By Topic

Educational and Network Technology (ICENT), 2010 International Conference on

Date 25-27 June 2010

Filter Results

Displaying Results 1 - 25 of 148
  • [Front and back cover]

    Publication Year: 2010, Page(s):c1 - c4
    Request permission for commercial reuse | PDF file iconPDF (80 KB)
    Freely Available from IEEE
  • Impact of non academic websites usage on female students academic performance (a case study)

    Publication Year: 2010, Page(s):29 - 33
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (566 KB) | HTML iconHTML

    Recently all or most of the academic institutions have made substantial investment in computing and building internet infrastructure with an objective to improve productivity of students and faculty members. However non academic websites are dominantly using and social networking sites are becoming extremely popular for internet users especially for college students. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A research on cloud computing based on IEEE1451

    Publication Year: 2010, Page(s):381 - 383
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (728 KB) | HTML iconHTML

    In view of the disadvantages of traditional measurement and control system, this article has proposed a cloud computing based on IEEE1451. It has defined the functions and goal of this system through the analysis of market demands, set up a hierarchical structure model, and established a software structure and application pattern with the combination of C/S structure and B/S structure. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Drive design for ship GPS navigation equipment based on Linux operating system

    Publication Year: 2010, Page(s):384 - 388
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (557 KB) | HTML iconHTML

    This paper introduces the drive design for the GPS and LCD modules in ship GPS navigation system realized by adopting the embedded processor with an ARM920T kernel and the Linux operating system design. This design adopts GPS module and TFT LCD module. Drive development of the LCD and GPS modules in GPS navigation system is very important. TFT LCD module gives clear display in specific environment... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prediction of fiber diameter on spunbonding fabric using neural network and physical model

    Publication Year: 2010, Page(s):389 - 392
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (682 KB) | HTML iconHTML

    Two modeling methods (physical model, and artificial neural network model) are developed to predict the fiber diameter of spunbonding nonwovens. By analyzing the results of two models, the effects of process parameters on fiber diameter can be predicted. The results show the artificial neural network model can yield more accurate and stable predictions than the physical model, and it can yield rea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predicting the hairiness of cotton yarn in winding process

    Publication Year: 2010, Page(s):393 - 396
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (155 KB) | HTML iconHTML

    The objective of this work is to investigate the predictability of the hairiness of the cotton yarn from a cone winding machine using a multilayered perception (MLP) feed -forward back-propagation network in an artificial neural network system. A five-quality index (feeder distance, winding speed, thread cleaner gauge, tension washer weight, and rupture ring highness) and cotton yarn hairiness of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of control system of automatic leaf spring end eye forming machine

    Publication Year: 2010, Page(s):397 - 401
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB) | HTML iconHTML

    The automatic leaf spring end eye forming machine is special equipment which is used for the trimming (or corner cutting) and end eye forming of leaf-spring. The control system and program has been developed. The Centralized control mode has been adopted by PLC in the machine. The control system software construction is the modular program type. Equipped with Electro-hydraulic servo-driven hydraul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design of disabled people assistant

    Publication Year: 2010, Page(s):402 - 405
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1007 KB) | HTML iconHTML

    Recent results on the design of a set of electric wheelchair system for the disabled and the elderly are presented in this paper. This system could be controlled by either touching screen or human voice. The equipment for physiological index detecting is installed on the wheelchair, it can indicate the health level of people. By touching the screen on the wheelchair, you can make a phone call, con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Influence of SMAX on bandwidth utilization for ControlNet

    Publication Year: 2010, Page(s):406 - 409
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (983 KB) | HTML iconHTML

    The ControlNet is a high speed and deterministic network. It has been developed by Rockwell Automation. The ControlNet network's mission is to provide reliable, high-speed transport of two basic types of application information: control and I/O data; non-time critical messaging data related to the controlled system. This is accomplished by partitioning the bandwidth into a scheduled portion that i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    Research of software protection

    Publication Year: 2010, Page(s):410 - 413
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (435 KB) | HTML iconHTML

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    Research on a distributed intelligent framework based on semantics

    Publication Year: 2010, Page(s):414 - 417
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (663 KB) | HTML iconHTML

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Warfighting simulation system for system effectiveness analysis of Hypersonic Cruise Missile

    Publication Year: 2010, Page(s):418 - 421
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB) | HTML iconHTML

    Recent efforts on warfighting simulation systemfor predicting system effectiveness of Hypersonic Cruise Missile(HCM) are reviewed in this paper. The focus of this workis to develop an M&S environment as an effectiveness analysis tool for statistical analyzing outputs from warfighting simulation under prescribed engagement scenario. Prior to the engagement simulation, a effectiveness analysis f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrated project based learning in software engineering education

    Publication Year: 2010, Page(s):34 - 36
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB) | HTML iconHTML

    This paper presents an education framework to effectively develop crucial software engineering skills in students of software Engineering major at National Exemplary Software School (NESS), Xiamen University. The goal is to describe a systematic approach towards integrating project based learning in software engineering major, both inside and outside the classroom. An essential part of Software En... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on the detecting system of distributed nodes based on RS-485 bus

    Publication Year: 2010, Page(s):422 - 425
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (983 KB) | HTML iconHTML

    In order to achieve the largest number of distributed network nodes and increase the communication security of network system in the conditions of long-range and high data rate, we introduce registration mechanism of communication nodes with distributed network nodes as the research object in this paper. With the application of single chip microcomputer (SCM) technology, we designed and implemente... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A flexible computer based assessment system that uses flash disk

    Publication Year: 2010, Page(s):426 - 429
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (677 KB) | HTML iconHTML

    In this paper we introduce the use of a Computer Based Assessment (CBA) system; discuss the functionality, usability and reliability of the system. The system has a simple and user-friendly interface, and it just executes a program on a stand-alone computer or on an online computer without changing hardware or software. It can be used for mid-term or final exam in small-scale for many courses. The... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    Dynamic analysis of forest biomass in Changbai Mountain

    Publication Year: 2010, Page(s):430 - 432
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1119 KB) | HTML iconHTML

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The method of cluster and entropy apply in city distribution center location

    Publication Year: 2010, Page(s):433 - 437
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1235 KB) | HTML iconHTML

    As a junction of city logistics system, the reasonable location of city distribution center plays a great significance. To some extent, some common schemes of location are not application of the city distribution center as today's city has its own characteristic. We need to use some suited methods together to solve this problem. To the current status of urban congestion and high cost of logistics ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stiffness analysis of pre-loaded hollow cylindrical roller bearings based on ABAQUS

    Publication Year: 2010, Page(s):438 - 440
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (585 KB) | HTML iconHTML

    Stiffness is an important parameter of pre-loaded hollow cylindrical roller bearing, but the traditional theory is not fit for this highly nonlinear problem. In order to find out the impact of hollow-ratio, interference magnitude and load on pre-loaded hollow cylindrical roller bearing's stiffness, a kind of modern analysis software named ABAQUS was used to create the finite element model. The ana... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    Analysis on the related factors in sports tourism participation of college students

    Publication Year: 2010, Page(s):441 - 444
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (554 KB) | HTML iconHTML

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finite element simulation of machining of Incoloy 907 with thermodynamical constitutive equation

    Publication Year: 2010, Page(s):445 - 448
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1196 KB) | HTML iconHTML

    In this paper a finite element analysis (FEA) of machining for Incoloy 907 is presented. In particular, the thermodynamical constitutive equation(T-C-E) in FEA is applied for both workpiece material and tool material. Cutting temperature and tool wear depth are predicted. The comparison between the predicted and experimental cutting temperature and tool wear depth are presented and discussed. The ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Remaining fingerprint segmentation based on convex hull model

    Publication Year: 2010, Page(s):449 - 453
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (837 KB) | HTML iconHTML

    For the problem that the remaining fingerprint cannot be segmented easily, this paper proposes a segmentation algorithm for fingerprint images with remaining ridges based on convex hull model. The algorithm firstly pre-processes fingerprint images,and then discrete points information of fingerprint ridge edge is extracted based on edge detection, subquently the center point as the seed point detec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient Ad Hoc On-Demand Distance Vector routing protocol

    Publication Year: 2010, Page(s):454 - 458
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (717 KB) | HTML iconHTML

    In this paper, we propose a method to improve fault tolerance and load balancing in Ad hoc On-Demand Distance Vector (AODV) routing protocol. This is desirable because in ad hoc settings, mobility may cause routes to break frequently and hence alternative paths are needed. The original AODV only maintains one path for a source-destination pair. This has three disadvantages. First, it will result i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The process of designing and developing a Romanised Mandarin web-based instruction on ISD methodology for non-native learners in Malaysia

    Publication Year: 2010, Page(s):459 - 462
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (774 KB) | HTML iconHTML

    One of the ways to deliver a language course on learners' demand using any computer connected to the Internet at anywhere and anytime is by developing a Web-based instruction (WBI). Besides, it can be more effective if WBI incorporates multimedia components. `A picture tells a thousand words', thus, a Mandarin WBI that includes multimedia elements will increase the effectiveness in learning Mandar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Devices for developing course video resources on the basis of low energy consumption

    Publication Year: 2010, Page(s):37 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (692 KB) | HTML iconHTML

    Schools typically consume significant amounts of energy. Analyses of the existing processes of developing course video resources as well as the devices used in these processes suggest that there is a potential to reduce energy consumption. Examinations of the tasks of developing course video resources show that more resources are developed than what is needed for real-time remote education, and th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An identity-based signature scheme with public key recovery

    Publication Year: 2010, Page(s):463 - 466
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (346 KB) | HTML iconHTML

    In this paper, a new authentication mechanism is proposed, which reverses the protocol validation process into biometrics recognition to resolve uncertainty in the biometric data under the conditions of the inherent fault-tolerance in a variety of biometric technologies. The new signature scheme presented in this paper is based on the elliptic curve discrete logarithm problem (ECDLP) and large int... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.