By Topic

2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)

Date 20-22 Aug. 2010

Go

Filter Results

Displaying Results 1 - 25 of 154
  • [Front and back cover]

    Publication Year: 2010, Page(s):c1 - c4
    Request permission for commercial reuse | PDF file iconPDF (1496 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2010, Page(s):i - xix
    Request permission for commercial reuse | PDF file iconPDF (256 KB)
    Freely Available from IEEE
  • Research on hydraulic control system fault diagnosis method based on rough set theory

    Publication Year: 2010, Page(s):V1-1 - V1-5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (357 KB) | HTML iconHTML

    Hydraulic control system is a typical highly nonlinear system, the loops of the system are coupled each other, so that the failure modes, failure mechanism of the hydraulic control system is very complex and diverse. Fault diagnosis of hydraulic control system is a uncertainty, incomplete information systems, which makes wrong diagnosis. Directing to the hydraulic press's hydraulic control system,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preliminary design of GIS-based LCA database

    Publication Year: 2010, Page(s):V1-6 - V1-9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (482 KB) | HTML iconHTML

    This paper discussed the necessity, the possibility and the method of introducing GIS technology into LCA database study, analyzed the database structure and data elements of LCA database that included the data of the three pillars -ecology, economics, and social equity, a more comprehensive LCA database is innovated in this study. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The hydrological time series forecasting based on multi-model combination

    Publication Year: 2010, Page(s):V1-10 - V1-13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (370 KB) | HTML iconHTML

    Considering the current forecasting model had limited understanding of watershed hydro meteorological and a single model could hardly reflect the objective laws, by theoretical studying and practicing of combined forecasting method, the hydrological time series forecasting method based on multi-model combination was proposed. This method makes up for the lack of a single model, and makes full use ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The study for solving the attitude of feed transfer flexible guidance with principle of minimum potential energy

    Publication Year: 2010, Page(s):V1-14 - V1-18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (798 KB) | HTML iconHTML

    The relation of feed transfer flexible guidance attitude with elevation and rotation of gun is studied in this paper. By analyzing the structure and movement characteristics of guiding system, a mathematical model for solving three-dimensional attitude of flexible guidance is proposed with principle of minimum potential energy, and the computing software is developed to confirm the attitude of fle... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability analysis of hyperstatic inclined truss structure

    Publication Year: 2010, Page(s):V1-19 - V1-22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (679 KB) | HTML iconHTML

    Based on load incremental approach, finite element model of inclined truss structure is established by using Ansys software. Then load factor, unit of effective strength and load increments is obtained by finite element analysis. With a minimum load increment norms and the branch - bound norms of the stage critical strength, the main failure modes of inclined truss structure is educed. Finally the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SPH method and its application in hypervelocity impact

    Publication Year: 2010, Page(s):V1-23 - V1-26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (453 KB) | HTML iconHTML

    SPH is a meshfree numerical method that allows the possibility of easily modeling flows with a complex geometry or flows where large deformations or the appearance of a free surface occurs. It is widely used for hypervelocity impact problems. This paper introduces the basic principles of SPH method. Major advantages and disadvantages of SPH method are discussed and listed. Application of SPH metho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling rank-probability of relevance relationship in resultant document list for data fusion

    Publication Year: 2010, Page(s):V1-27 - V1-31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (677 KB) | HTML iconHTML

    In this paper we present a new data fusion method in information retrieval, which uses ranking information of resultant documents. Our method is based on the modelling of rank-probability of relevance of documents in resultant document list using logarithmic models. The proposed method is more effective than other data fusion methods which also use ranking information, and is as effective as some ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of a feature fusion model based on spatial equilibrium

    Publication Year: 2010, Page(s):V1-32 - V1-35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (735 KB) | HTML iconHTML

    When multiple features can affect your decision, how do you deal with this situation? Content-based image retrieval (CBIR), the selection of images from a collection via features extracted from images themselves, is a typical case of this problem. A simple but highly efficient model based on spatial equilibrium is presented to solve this problem in this paper. Three styles of model can meet the di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of 3-D terrain generation module in game

    Publication Year: 2010, Page(s):V1-36 - V1-40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB) | HTML iconHTML

    This paper elaborates the theory about how to use the information which is got from the gray-scale map to establish a lively three dimensioned terrain. This paper designs and implements a demonstration to generate the effect of three-dimensional terrain. The system uses the gray-scale map of each pixel of light and shade information to generate the three-dimensional terrain coordinates of the poin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of library information management system based on SQL

    Publication Year: 2010, Page(s):V1-41 - V1-44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (140 KB) | HTML iconHTML

    The work to manage book is an extremely important link in the higher education, and it is the core and foundation of all universities and colleges. Changes as soon as possible traditional management mode, making use of the modern means to proceed science manage, having had became the problem then whole education system need solution. the author briefly introduces the development purpose and the ba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The homotopy interior point method for solving a class of nonlinear nonconvex programming problems

    Publication Year: 2010, Page(s):V1-45 - V1-49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB) | HTML iconHTML

    In this paper, we study the following nonlinear nonconvex programming problem (P): min f(x) s.t.g(x) ≤ 0 g(x) = (g1(x), g2(x), ⋯, gm(x))T, {1, 2, ⋯, m} Under the condition that the feasible set is bounded and connected, and has a point that the boundary is not positively linearly independent at this point, we propose the combined hom... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image recombination based side information reconstruction in Wyner-Ziv video coding

    Publication Year: 2010, Page(s):V1-50 - V1-53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1058 KB) | HTML iconHTML

    Wyner-Ziv video coding (WZC) exhibits many properties like low-complexity encoding or embedded error resilience. The quality of side information takes an important role in the performance of WZC. In order to improve the performance of WZC, a new side information interpolation algorithm is proposed in this paper. In our approach, adjacent frames are recombined before encoding. At the decoder, side ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RMCC: A ROLAP data model of minimal condensed Cube

    Publication Year: 2010, Page(s):V1-54 - V1-58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    Data cubes facilitate online analytical processing (OLAP) systems greatly. Ever since the Cube-by operator was introduced by Jim Gray in 1997, techniques for computing, compressing and efficiently accessing data cubes have been substantially studied due to the enormous storage size as the number of dimensions and dimension cardinalities increase. Minimal condensed cube, one of these data cube comp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of network time synchronization algorithm based on frequency adjustment

    Publication Year: 2010, Page(s):V1-59 - V1-63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB) | HTML iconHTML

    Time synchronization is critical in distributed network system. A variety of network protocols, middleware and business applications rely on proper time synchronization across the computational infrastructure and depend on the clock accuracy. The “Network Time Protocol” (NTP) is the current widely accepted standard for synchronizing clocks over the Internet. In order to reduce access... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design-of-experiment based simulation and optimization of cam profile

    Publication Year: 2010, Page(s):V1-64 - V1-69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1163 KB) | HTML iconHTML

    The primary objective of the work was to create an innovative approach to design and optimize the cam profile on the basis of DoE (Design of Experiments) method as well as to take advantage of the simulation tool, AVL Excite Timing Drive, to facilitate the redesign and analysis of the valvetrain. Furthermore, the comparison of results in kinemics and dynamics between the original and modified cam ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research and application on Set Pair Analysis for E-government comprehensive evaluation model

    Publication Year: 2010, Page(s):V1-70 - V1-74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (526 KB) | HTML iconHTML

    For scientifically assessing the level of E-government development and giving a scientific, rational, comprehensive as well as fair appraisal assessment with regard to the implementation of the E-government status, it is necessary to reasonably position the role of the E-government, upgrade the government's projects. So it's important to evaluate the E-government. Set pair Analysis has not been im... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multilevel information security filtering model design based on data packet

    Publication Year: 2010, Page(s):V1-75 - V1-77
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB) | HTML iconHTML

    This paper proposed multilevel information security filtration model based on data packet, which filters unhealthy webpage through basic URL address filtration and content filtration, and the further data packet filtration, and well realizes the accuracy of filtration and the security of network. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on 3D object recognition from wire-frame based on edge moment

    Publication Year: 2010, Page(s):V1-78 - V1-82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (509 KB) | HTML iconHTML

    This paper presents a method based on sub-area edge moment for the recognition of three-dimensional objects from wire-frame. In the recognition of 3D objects, 3D object wire-frame is divided into several fan-shaped sub-areas with the centroid as the center. By using improved edge moments calculation method, the low-order edge moments for each sub-area were computed. Then low-order edge moments for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two protocols for computing the sub-polygon's areas divided by a line

    Publication Year: 2010, Page(s):V1-83 - V1-86
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (233 KB) | HTML iconHTML

    Secure Multi-party Computation (SMC) plays an important role in information security under the circumstance of cooperation calculation, so SMC on privacy-preservation is of great interest. In this paper we discuss an issue which is a special SMC problem. Based on Scalar Product Protocol, Monte Carlo Method and Oblivious Transfer, we give two solutions to the problem about how to decide the areas. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A formal model to verify authentication protocols with timeout strategy

    Publication Year: 2010, Page(s):V1-87 - V1-90
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (223 KB) | HTML iconHTML

    We propose a formal model to verify authentication protocols with timeout strategy. After investigating a state-of-the-art model checker named SATMC, the connotative time involved in the rule labels is revealed and utilized, which allows us to re-evaluate the security of authentication protocols with timeout strategy. We illustrate our model by analyzing the security of NSPK protocol. Finally, the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on passive decoy-state protocols for quantum key distribution

    Publication Year: 2010, Page(s):V1-91 - V1-94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (557 KB) | HTML iconHTML

    Decoy states have recently been proposed as a useful protocol for substantially improving the performance of quantum key distribution (QKD). The passive decoy-state protocol has the advantage of easier implementation, higher transmission rate and better security compared with the active decoy-state protocol. This paper analyzes the passive decoy-state protocol with different light sources, includi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dissipativity of neural networks with impulsive and delays

    Publication Year: 2010, Page(s):V1-95 - V1-98
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (221 KB) | HTML iconHTML

    In this paper, non-autonomous neutral-type neural network system with impulsive and delays is considered. By using a singular impulsive delay differential inequality, a sufficient condition ensuring the uniformly dissipative of the solution of non-autonomous neutral-type neural networks with impulsive and delays are obtained. The results can extended and improved the earlier publications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recognizing broken characters in Thai Historical documents

    Publication Year: 2010, Page(s):V1-99 - V1-103
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (726 KB) | HTML iconHTML

    One of the biggest challenges in restoring historical documents is to achieve a high level of OCR accuracy. The main characteristic inherent to these valuable but degraded documents is the abundant presence of broken characters. This paper represents this problem as a mathematical model. We also propose a novel solution based on set-partitions to recognize broken characters in Thai Historical docu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.