2010 Second International Conference on Computer Engineering and Applications最新文献

筛选
英文 中文
Mesoscale Computational Approach for Shear Driven Cavity Flow 剪切驱动空腔流动的中尺度计算方法
N. Sidik, Agus Sujatmoko
{"title":"Mesoscale Computational Approach for Shear Driven Cavity Flow","authors":"N. Sidik, Agus Sujatmoko","doi":"10.1109/ICCEA.2010.28","DOIUrl":"https://doi.org/10.1109/ICCEA.2010.28","url":null,"abstract":"In this paper, we report an alternative numerical approach to predict the flow behavior for incompressible fluid. Current model applies the constrained interpolated profile method to discretise the governing equation of Boltzmann transport equation. The main advantage of the proposed scheme is it capability in producing third order accuracy with two points polynomial interpolation. Three numerical experiments were performed in order to demonstrate the effectiveness of the present approach. The results of lid-driven cavity flow indicate that the approach required mush less grid resolution to obtain acceptable result when compared with the benchmark results published in the literature.","PeriodicalId":207234,"journal":{"name":"2010 Second International Conference on Computer Engineering and Applications","volume":"39 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133512101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Pattern Recognition of Inscriptions on Oracle Bones by Esthetics Analysis in Computer Image 基于计算机图像美学分析的甲骨文模式识别
2010 Second International Conference on Computer Engineering and Applications Pub Date : 2010-03-19 DOI: 10.1109/ICCEA.2010.117
Jinfeng Li, Honghai Kuang
{"title":"The Pattern Recognition of Inscriptions on Oracle Bones by Esthetics Analysis in Computer Image","authors":"Jinfeng Li, Honghai Kuang","doi":"10.1109/ICCEA.2010.117","DOIUrl":"https://doi.org/10.1109/ICCEA.2010.117","url":null,"abstract":"The pattern recognition of inscriptions on oracle bones by esthetics analysis in image have been studied in the paper. Samples of inscriptions on oracle bones were scanned into computer images. By esthetics analysis of inscriptions on oracle bones, a new arithmetic was chosed and a standard inflexion curve of inscriptions on oracle bones by the arithmetic can be gotten. There are curves by the arithmetic in images. The standard inflexion curve of inscriptions on oracle bones and curves in images were compared. If both of curves look very similar, there are inscriptions on oracle bones in the image.","PeriodicalId":207234,"journal":{"name":"2010 Second International Conference on Computer Engineering and Applications","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133309246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Non Blind & Blind Adaptive Array Smart Antenna Beam Forming Algorithms for W-Cdma Mobile Communication Systems W-Cdma移动通信系统的非盲和盲自适应阵列智能天线波束形成算法
2010 Second International Conference on Computer Engineering and Applications Pub Date : 2010-03-19 DOI: 10.1109/ICCEA.2010.284
T. Lavate, V. K. Kokate, G. S. Mani
{"title":"Non Blind & Blind Adaptive Array Smart Antenna Beam Forming Algorithms for W-Cdma Mobile Communication Systems","authors":"T. Lavate, V. K. Kokate, G. S. Mani","doi":"10.1109/ICCEA.2010.284","DOIUrl":"https://doi.org/10.1109/ICCEA.2010.284","url":null,"abstract":"The 3G cellular networks are being designed to provide high bit rate services, multimedia traffic, in addition to voice calls. 3G utilizes W-CDMA as a radio access technology which provides highly efficient spectrum utilization & variable user data rates. The dedicated pilot is presented in the structure of the up-link WCDMA frame of IMT-2000 physical channels & this dedicated pilot supports the use of adaptive array smart antennas. The use of such smart antennas improves the SINR & in turn increases the capacity of cellular systems using W-CDMA. This paper discusses various adaptive beam-forming algorithms developed for smart antennas applications to W-CDMA. Non blind algorithm such as RLS & blind algorithm such as dynamic LSCMA are widely used in smart antennas.","PeriodicalId":207234,"journal":{"name":"2010 Second International Conference on Computer Engineering and Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132156701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Self-Organized and Evolvable Cognitive Architecture for Intelligent Agents and Multi-agent Systems 智能智能体和多智能体系统的自组织可进化认知体系结构
2010 Second International Conference on Computer Engineering and Applications Pub Date : 2010-03-19 DOI: 10.1007/978-3-642-12239-2_41
O. J. R. López
{"title":"Self-Organized and Evolvable Cognitive Architecture for Intelligent Agents and Multi-agent Systems","authors":"O. J. R. López","doi":"10.1007/978-3-642-12239-2_41","DOIUrl":"https://doi.org/10.1007/978-3-642-12239-2_41","url":null,"abstract":"","PeriodicalId":207234,"journal":{"name":"2010 Second International Conference on Computer Engineering and Applications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133959237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
The Effects of the Choice of Meta Analysis Model on the Overall Estimates for Continuous Data with Missing Standard Deviations 选择元分析模型对缺失标准差连续数据总体估计的影响
2010 Second International Conference on Computer Engineering and Applications Pub Date : 2010-03-19 DOI: 10.1109/ICCEA.2010.265
N. Idris, Noraida Saidin
{"title":"The Effects of the Choice of Meta Analysis Model on the Overall Estimates for Continuous Data with Missing Standard Deviations","authors":"N. Idris, Noraida Saidin","doi":"10.1109/ICCEA.2010.265","DOIUrl":"https://doi.org/10.1109/ICCEA.2010.265","url":null,"abstract":"The choice between the fixed and random effects model for providing an overall meta analysis estimate in continuous data may affect the accuracy of these estimates. For studies with complete information, the Cochrane’s Q-test could provide some guide on the choice, although the power of this test is quite low. If the study- level standard deviations (SDs) are not completely reported or “missing”, selection of meta analysis model should be done with more caution. Many studies suggest that imputation is a good way of recovering the lost information in the effect size estimate and the corresponding standard error. In this article, we compare empirically, the effects of imputation of the missing SDs on the overall meta analysis estimates based on both the fixed and random effect model. The results suggest imputation is recommended to estimate the overall effect size. However, to estimate its corresponding standard error (SE), imputation is recommended for the estimates based on the random effect model. If the fixed effect model is used, imputation may lead to bias estimates of the SE.","PeriodicalId":207234,"journal":{"name":"2010 Second International Conference on Computer Engineering and Applications","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127985372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Text Clustering on National Vulnerability Database 基于国家漏洞数据库的文本聚类
2010 Second International Conference on Computer Engineering and Applications Pub Date : 2010-03-19 DOI: 10.1109/ICCEA.2010.209
Shuguang Huang, Heping Tang, Min Zhang, Jie Tian
{"title":"Text Clustering on National Vulnerability Database","authors":"Shuguang Huang, Heping Tang, Min Zhang, Jie Tian","doi":"10.1109/ICCEA.2010.209","DOIUrl":"https://doi.org/10.1109/ICCEA.2010.209","url":null,"abstract":"In order to solve the problem of taxonomies overlap in software vulnerability, a method of vulnerability classifying based on text clustering in NVD (National Vulnerability Database) is proposed, and Cluster Overlap Index is used to evaluate Simplekmean, BisectingKMeans and BatchSom clustering algorithms. 45 main vulnerability clusters are selected from approximate 40,000 vulnerability records according to Descriptor Dominance Index. These dominant vulnerability taxonomies become our study focuses, which transforms our works from individual to vulnerability taxonomies research","PeriodicalId":207234,"journal":{"name":"2010 Second International Conference on Computer Engineering and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129365967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Beliefs, Certainty and Complex Systems Structure 信念、确定性和复杂系统结构
2010 Second International Conference on Computer Engineering and Applications Pub Date : 2010-03-19 DOI: 10.1109/ICCEA.2010.244
Horacio Paggi, F. A. Amo
{"title":"Beliefs, Certainty and Complex Systems Structure","authors":"Horacio Paggi, F. A. Amo","doi":"10.1109/ICCEA.2010.244","DOIUrl":"https://doi.org/10.1109/ICCEA.2010.244","url":null,"abstract":"In the multi-agent systems field the notion of belief as a primary justification of an agent’s decisions has been extensively studied. On the other hand, the concepts of holon and informon developed by Koestler, Sulis, Alonso, Pazos et al. have proved to be a very useful way of to model evolving complex dynamic systems. In this work the relationship between holons, informons, randomness and uncertainty (as the opposed to certainty) in a holonic system that reacts to events, and how the beliefs (and, in some cases, the uncertainty) could influence the way the holons get structured is analyzed.","PeriodicalId":207234,"journal":{"name":"2010 Second International Conference on Computer Engineering and Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129378842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Large Size File Transfer over Wireless Environment 无线环境下的大文件传输
2010 Second International Conference on Computer Engineering and Applications Pub Date : 2010-03-19 DOI: 10.1109/ICCEA.2010.281
Prodipto Das, B. S. Purkayastha, Ashit Debnath
{"title":"Large Size File Transfer over Wireless Environment","authors":"Prodipto Das, B. S. Purkayastha, Ashit Debnath","doi":"10.1109/ICCEA.2010.281","DOIUrl":"https://doi.org/10.1109/ICCEA.2010.281","url":null,"abstract":"In the paper, a system known as FTWN (File Transfer in Wireless Networks Environment) is developed. In wireless networks, sending a large file above 100 MB is a big issue. The problem is solved by the system developed using JAVA. In this system FTP is used to transfer file. The transfer time is recorded and found to be very useful in wireless system.","PeriodicalId":207234,"journal":{"name":"2010 Second International Conference on Computer Engineering and Applications","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128463071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fingerprint Image Enhancement with Second Derivative Gaussian Filter and Directional Wavelet Transform 基于二阶导数高斯滤波和方向小波变换的指纹图像增强
2010 Second International Conference on Computer Engineering and Applications Pub Date : 2010-03-19 DOI: 10.1109/ICCEA.2010.178
Keokanlaya Sihalath, S. Choomchuay, S. Wada, K. Hamamoto
{"title":"Fingerprint Image Enhancement with Second Derivative Gaussian Filter and Directional Wavelet Transform","authors":"Keokanlaya Sihalath, S. Choomchuay, S. Wada, K. Hamamoto","doi":"10.1109/ICCEA.2010.178","DOIUrl":"https://doi.org/10.1109/ICCEA.2010.178","url":null,"abstract":"In this paper, we propose a technique for enhancing the quality of fingerprint images. Directional wavelet transform and second derivative of a Gaussian filter are applied. The original fingerprint image is decomposed into approximation and detail sub-images. To each sub-dimension a directional filter: second derivative of Gaussian filter is applied for tuning up the image features. The enhanced image is measured for its improvement by testing the success of core point identification where Poincare technique is used. The commonly-well-known database FVC-2004 is used in this study. The obtained results offer clean visualization as well as the increase the success of true core point detection.","PeriodicalId":207234,"journal":{"name":"2010 Second International Conference on Computer Engineering and Applications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116337862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Aspect Weaving in MDA for Ontology Modelling 面向本体建模的MDA方面编织
2010 Second International Conference on Computer Engineering and Applications Pub Date : 2010-03-19 DOI: 10.1109/ICCEA.2010.213
F. Siddiqui, M. Alam
{"title":"Aspect Weaving in MDA for Ontology Modelling","authors":"F. Siddiqui, M. Alam","doi":"10.1109/ICCEA.2010.213","DOIUrl":"https://doi.org/10.1109/ICCEA.2010.213","url":null,"abstract":"A software developer’s dream is to capture the vision of an application and transform into its realization. In reality the requirement of an application is affected by the implementation platforms specifications. But recently the popularity of upcoming technologies like MDA has facilitated the clear separation of abstraction at different layers and then generation of implementation from them. Also separation of concerns is the desired feature of software development. Clearing concerns results in better modularity in both design and implementation. Aspect oriented programming (AOP) is another recent technology that promises separation of concerns. This paper proposes a model driven architecture with aspect weaving for ontology modelling","PeriodicalId":207234,"journal":{"name":"2010 Second International Conference on Computer Engineering and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114672413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信