2010 Second International Conference on Computer and Network Technology最新文献

筛选
英文 中文
Peak Volume Characteristics of Urban Road Intersections: Case in Shanghai 城市道路交叉口峰值体积特征:以上海为例
2010 Second International Conference on Computer and Network Technology Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.82
Lianghui Qian, Xiaohong Chen
{"title":"Peak Volume Characteristics of Urban Road Intersections: Case in Shanghai","authors":"Lianghui Qian, Xiaohong Chen","doi":"10.1109/ICCNT.2010.82","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.82","url":null,"abstract":"The peak volume characteristics are of great significance to transportation planning, design, and management. However, the amount of researches conducted on the subject of site-to-site variability of the peak volume characteristics is relatively limited, which largely restrict the identification of appropriate peak volume factor and other pertinent parameters in traffic analysis. This paper discussed the site-to-site variability of the peak volume in Shanghai in detail based on three-year data. In this paper, 49 automatic traffic recorder stations at intersections were selected to collect traffic data in the central city of Shanghai from 2006 to 2008. The statistical characteristics of a.m. peak hour volume and peak period volume were then analyzed based on the data of intersections and approaches, respectively. The relationship between peak hour factors (or the ratios of peak hour volume to peak period volume) and volume, location, and road class were obtained by linear regressions. It was concluded that the peak volume characteristics varied from site to site evidently. Furthermore, the peak volume characteristics of intersections and of approaches were different. Lastly, the significant influencing factors were different for intersections and for approaches.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121924073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Stock Exchange of Thailand Index Prediction Using Back Propagation Neural Networks 利用反向传播神经网络预测泰国证券交易所指数
2010 Second International Conference on Computer and Network Technology Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.21
P. Sutheebanjard, W. Premchaiswadi
{"title":"Stock Exchange of Thailand Index Prediction Using Back Propagation Neural Networks","authors":"P. Sutheebanjard, W. Premchaiswadi","doi":"10.1109/ICCNT.2010.21","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.21","url":null,"abstract":"In this paper, we investigate predicting the Stock Exchange of Thailand Index movement. Currently, there are two stock markets in Thailand; the Stock Exchange of Thailand (SET) and the Market for Alternative Investment (MAI). This paper focuses on the movement of the Stock Exchange of Thailand Index (SET Index). The back propagation neural network (BPNN) technology was employed in forecasting the SET index. An experiment was conducted by using data of 124 trading days from 2 July 2004 to 30 December 2004. The data were divided into two groups: 53 days for BPNN training and 71 days for testing. The experimental results show that the BPNN successfully predicts the SET Index with less than 2% error. The BPNN also achieves a lower prediction error when compared with the Adaptive Evolution Strategy, but a higher prediction error when compared with the (1+1) Evolution Strategy.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114381580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Identifying Optimum Artificial Bee Colony (ABC) Algorithm's Parameters for Scheduling the Manufacture and Assembly of Complex Products 复杂产品制造装配调度中最优人工蜂群(ABC)算法参数的确定
2010 Second International Conference on Computer and Network Technology Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.25
Primpika Pansuwan, Niyada Rukwong, P. Pongcharoen
{"title":"Identifying Optimum Artificial Bee Colony (ABC) Algorithm's Parameters for Scheduling the Manufacture and Assembly of Complex Products","authors":"Primpika Pansuwan, Niyada Rukwong, P. Pongcharoen","doi":"10.1109/ICCNT.2010.25","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.25","url":null,"abstract":"Production scheduling in multiple-stage multiple- machine multiple-product environment is a NP hard problem usually faced by make/engineer-to-order companies engaged in capital goods Industry. Feasible schedules must correctly sequence the operations required to manufacture components and also satisfy assembly precedence relationships. This paper presents the development of Artificial Bee Colony algorithm for solving the scheduling problem. Based on Just in time philosophy, the proposed algorithm was designed to minimise the combination of earliness and tardiness penalties cost. The computational experiment was conducted using data obtained from a collaborating company that manufactures complex capital goods. The aim was to investigate the influence of parameter configuration on the algorithm performance. The analysis of variance on the experimental results indicated that the performance can be improved dramatically after adopting the optimum parameter setting.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133829789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Opportunistic Spectrum Access in OFDMA Systems OFDMA系统中的机会频谱接入
2010 Second International Conference on Computer and Network Technology Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.30
Shehzad Ahmad, A. Shahid, R. M. Ahmad, Adeel Akram, M. A. Nasim
{"title":"Opportunistic Spectrum Access in OFDMA Systems","authors":"Shehzad Ahmad, A. Shahid, R. M. Ahmad, Adeel Akram, M. A. Nasim","doi":"10.1109/ICCNT.2010.30","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.30","url":null,"abstract":"This paper presents the novel idea for opportunity detection (detecting unoccupied sub-carriers/sub-channels) in downlink (DL) orthogonal frequency division multiple access (OFDMA) systems using cognitive radio (CR) sensing techniques and sub-channel utilization history information. Assuming availability of information about the basic parameters of the primary system as well as time and frequency synchronization of CR user with primary system, three techniques have been proposed for detection of unoccupied sub-channels in DL OFDMA systems: 1) Detection Method— it identifies unoccupied sub-carriers/sub-channel in DL OFDMA systems by exploiting the CR sensing techniques (i.e. matched filter and energy detection). 2) Prediction Method— it forecasts the future sub-channel state (empty or occupied) by classifying sub-channel history into different traffic patterns using ‘Traffic Classification Algorithm’. 3) Hybrid of Detection and Prediction Method— it also utilizes ‘Traffic Classification Algorithm’ to decide when to use detection and prediction methods in order to determine either sub-channel will remain empty or occupied in next time slot.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115889621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing and Simulating the Inverse and the Direct Dynamics of Parallel Robot Stewart Platform 并联机器人Stewart平台的逆动力学与正动力学分析与仿真
2010 Second International Conference on Computer and Network Technology Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.84
Hamidreza Hajimirzaalian, H. Moosavi, M. Massah
{"title":"Analyzing and Simulating the Inverse and the Direct Dynamics of Parallel Robot Stewart Platform","authors":"Hamidreza Hajimirzaalian, H. Moosavi, M. Massah","doi":"10.1109/ICCNT.2010.84","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.84","url":null,"abstract":"The novelty of the paper is the comparison between the inverse dynamic solution based on Lagrangian formulation and the direct dynamic solution of the Stewart platform by simulation with ADAMS commercial engineering package. In this paper, based on the inverse kinematics, the Jacobian matrix and the dynamic equations of the six-degree-of-freedom Stewart platform are derived. The Inertia matrix and Coriolis-Centrifugal terms which are essential for control analyzing of this robot are also obtained. Finally, the results of the analytical solution using Lagrange method for a specific movement path which is simulated by ADAMS are compared and verified.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134318599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Signal Strength Seeded Frequency Hopping 信号强度种子跳频
2010 Second International Conference on Computer and Network Technology Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.83
Robert Kelley, Anup Kumar, Bin Xie, Xianqian Liu
{"title":"Signal Strength Seeded Frequency Hopping","authors":"Robert Kelley, Anup Kumar, Bin Xie, Xianqian Liu","doi":"10.1109/ICCNT.2010.83","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.83","url":null,"abstract":"One approach to securing radio signals in wireless sensor networks is frequency hopping in which transmitters and receivers change frequencies at a predetermined interval using a pattern of frequencies that is programmed a priori or calculated dynamically via ashared seeding mechanism. For these systems, if an adversary can physically capture a node in the network and steal the seed or hopping set, it can compromise the network. To protect against this weakness, we propose Signal Strength Seed Frequency Hopping, a hopping set selection scheme in which the seed used to calculate a dynamic hopping set is generated using signal strength measurements collected after the network has been deployed. We show our scheme has sufficient stochasticity to produce hopping sets that cannot be easily reproduced by an adversary.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133886099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantic Technology: An Efficient Approach to Monogenean Information Retrieval 语义技术:单基因信息检索的一种有效方法
2010 Second International Conference on Computer and Network Technology Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.127
Alfred S, Arpah A, L. H. S. Li, Sarinder K K S
{"title":"Semantic Technology: An Efficient Approach to Monogenean Information Retrieval","authors":"Alfred S, Arpah A, L. H. S. Li, Sarinder K K S","doi":"10.1109/ICCNT.2010.127","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.127","url":null,"abstract":"Biological data is huge and increasing rapidly therefore data storing and mining will become major challenges. We have encountered several key problems related to limitations in the database management system (DBMS) used and information retrieval in our in-house Monogenean-host database. In this paper we will be presenting the ontology developed that is specific to our dataset using semantic technology to overcome these problems. Our Taxonomy ontology is built based on accepted taxonomic classification system and semantic key identifier therefore problems in information retrieval are minimized. Our focus is on the images used in taxonomy and how to retrieve them based on semantic identifiers.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131115671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of AHP to Evaluation on Failure Causes Analysis for Lithography Machine 层次分析法在光刻机故障原因分析评价中的应用
2010 Second International Conference on Computer and Network Technology Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.111
Po-Sheng Ko, Cheng-Chung Wu, Hsin-Hung Chen, Chung-Wen Yang
{"title":"Application of AHP to Evaluation on Failure Causes Analysis for Lithography Machine","authors":"Po-Sheng Ko, Cheng-Chung Wu, Hsin-Hung Chen, Chung-Wen Yang","doi":"10.1109/ICCNT.2010.111","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.111","url":null,"abstract":"This study conducted hierarchical analysis on the evaluation item of the stability index of the lithography machine, and established a set of evaluation mechanism for failure prediction, in order to provide references and indicators of troubleshooting for lithography machine. The results showed, when the lithography machine is out of order, the possible failure causes are mainly be found based on the past experiences. This study also found that, under the good configuration of maintenance system, adequate information is closely associated a good system. As for lithography process in semiconductor industry, the complexity of broken Wafer is first considered. Thus, the overall lithography process of semiconductor relies on engineers’ experience. More specifically, a quick error interpretation and repair are required in field maintenance. As in a competitive market of semiconductor processing with high-tech and high-cost, a timely maintenance in the lithography machine is urgent and requested.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120827532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Best-Worst Ant Colony System Parameter Investigation by Using Experimental Design and Analysis for Course Timetabling Problem 基于实验设计和分析的最坏蚁群系统参数研究课程排课问题
2010 Second International Conference on Computer and Network Technology Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.24
T. Lutuksin, P. Pongcharoen
{"title":"Best-Worst Ant Colony System Parameter Investigation by Using Experimental Design and Analysis for Course Timetabling Problem","authors":"T. Lutuksin, P. Pongcharoen","doi":"10.1109/ICCNT.2010.24","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.24","url":null,"abstract":"Course timetabling usually arises every academic year and is solved by academic staff with/without course timetabling tool. The desirable timetable must be satisfied by hard constraints whilst soft constraints are not absolutely essential. Course timetabling is known to be NP-hard problem, which means that the computational time required to find the solution increases exponentially with problem size. Automated timetabling system has been developed for university courses scheduling. In this work, new variant of Ant Colony Optimisation called Best-Worst Ant Colony System (BWACS) was applied to solve university course timetabling problem. Advance statistical tools for experimental design and analysis were used to investigate and analyse the factor influence of this system and conclude the appropriate parameter setting of BWACS.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122292351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Energy Absorption of Thin-Walled Composite Tubes Subjected under Quasi-static Compression 准静态压缩下薄壁复合材料管的能量吸收
2010 Second International Conference on Computer and Network Technology Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.101
H. Al-Qrimli, H. S. Aljibori, F. M.
{"title":"Energy Absorption of Thin-Walled Composite Tubes Subjected under Quasi-static Compression","authors":"H. Al-Qrimli, H. S. Aljibori, F. M.","doi":"10.1109/ICCNT.2010.101","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.101","url":null,"abstract":"Crushing energy has to sufficiently be absorbed in order to save the protections of passengers in a car accident. There have been a set of studies on the crushing energy absorption of a fundamental construction in automobiles. In this paper, the purpose concerns the crashworthiness of the widely used vehicle structure, triangular thin-walled tubes with ±45º and 0/90º fiber orientation. An experimental investigation was carried out to study the energy absorption characteristics of thin-walled triangular tubes subjected to quasi-static axial loading to develop the optimum structural members. Notch shapes and structure modification applied to structural design have nowadays been used to keep up the efficiency of energy absorption. Such ideas may result in the reduction of structural stiffness and buckling or collapse can easily be done in impact. Four different numbers of layers (4, 6, 8 and 10) by using woven roving glass fiber/ epoxy E-600 with two fiber orientation ±45º and 0/90º","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114999128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信