By Topic

Computer Science-Technology and Applications, 2009. IFCSTA '09. International Forum on

Date 25-27 Dec. 2009

Go

Filter Results

Displaying Results 1 - 25 of 126
  • [Front cover - Vol 3]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (4575 KB)
    Freely Available from IEEE
  • [Title Page i - Volume 3]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • [Title page iii - Volume 3]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (57 KB)
    Freely Available from IEEE
  • [Copyright notice - Volume 3]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Table of contents - Volume 3

    Publication Year: 2009, Page(s):v - xii
    Request permission for commercial reuse | PDF file iconPDF (136 KB)
    Freely Available from IEEE
  • Welcome Message from the General Chair - Volume 3

    Publication Year: 2009, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (100 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organization and Program Committees - Volume 3

    Publication Year: 2009, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (59 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009, Page(s):xv - xvi
    Request permission for commercial reuse | PDF file iconPDF (65 KB)
    Freely Available from IEEE
  • An Application of DSP in Constant Tension Coiling Control

    Publication Year: 2009, Page(s):3 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (287 KB) | HTML iconHTML

    Main subjects discussed in this dissertation focus on the tension control. The tension control accuracy has very big influence to the quantity of the finished product. As a result, the tension control in unwinding and winding processes become very important. Because of the scale that the tension request in fiber winding system is small, this paper use magnetic particle brake and magnetic particle ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embedded Smart Camera in Measuring Area of Plant Leaves

    Publication Year: 2009, Page(s):6 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB)

    In order to build a more compact, simple, mobile and reliable vision measurement system in plant physiological parameter measurement, we choose the smart camera and infrared light source as the principle components. The hardware architecture of smart camera and the software development process is described. An example of leaf area measurement algorithm is shown which include camera calibration sec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • (α,β)-Fuzzy Ideals of BCH-Algebras

    Publication Year: 2009, Page(s):10 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (281 KB) | HTML iconHTML

    In this paper by two relations belonging to ϵ and quasi-coincidence (q) between fuzzy points and fuzzy sets, the notions of (α,β)-fuzzy ideals of BCH-algebras and the level ideal of (α,β)-fuzzy ideals of BCH-algebras are introduced where α,β are any two of {ϵ, q, ϵ ν q, ϵ ∧ q} with α ≠ &... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Speech Enhancement Method Based on Signal Subspace and Hearing Masking Effect

    Publication Year: 2009, Page(s):15 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (333 KB) | HTML iconHTML

    A speech enhancement method based on signal subspace and hearing masking effect is proposed. This method has following steps. Firstly, by subspace filter the noisy speech is enhanced. Then by Johnston hearing masking model the noise hearing masking threshold is gained. Finally, by a perceptual filter based on hearing masking effect the enhanced speech is smoothed, the clean speech is gained. Simul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parameters Optimization Method for Variable Displacement Pump/Motor and Transmission of Hydraulic Braking Energy Regeneration System

    Publication Year: 2009, Page(s):19 - 22
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (234 KB) | HTML iconHTML

    Hydraulic accumulator type braking energy regeneration system have the advantages of high power density, low cost and reliable property, which is suitable for the traditional engine driving bus. The variable displacement hydraulic pump/motor is used the braking energy recovery system as regeneration conversion device, its structure parameters affected braking energy recovery rate and regeneration ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Research on Curriculum System Establishment and Training Model Reform - The Educational Reform for Specialty Direction of Vehicle Electronic Technology in Shandong University of Technology

    Publication Year: 2009, Page(s):23 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (271 KB) | HTML iconHTML

    Engineering talents cultivation is the basic function of universities and colleges. The fundamental target was training innovative high-tech talents to meet needs of society. In this paper, based on analyzing the application status and development trend of computer-controlled technology on vehicle engineering, the knowledge structure of vehicle electronic technology professionals was investigated,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ricean Factor Estimation and Performance Analysis

    Publication Year: 2009, Page(s):27 - 30
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB) | HTML iconHTML

    In wireless communication, Ricean K factor which is the relative strength of the direct and scattered components of the received signal, is an important reflection of channel quality parameters. Therefore, the estimate of Ricean factor is great significance. Based on the introduction of the estimation methods of K from envelope and from the I/Q components, there is an academic analysis about the p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Feature Extraction Method Assembled with PCA and ICA for Network Intrusion Detection

    Publication Year: 2009, Page(s):31 - 34
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    In network intrusion detection systems, feature extraction plays an important role in a sense of improving classification performance and reducing the computational complexity. Principle Component Analysis and Independent Component Analysis are both common feature extraction methods currently. This paper proposed a novel feature extraction method for network intrusion detection and the core of thi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research and Practice on the Teaching Reform of Computer Fundamentals Course

    Publication Year: 2009, Page(s):35 - 37
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (219 KB) | HTML iconHTML

    Aiming at the problems in traditional teaching methods of computer fundamentals course, a series of reform measures are put forward, such as innovating teaching methods, paying attention to cultivate the practical ability of students, and constructing network teaching platform to enrich the teaching resources and enhance the communication between teachers and students. Students can download many r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pedagogy in the Information Age: Moodle-Based Blended Learning Approach

    Publication Year: 2009, Page(s):38 - 40
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (217 KB) | HTML iconHTML

    Traditional teaching style has advantage in transmitting large amount knowledge to students with systematic logic and with strong emotional contact between teachers and students. Online delivery system is valuable in providing flexible learning experience and meeting diversified needs of student. Blended learning is a pedagogy that combines the features of traditional instruction and the advantage... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New Way to Lexical Acquisition: Approach of Corpus-Based Data Driven Learning

    Publication Year: 2009, Page(s):41 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (422 KB) | HTML iconHTML

    English proficiency is playing an important role in nearly every aspect of life: further education, job-huntng and career development. Lexical competence is regarded as one of the key factors to English learning. With traditional teaching method, students focus mostly on memorization of individual words and usage, which turn out to be boring and ineffective. The corpus-based data driven learning (... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RFID Complex Event Processing Mechanism for Logistics Tracking and Tracing

    Publication Year: 2009, Page(s):44 - 48
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB) | HTML iconHTML

    Radio Frequency Identification (RFID) is a promising technology for automated non-line-of-sight object identification. Traditional research of RFID middleware does not concern the business definition of RFID event and related integration with enterprise application system. Considering the requirement of logistics tracking and tracing service based on RFID technology, RFID semantic events which bas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Design and Implementation of Comprehensive Budget Management System

    Publication Year: 2009, Page(s):49 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    Nowadays, more and more attention is paid to budget management by China's enterprises. According to the requirements of budget management and the disadvantages of the existing system, this paper presents a new architecture of the comprehensive budget management system based on workflow, explains how to realize the system by three-tier structure of .NET and some design patterns. Finally, this paper... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Mobile Communication Solution Based on Accessing Identifier

    Publication Year: 2009, Page(s):54 - 57
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (281 KB) | HTML iconHTML

    Internets has severe problem in security and mobility because it use the only unique source IP address and destination IP address during the process of communication all the time, IP address is overloaded in semantics because it is used to represent both the location and the identity of a user, so a new mechanism should be proposed. Although there are many researchers have done lots of extensive a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quasi-orthogonal Space Time Block Code for Decode-and-Forward Relay Networks

    Publication Year: 2009, Page(s):58 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    A kind of quasi-orthogonal space time block code for decode-and-forward relay networks is analyzed in this paper. At the source, 4 single-antenna users transmit the quasi-orthogonal space time block code matrix. At the relay node, maximum-likelihood decoding algorithm is adopted and the decoded symbols are then encoded into quasi-orthogonal code which is transmitted through transmit antenna. At th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experimental Study on Automatic Control Technology in Prestressed Concrete Structure

    Publication Year: 2009, Page(s):62 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    Prestressed concrete is wildly used on slope retaining(anchor bar or anchor rope), bridge, architectonics engineering and so on. Combined automatic control technology with tensioning device, the prestress was tensioned directly by data change between tensioning robot and programmable automatic controller in system, the automatized process of construction could be practiced. It is shown that the du... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Analysis of Learning Autonomy of Educational Objects in Network Education Environment

    Publication Year: 2009, Page(s):67 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB) | HTML iconHTML

    This paper analyzes characteristics of network education, introduces the importance of education with network resources and the autonomous learning ability required in network education. It further proposes the main problems of students in network educational environment and provides relevant solutions and strategies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.