2010 International Conference On Computer Design and Applications最新文献

筛选
英文 中文
Changing entries in soft sets 更改软集中的条目
2010 International Conference On Computer Design and Applications Pub Date : 2010-06-25 DOI: 10.1109/ICCDA.2010.5541237
Z. Kong, Lifu Wang, Zhaoxia Wu
{"title":"Changing entries in soft sets","authors":"Z. Kong, Lifu Wang, Zhaoxia Wu","doi":"10.1109/ICCDA.2010.5541237","DOIUrl":"https://doi.org/10.1109/ICCDA.2010.5541237","url":null,"abstract":"This paper is concerned with the normal parameter reduction of soft sets. The problems of changing entries are presented. Then, we introduce the definition of positive and negative changed rates, and these properties are proposed. Furthermore, the normal parameter reduction is investigated after changing entries in soft set","PeriodicalId":190625,"journal":{"name":"2010 International Conference On Computer Design and Applications","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123901608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application of the domain solutions' transferring method based on analogical-reasoning and UXD 基于类比推理和UXD的域解传递方法的应用
2010 International Conference On Computer Design and Applications Pub Date : 2010-06-25 DOI: 10.1109/ICCDA.2010.5541148
Lihui Ma, Mingbing Guo, Yanye Lu, Meng Dong, Zihui Wei, R. Tan
{"title":"Application of the domain solutions' transferring method based on analogical-reasoning and UXD","authors":"Lihui Ma, Mingbing Guo, Yanye Lu, Meng Dong, Zihui Wei, R. Tan","doi":"10.1109/ICCDA.2010.5541148","DOIUrl":"https://doi.org/10.1109/ICCDA.2010.5541148","url":null,"abstract":"TRIZ theory has been widely used in solving engineering problems, but it is difficult for the transformation from the TRIZ solution to the domain solution. The transferring from TRIZ solution to domain solution can be realized by applying the method based on analogical-reasoning and unexpected discovery (UXD). The technical conflict of semiconductor silicon wafer laminator can be solved by applying this method in this paper.","PeriodicalId":190625,"journal":{"name":"2010 International Conference On Computer Design and Applications","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114460272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The application of RBF neural network in the compensation for temperature drift of the silicon pressure sensor 研究了RBF神经网络在硅压力传感器温度漂移补偿中的应用
2010 International Conference On Computer Design and Applications Pub Date : 2010-06-25 DOI: 10.1109/ICCDA.2010.5541378
Yang Chuan, Li Chen, Zhang Chao
{"title":"The application of RBF neural network in the compensation for temperature drift of the silicon pressure sensor","authors":"Yang Chuan, Li Chen, Zhang Chao","doi":"10.1109/ICCDA.2010.5541378","DOIUrl":"https://doi.org/10.1109/ICCDA.2010.5541378","url":null,"abstract":"Temperature drift is the important factor of the precision of diffused silicon pressure sensor, so author uses software to compensate for it to improve the precision of the sensor. At the data base of the temperature characteristic experiment of diffused silicon pressure sensor, author proposes to use RBF neural network to establish temperature drift compensated model with regression analysis. Compared with two-dimension regression analysis, RBF neural network can improve the precision of the model distinctly.","PeriodicalId":190625,"journal":{"name":"2010 International Conference On Computer Design and Applications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114582481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
General design of vehicle safety assistant system based on machine vision and electronic control steering 基于机器视觉和电控转向的车辆安全辅助系统总体设计
2010 International Conference On Computer Design and Applications Pub Date : 2010-06-25 DOI: 10.1109/ICCDA.2010.5541230
Yongjin Zhang, Wei Li, Xiao Wang, Jianhui Zhao, Yidan Yuan
{"title":"General design of vehicle safety assistant system based on machine vision and electronic control steering","authors":"Yongjin Zhang, Wei Li, Xiao Wang, Jianhui Zhao, Yidan Yuan","doi":"10.1109/ICCDA.2010.5541230","DOIUrl":"https://doi.org/10.1109/ICCDA.2010.5541230","url":null,"abstract":"In this paper, a general design of vehicle safety assistant system based on machine vision and electronic control steering system is presented. Machine vision system detects lane and obstacle (vehicle) on the highway environment. Electronic control steering system provides the realtime information of the steering operation, which represents the driver's purpose. If the real steering operation does not meet the safety operation requirement, a warning will be triggered to prevent Road Departure or Rear End.","PeriodicalId":190625,"journal":{"name":"2010 International Conference On Computer Design and Applications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114609849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The research of dynamic data fusion based-on node behavior trust for WSNs 基于节点行为信任的无线传感器网络动态数据融合研究
2010 International Conference On Computer Design and Applications Pub Date : 2010-06-25 DOI: 10.1109/ICCDA.2010.5541333
N. Yang, Tian Li-Qin, Shen Xue-li
{"title":"The research of dynamic data fusion based-on node behavior trust for WSNs","authors":"N. Yang, Tian Li-Qin, Shen Xue-li","doi":"10.1109/ICCDA.2010.5541333","DOIUrl":"https://doi.org/10.1109/ICCDA.2010.5541333","url":null,"abstract":"Wireless sensor networks as sensor technology, microelectronics and wireless communication technology product of the combination, become an active field of computer science research branch, in the military and civilian applications has been widely. As WSNs is limited to low-power requirements of sensor nodes and nodes generally carry an energy which limited and non-replacement, the method which maintains node energy by changing the large number of battery is impossible. While the traditional network is committed to get to the higher quality network services, then the network protocol of WSNs pay more attention to be maintained in the node energy. The cost of communication is higher relative to the local computation. Date fusion, as a core technology, has played an important role in saving energy of the entire network, enhancing the accuracy of the collected data and improving the efficiency of data transfer. In this paper, a data fusion strategy for WSNs was proposed based on trust and cluster. In the Intra-Cluster, we carry out the data fusion by setting up the relay node and using the trust value of the node as weight of data. The selection principle of relay node, the process of choose the relay node and the data fusion based on the trust will be discussed. Finally, the effective and energy consumption of the data fusion algorithm will be analyzed, and through an example to illustrate the specific methods of data fusion and feasibility.","PeriodicalId":190625,"journal":{"name":"2010 International Conference On Computer Design and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114872230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Evaluation method of the security of key based on the measure of the static state characteristics 基于静态特性度量的密钥安全性评价方法
2010 International Conference On Computer Design and Applications Pub Date : 2010-06-25 DOI: 10.1109/ICCDA.2010.5541140
Ou Qingyu, Zhang Changhong
{"title":"Evaluation method of the security of key based on the measure of the static state characteristics","authors":"Ou Qingyu, Zhang Changhong","doi":"10.1109/ICCDA.2010.5541140","DOIUrl":"https://doi.org/10.1109/ICCDA.2010.5541140","url":null,"abstract":"In all kinds of information systems, the amount of the key is large, and the correlation of which is complex. To solve this problem, an evaluation method for the key security based on the measure of the static state characteristics is proposed. In this way, the security state of all kinds of keys in the information systems, can be measured well and truly, by the means of formalization modeling of the set of keys, the design of the security level and the probability of uncontrollability. As well as it, the category and the level of the key can also be considered well, and the security states of the key can be reflected reliably, so the security of the information system can be achieved.","PeriodicalId":190625,"journal":{"name":"2010 International Conference On Computer Design and Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114940128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exact traveling wave solution for (2+1) dimensional BKK equation (2+1)维BKK方程的精确行波解
2010 International Conference On Computer Design and Applications Pub Date : 2010-06-25 DOI: 10.1109/ICCDA.2010.5541242
B. Zheng, Qinghua Feng
{"title":"Exact traveling wave solution for (2+1) dimensional BKK equation","authors":"B. Zheng, Qinghua Feng","doi":"10.1109/ICCDA.2010.5541242","DOIUrl":"https://doi.org/10.1109/ICCDA.2010.5541242","url":null,"abstract":"In this paper, we derive exact traveling wave Solut-ions of (2+1) dimensional BKK equation by a presented method. The method appears to be efficient in seeking exact solutions of no-nlinear equations.","PeriodicalId":190625,"journal":{"name":"2010 International Conference On Computer Design and Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115055617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
(s,t]-fuzzy filters of BCK-algebras [s,t]- bck代数的模糊滤子
2010 International Conference On Computer Design and Applications Pub Date : 2010-06-25 DOI: 10.1109/ICCDA.2010.5540982
Pen Jiayin
{"title":"(s,t]-fuzzy filters of BCK-algebras","authors":"Pen Jiayin","doi":"10.1109/ICCDA.2010.5540982","DOIUrl":"https://doi.org/10.1109/ICCDA.2010.5540982","url":null,"abstract":"The definitions of (∈,∈∨q)-fuzzy filter and (β̄,ᾱ)-fuzzy filter, and four new (β̄,ᾱ)-fuzzy filters are acquired. As a generalization of fuzzy BCK-filter, (∈,∈∨q) -fuzzy filter and (∈,∈̄∨q) -fuzzy filter, we give the definition of (s,t]-fuzzy filter with thresholds. The relations between these fuzzy filters and their level filters are discussed, some proposed are studed, and their equivalent descriptions are given. How to deal with the homomorphic image and inverse image of (s,t]-fuzzy filters are investigated.","PeriodicalId":190625,"journal":{"name":"2010 International Conference On Computer Design and Applications","volume":"257 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116885034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hierachical fuzzy set-based deep Web source classification 基于层次模糊集的深度Web源分类
2010 International Conference On Computer Design and Applications Pub Date : 2010-06-25 DOI: 10.1109/ICCDA.2010.5541144
Hai-Long Wang, Liang Yue, Pengpeng Zhao, Zhi-ming Cui
{"title":"Hierachical fuzzy set-based deep Web source classification","authors":"Hai-Long Wang, Liang Yue, Pengpeng Zhao, Zhi-ming Cui","doi":"10.1109/ICCDA.2010.5541144","DOIUrl":"https://doi.org/10.1109/ICCDA.2010.5541144","url":null,"abstract":"This paper presents a classification method of data source using fuzzy set and probabilistic model. The words of each domain are classified into characteristic words and general words according to their contribution to the current domain. The fuzzy set is introduced into the simplification process of characteristic words and the common words as the normalized glossary tool, which can be able to find more precise glossary in the homepage text. And a vocabulary probabilistic model is build after the normalized process in various domains, these words are classified by calculating the distance between the data source form vector and each domain vector.","PeriodicalId":190625,"journal":{"name":"2010 International Conference On Computer Design and Applications","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117157104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A damage model with subsection curve of concrete and its numerical verification based on ABAQUS 基于ABAQUS的混凝土分段曲线损伤模型及其数值验证
2010 International Conference On Computer Design and Applications Pub Date : 2010-06-25 DOI: 10.1109/ICCDA.2010.5540842
Zhicheng Xue, Lu Yang, Zeng-jie Yang
{"title":"A damage model with subsection curve of concrete and its numerical verification based on ABAQUS","authors":"Zhicheng Xue, Lu Yang, Zeng-jie Yang","doi":"10.1109/ICCDA.2010.5540842","DOIUrl":"https://doi.org/10.1109/ICCDA.2010.5540842","url":null,"abstract":"Using the energy equivalent hypothesis, combining the tension and compression constitutive relation of concrete material in the code for design of concrete structure, the scalar form of damage variable is introducted and a new concrete damage model is proposed so as to use for damage analysis in concrete structures. In order to the unilateral incision concrete beams with a four-point shear loading, for example, this model is developed for structural damage analysis in the ABAQUS finite element softwre. And the damage is found on the right of upper incision. The damage max value is 0.9162. The damage zone prolongates downward along a curve form. The results show that the model damage evolution results accord the tendency of digital speckle test results. It means that the damage model for concrete structural damage anslysis is feasible.","PeriodicalId":190625,"journal":{"name":"2010 International Conference On Computer Design and Applications","volume":"103 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117311324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信