FlexRay Communication Using C Language ...... 272 Chuanyan Xu and Yong Zhang Research on Handover in Hierarchical Mobile IPv6 Based on the Fast DAD Mechanism in Visual Domain ...... 277 Zheming Li, Ling Li, and Yulan Huang The Dimensionality Reduction of Feature Vectors by Generalized Cross Product ...... 281 Wei Jinwen, Chen Yanling, and Guo Junjie Research on Organizational-Level Software Process Improvement Model and Its Implementation ...... 285 Yan Xiaoguang, Wang Xiaogang, Luo Linpin, and Chen Zhuoning A Simple Global Calibration Method Based on 1D Target for Multi-binocular Vision Sensor ...... 290 Hong Lei, Zhenzhong Wei, and Guangjun Zhang

viii Study on Subcarrier and Power Allocation Algorithm for Downlink Transmission in Multiuser OFDM System ...... 295 Li Suo-ping,Tian Xiu-feng, and Li Min Boundary Extraction of Tube-Type Bottle Based on Wavelet Restoration and Mathematical Morphology ...... 299 Changhua Lu, Xiaokang Deng, Neng Fu, and Chun Liu Granularity-Wise Separations in Covering Approximation Spaces with Some Approximation Operators ...... 303 Xun Ge Stabilization Control of Networked Control Systems with Long Time Delay ...... 307 Qixin Zhu, Hongli Liu, Juan Jiang, and Yanping Wang Research and Implementation of a Reverse Engineering Method for Software Reuse ...... 311 Lan Wang and Anquan Jie Scene Text Extraction Based on HSL ...... 315 Jin-liang Yao, Yi-bo Gao, Liang-jun Ma, and Yi-ping Yang NGOSS-centric Framework of Telecommunication Electronic Commerce ...... 320 Tung-Hsiang Chou and Yu-Min Lee Visualization Study of fKdV Equation Simulation with Matlab ...... 324 Zhengren Wu, Mei Liu, Songling Wang, and Youliang Cheng Infrared Facial Expression Recognition Using Wavelet Transform ...... 327 Shangfei Wang, Siliang Lv, and Xufa Wang Fuzzy Conceptual Information Modeling in UML Data Model ...... 331 Z.M. Ma Shifting from a Computer Game to a Physical Game: A Case Study of ePet ...... 335 Weihua Tan, Wenjun Li, Xiaocong Zhou, and Xiao-bin Zhang Red Blood Cell Classification through Depth Map and Surface Feature ...... 339 Ruihu Wang and Brendan McCane An Integrated Approach for DiffServ Multicasting...... 343 Qian Gao Novel Text Watermarking Algorithm Based on Structure ...... 348 Qing-Cheng Li and Zhen-Hua Dong Research on E-HUB-Based Manufacturing Resources Integration for SMEs ...... 352 Bin Wang, Defang Liu, Ning Zhou, and Linzhen Zhou Research on Product Configuration Model and Expression of Constraints ...... 356 Zou Jiehui, Du Qungui, and Huang Bingkang A Web Geographical Information System Applied to Radio Station Information Management ...... 360 Su Li, Zhongming Han, Wenzheng Li, and Runhe Shi M-commerce Security Solution Based on the 3rd Generation Mobile Communication ...... 364 Pan Tiejun, Zheng Leina, Fang Chengbin, Huang Wenji, and Fang Leilei Some Characterizations of Wavelets with Composite Dilations ...... 368 Guochang Wu and Yadong Zhang

ix A Fuzzy Connectedness Segmentation of Image Sequences Based on 3D Seed Points Selection ...... 372 Chen Yanda, Bao Susu, and Peng Fengping Comparative Investigation of BP and RBF Neural Network on Identifying Reliability of Communication Networks ...... 376 Bin Song and Zhenghong Peng Design and Implementation of XML-based GUI for Cross Platform Backup System ...... 380 Huajun Chen and Zhi Zheng AWright-ADL for Aspectual Component Composition Platform...... 383 Bin Wang, Chunyan Wen, Wei Zhu, and Jinfang Sheng Event-Driven Model for Manufacturing Execution System Platform ...... 387 Shang Wenli, Duan Bin, and Shi Haibo The Robust Likelihood Model of State Measurement and Its Applications in Articulated Object Tracking ...... 391 Zhiquan Feng, Yanwei Zheng, Ling Zhang, Bo Yang, and Jingxiang Zhang A UML-Based Approach to Testing Web Applications...... 397 Liping Li, Huaikou Miao, and Zhongsheng Qian H Infinity Network-Servo Tracking Control ...... 402 Zhou Gu and Daobo Wang An Improved Tikhonov Regularization Method for Conductivity Tomography Imaging ...... 406 Baobin Feng, Wenjuan Wang, and Junxing Cao A LDAP Directory Server Model of Workflow Management Systems ...... 410 Zhiyi Wang, Zeng Wang, and Yifan Yang Analyze and Understand the Layout Characteristics of Ballot Image ...... 414 Gang Xiao, Jun-qiang Shen, Jiu-jun Chen, and Fei Gao Distributed Hot Spots Caching Mechanism for Queries with Popular Distribution ...... 418 Jianyong Chen, Haijian Long, and Leijuan Liang Research Framework on Enterprise Common Information Model Oriented Network Cooperation ...... 422 Jing Ranzhe An Optimal Equitable Matching Algorithm and Modeling ...... 427 Chendan and Yuxueyong Modeling Aspect-Oriented Extension Software Architecture ...... 431 Li Furong, Sun Wei, and Jia Zhigang Financial Performance Analysis of E-collaboration Supply Chain under Transportation Disruptions ...... 435 Tian-jian Yang Edge Mapping: A New Motion Estimation Method for Video Stabilization ...... 440 Liu Lingqiao, Fu Zhizhong, Xie Jingjing, and Qian Wei Organization Application Oriented Software Process Measurement Model ...... 445 Xiaodong Guo and Li Meng

x Towards Formalizing UML Activity Diagrams in CSP ...... 450 Dong Xu, Nduwimfura Philbert, Zongtian Liu, and Wei Liu An Improved Fingerprint Singular Point Detection Algorithm Based on Continuous Orientation Field ...... 454 Ting Tang, Xiaopei Wu, and Ming Xiang Using Fuzzy Wavelet Neural Network to Solve MCDM Problem ...... 458 Zhang Wei and Zhu Jinfu A Computation Method for the Value of Globe Trust Based on MAX-MIN Ant System ...... 462 Cui Lei and Xie Xian-Zhong Accelerating Fractal Image Encoding Based on Gray Value Moment Features of Normalized Block ...... 466 Gaoping Li Analysis and Simulation Protocols Based on Slotted ALOHA for Plastic Optical Fiber Network ...... 471 Ning Zhang and Ronghua Liu Research on Noise Detection Based on Improved Gradient Function ...... 476 Xiaosheng Liu and Zhihui Chen CGSP-DAI—A Heterogeneous Databases Access and Integration on CGSP ...... 480 Li Li, Wanbing Shi, Jiazao Lin, Lei Jiang, and Lian Li Search of Fast Mode Selection Algorithm Based on Macroblock-Adaptive ...... 485 Zhu Wei-xing, Wnag Ri-xia, and Li Xin-cheng A Novel Video Searching Model Based on Ontology Inference and Multimodal Information Fusion ...... 489 Jing Zhang An Improved FCM Algorithm Incorporating Spatial Information for Image Segmentation ...... 493 Bin Li, Wufan Chen, and Dandan Wang Analysis and Design for Nonlinear Networked Control Systems with Interval Time-Varying Delay ...... 496 Hongyan Chu and Dong Yue MIS Implementing Approaches Choose Based on Analytic Hierarchy Process ...... 500 Xinming Hu and Huosong Xia A Novel Algorithm for Background Updating and Target Tracking ...... 505 Hui-zhong Zhuang and Han Li An Axiomatic Characterization of Fuzzy Formal Contexts Based on T-implication Operators ...... 509 Xiaoxue Song and Wenxiu Zhang Fuzzy Integrated Evaluation of E-commerce Information System ...... 513 Jiangao Deng and Min Wang Effects of Stirrer on the Field Uniformity at Low Frequency in a Reverberation Chamber and its Simulation ...... 517 Liu Xiaoqiang, Wei Guanghui, Zhang Yongqiang, and Zhang Chenghuai

xi The Deployment Method and Control Strategy in Mobile Wireless Sensor Networks ...... 520 Chuyu Xiao, Yali Peng, and Min Yu Research on Data Fusion Algorithm in ZigBee Protocol ...... 524 Ping Wang, Ming-Chuan Cheng, and Wen-Zao Shi Influencing Factors with Respect to Basic Essence in National Defence for Chinese University Students ...... 528 Yanlong Cheng and Ying Ge White Blood Cell Detection Using a Novel Fuzzy Morphological Shared-Weight Neural Network ...... 532 Cheng Ke Termination of Nested Loop ...... 536 Bin Wu and Zhongqin Bi A Secure and Efficient Group Key Agreement for Ad Hoc Networks ...... 540 Tao Feng, Yilin Wang, and Jianfeng Ma Slot Time Synchronization for TDMA-Based Ad Hoc Networks...... 544 Fuqiang Wang, Peng Zeng, and Haibin Yu Conditional Markov Network Hybrid Classifiers Using on Client Credit Scoring ...... 549 Shuangcheng Wang, Cuiping Leng, and Piqiang Zhang A 3D Reconstruction System of Indoor Scenes with Rotating Platform ...... 554 Feng Zhang, Limin Shi, Zhenhui Xu, and Zhanyi Hu Large Scale Scenes Reconstruction from Multiple Views ...... 559 Shi Limin, Zhang Feng, Xu Zhenhui, and Hu Zhanyi Optimization Processing in Quadrilateral Meshes Generation Based on Cloud Data ...... 564 Wu Lijuan A Study on the One-Time Pad Scheme Based Stern-Brocot Tree ...... 568 Jiao Hongqiang, Tian Junfeng, and Wang Baomin Cracking Cancelable Fingerprint Template of Ratha ...... 572 Feng Quan, Su Fei, Cai Anni, and Zhao Feifei The Research and Implementation Research of Mobile Agent Technology in Commercial Data Query System ...... 576 Youqun Shi and Zhongwei Rong Image Rectification Using Affine Epipolar Geometric Constraint ...... 582 Sui Liansheng, Zhang Jiulong, and Cui Duwu Data Stream Grouping Aggregate Algorithms Based on Compound Sliding Window ...... 589 Yingli Zhong, Jinbao Li, Longjiang Guo, and Yan Yang Identification of Severe Precipitation Radar Echo Reflectivity with Back-Propagation ANN ...... 594 Jing Wang, Yuchun Gao, Yi Xiong, Minghu Cheng, and Shuai Zhu SAR Image Segmentation Method Using DP Mixture Models ...... 598 Sun Li, Zhang Yanning, Tian Guangjian, and Ma Miao Multi-view Object Segmentation Based on Epipolar Plane Image Analysis ...... 602 Liangzhong Fan, Xin Yu, Zhenyu Shu, and Qiaowen Zhang

xii A Storage Algorithm of Code Parameters in Embedded System Based on Dynamic Programming ...... 606 Xu Na, Zhang Xiaotong, Zhang Yan, Yuan Lingling, Zhang Lei, and Hu Guolin Training Samples Selection Method in Intrusion Detection System ...... 610 Cao Shuyan and Zhang Li Global Mild Solution for a Chemotaxis-Haptotaxis Model of Tumor Invasion ...... 613 Mingjun Wang and Minghao Li Image Auto Coregistration and Interferogram Estimation Using Matrix Fitting ...... 617 Sen Zhang, Jin-Song Tang, and San-wen Zhu A Unified Scheme for Fast EZW Coding Algorithm ...... 622 Huang Minghe and Zhong Cuixiang A Novel Method for Qualitative Modeling and Simulation Based on XML ...... 627 Chenxi Shao, Pengfei Chen, Lizhong Wang, and Fangfang Liu Active Authorization Rules for Enforcing RBAC with Spatial Characteristics ...... 632 Zhu Tang, Shiguang Ju, and Weihe Chen A New Dynamic Network Monitoring Based on IA ...... 637 Wu Fang, Zhao Zhijin, and Ye Xueyi A Novel Timing Synchronization Method for SC-FDE Systems ...... 641 Li-xun Huang and Li-jun Sun An Optimized Chord Algorithm for Accelerating the Query of Hot Resources ...... 644 Jiajing Li and Xudong Yang An Algorithm of Offsetting Complex Region Based on AutoCAD ...... 648 Fei Gao Promoting Adaptation of Semantic Web Service Composition Using Context Information ...... 652 Lirong Qiu, Yongcun Cao, Xiaobing Zhao, and Guosheng Yang A New Face Tracking Algorithm Based on Local Binary Pattern and Skin Color Information ...... 657 Wang Chuan-xu and Li Zuo-yong A New Kind of Super-Resolution Reconstruction Algorithm Based on the ICM and the B-spline Interpolation ...... 661 Xiang-guang Zhang An Improved Algorithm of Human Skin Detection in Video Image Based on Linear Combination of 2-order Markov and Wiener Predictor ...... 665 Liu Yun and Wang Chuan-xu A Layered Service Registry Model in Government Information Resource Governance and Interchange ...... 669 Jun Liu, Jianzhong Qiao, Shukuan Lin, and Su Ge AHP Methodology for Partner Selection in Collaborative Design ...... 674 Junming Hou, Chong Su, and Wanshan Wang Eucommia Bark Quality Assessment Based on Rough Sets and Perceptron ...... 678 Tie Wang, Zhiguang Chen, Gaonan Wang, and Jianyang Lin

xiii Energy Analysis Method of Computational Complexity ...... 682 Wang Peng A Mini Arc Recognition Algorithm Based on the Topological Inference ...... 686 Xiaoyu Song, Bin He, and Yonghui Wang Stereo Matching Based on Local Invariant Region Identification ...... 690 Qian Hu and Zhengqiu Yang The Research and Design of Log Management System Based on Struts Frame ...... 694 Yue Tian, Xiaobin Li, and Zhengqiu Yang The Experimental Research on the Method of Integrating AHP with GIS ...... 698 Ji-ping Liu, Na Zhou, and Yong Wang Memory Leak Detection in Sun Solaris OS ...... 703 Qinqin Ni, Weizhen Sun, and Sen Ma Research on Edge Detection and Description of Packaged Grain Image ...... 708 Ying Lin, Xing-lin Fang, Yue-heng Sun, and Yan-hong Sun Study for Packaged Granary Grain Quantity Intelligent Reckoning ...... 712 Ying Lin, Yong Liu, Yueheng Sun, and Yueheng Sun Adaptive Filter by Using Segment Proportionate Extended Correlation LMS Algorithm in the Double-Talk Condition ...... 716 Rui Chen, Zhifeng E, Jiawen Hu, and Mohammad Reza Asharif A Dynamic Clustering-Based Algorithm for Wireless Sensor Networks ...... 720 Limin Meng, Kai Zhou, Jingyu Hua, and Zhijiang Xu A Reliable Distributed Process Management System ...... 724 Lei Zhang, Xingshu Chen, and Bo Xu Chinese Partial Parsing with Modal Finite-State Approach ...... 729 Yiqiang Zhao, Junfang Zeng, and Yiping Yang Resemblance Object-Class Relationships in Fuzzy Object-Oriented Databases ...... 734 Z.M. Ma Towards a Framework of Aspect-Oriented Modeling with UML ...... 738 Xiao-cong Zhou, Chang Liu, Yan-tao Niu, and Tai-zong Lai Research and Implementation of Screen Printing System Based on Hybrid CMP ...... 742 Qing Cheng Li, Liu Yang, Zheng Xuan Bai, and Hai Jun Hu Research on ASP-Based Information Security System ...... 746 Linzhen Zhou, Defang Liu, and Bin Wang A Formal Description Method for Aspect-Oriented Statechart Based on CSP ...... 750 Bin Wang, Chunhua Zhu, and Jinfang Sheng Research on Key Technique of Weed Locating Based on Binocular Vision System ...... 754 Zhu Wei-xing, Xia Li-bing, and Xiong Feng Hand's Skin Detection Based on Ellipse Clustering ...... 758 Hao-kui Tang and Zhi-quan Feng Research on Features Extraction from Frame Image Sequences ...... 762 Zhiquan Feng, Peilin Du, Xiaona Song, Zhengxiang Chen, Ting Xu, and Deliang Zhu Molecular Dynamics Study of Streptavidin Binding to Surface-Immobilized Biotin ...... 767 Qingbin Li, Sergey Gusarov, and Andriy Kovalenko

xiv Deviation Problem and its Solving ...... 771 Xin Wang, Hui-tong Jia, Yu-lian Ma, and Yu-dong Wang Using Data Recovery Models for Multi-shift Scheduling in Wireless Sensor Networks ...... 777 Xu Xu, Yu-Hen Hu, Wei Liu, and Jingping Bi An Octree Ray Casting Algorithm Based on Multi-core CPUs ...... 783 Gu Jing and Wei Song Study on a Real-Time Image Object Tracking System ...... 788 Qiang Wang and Zhanhong Gao The Evaluation of B2C E-Commerce Web Sites Based on Fuzzy AHP ...... 792 Jun Fei and Lihua Yu Design and Implementation of a Power System Sensor Network for Wide-Area Measurement ...... 796 Qi Huang, Shi Jing, Chang-hua Zhang, and Yong Chen Application of Mobile Agent and Trusted Third Party on Digital Copyright Protecting in E-commerce ...... 800 Fu Cheng You A Transmission Scheme for Encrypted Speech over GSM Network ...... 805 Yucun Yang, Suili Feng, Wu Ye, and Xinsheng Ji

Author Index - Volume 2 ...... 809

xv