{"title":"Mesoscale Computational Approach for Shear Driven Cavity Flow","authors":"N. Sidik, Agus Sujatmoko","doi":"10.1109/ICCEA.2010.28","DOIUrl":"https://doi.org/10.1109/ICCEA.2010.28","url":null,"abstract":"In this paper, we report an alternative numerical approach to predict the flow behavior for incompressible fluid. Current model applies the constrained interpolated profile method to discretise the governing equation of Boltzmann transport equation. The main advantage of the proposed scheme is it capability in producing third order accuracy with two points polynomial interpolation. Three numerical experiments were performed in order to demonstrate the effectiveness of the present approach. The results of lid-driven cavity flow indicate that the approach required mush less grid resolution to obtain acceptable result when compared with the benchmark results published in the literature.","PeriodicalId":207234,"journal":{"name":"2010 Second International Conference on Computer Engineering and Applications","volume":"39 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133512101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Pattern Recognition of Inscriptions on Oracle Bones by Esthetics Analysis in Computer Image","authors":"Jinfeng Li, Honghai Kuang","doi":"10.1109/ICCEA.2010.117","DOIUrl":"https://doi.org/10.1109/ICCEA.2010.117","url":null,"abstract":"The pattern recognition of inscriptions on oracle bones by esthetics analysis in image have been studied in the paper. Samples of inscriptions on oracle bones were scanned into computer images. By esthetics analysis of inscriptions on oracle bones, a new arithmetic was chosed and a standard inflexion curve of inscriptions on oracle bones by the arithmetic can be gotten. There are curves by the arithmetic in images. The standard inflexion curve of inscriptions on oracle bones and curves in images were compared. If both of curves look very similar, there are inscriptions on oracle bones in the image.","PeriodicalId":207234,"journal":{"name":"2010 Second International Conference on Computer Engineering and Applications","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133309246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Non Blind & Blind Adaptive Array Smart Antenna Beam Forming Algorithms for W-Cdma Mobile Communication Systems","authors":"T. Lavate, V. K. Kokate, G. S. Mani","doi":"10.1109/ICCEA.2010.284","DOIUrl":"https://doi.org/10.1109/ICCEA.2010.284","url":null,"abstract":"The 3G cellular networks are being designed to provide high bit rate services, multimedia traffic, in addition to voice calls. 3G utilizes W-CDMA as a radio access technology which provides highly efficient spectrum utilization & variable user data rates. The dedicated pilot is presented in the structure of the up-link WCDMA frame of IMT-2000 physical channels & this dedicated pilot supports the use of adaptive array smart antennas. The use of such smart antennas improves the SINR & in turn increases the capacity of cellular systems using W-CDMA. This paper discusses various adaptive beam-forming algorithms developed for smart antennas applications to W-CDMA. Non blind algorithm such as RLS & blind algorithm such as dynamic LSCMA are widely used in smart antennas.","PeriodicalId":207234,"journal":{"name":"2010 Second International Conference on Computer Engineering and Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132156701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Self-Organized and Evolvable Cognitive Architecture for Intelligent Agents and Multi-agent Systems","authors":"O. J. R. López","doi":"10.1007/978-3-642-12239-2_41","DOIUrl":"https://doi.org/10.1007/978-3-642-12239-2_41","url":null,"abstract":"","PeriodicalId":207234,"journal":{"name":"2010 Second International Conference on Computer Engineering and Applications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133959237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Effects of the Choice of Meta Analysis Model on the Overall Estimates for Continuous Data with Missing Standard Deviations","authors":"N. Idris, Noraida Saidin","doi":"10.1109/ICCEA.2010.265","DOIUrl":"https://doi.org/10.1109/ICCEA.2010.265","url":null,"abstract":"The choice between the fixed and random effects model for providing an overall meta analysis estimate in continuous data may affect the accuracy of these estimates. For studies with complete information, the Cochrane’s Q-test could provide some guide on the choice, although the power of this test is quite low. If the study- level standard deviations (SDs) are not completely reported or “missing”, selection of meta analysis model should be done with more caution. Many studies suggest that imputation is a good way of recovering the lost information in the effect size estimate and the corresponding standard error. In this article, we compare empirically, the effects of imputation of the missing SDs on the overall meta analysis estimates based on both the fixed and random effect model. The results suggest imputation is recommended to estimate the overall effect size. However, to estimate its corresponding standard error (SE), imputation is recommended for the estimates based on the random effect model. If the fixed effect model is used, imputation may lead to bias estimates of the SE.","PeriodicalId":207234,"journal":{"name":"2010 Second International Conference on Computer Engineering and Applications","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127985372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Text Clustering on National Vulnerability Database","authors":"Shuguang Huang, Heping Tang, Min Zhang, Jie Tian","doi":"10.1109/ICCEA.2010.209","DOIUrl":"https://doi.org/10.1109/ICCEA.2010.209","url":null,"abstract":"In order to solve the problem of taxonomies overlap in software vulnerability, a method of vulnerability classifying based on text clustering in NVD (National Vulnerability Database) is proposed, and Cluster Overlap Index is used to evaluate Simplekmean, BisectingKMeans and BatchSom clustering algorithms. 45 main vulnerability clusters are selected from approximate 40,000 vulnerability records according to Descriptor Dominance Index. These dominant vulnerability taxonomies become our study focuses, which transforms our works from individual to vulnerability taxonomies research","PeriodicalId":207234,"journal":{"name":"2010 Second International Conference on Computer Engineering and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129365967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Beliefs, Certainty and Complex Systems Structure","authors":"Horacio Paggi, F. A. Amo","doi":"10.1109/ICCEA.2010.244","DOIUrl":"https://doi.org/10.1109/ICCEA.2010.244","url":null,"abstract":"In the multi-agent systems field the notion of belief as a primary justification of an agent’s decisions has been extensively studied. On the other hand, the concepts of holon and informon developed by Koestler, Sulis, Alonso, Pazos et al. have proved to be a very useful way of to model evolving complex dynamic systems. In this work the relationship between holons, informons, randomness and uncertainty (as the opposed to certainty) in a holonic system that reacts to events, and how the beliefs (and, in some cases, the uncertainty) could influence the way the holons get structured is analyzed.","PeriodicalId":207234,"journal":{"name":"2010 Second International Conference on Computer Engineering and Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129378842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Large Size File Transfer over Wireless Environment","authors":"Prodipto Das, B. S. Purkayastha, Ashit Debnath","doi":"10.1109/ICCEA.2010.281","DOIUrl":"https://doi.org/10.1109/ICCEA.2010.281","url":null,"abstract":"In the paper, a system known as FTWN (File Transfer in Wireless Networks Environment) is developed. In wireless networks, sending a large file above 100 MB is a big issue. The problem is solved by the system developed using JAVA. In this system FTP is used to transfer file. The transfer time is recorded and found to be very useful in wireless system.","PeriodicalId":207234,"journal":{"name":"2010 Second International Conference on Computer Engineering and Applications","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128463071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Keokanlaya Sihalath, S. Choomchuay, S. Wada, K. Hamamoto
{"title":"Fingerprint Image Enhancement with Second Derivative Gaussian Filter and Directional Wavelet Transform","authors":"Keokanlaya Sihalath, S. Choomchuay, S. Wada, K. Hamamoto","doi":"10.1109/ICCEA.2010.178","DOIUrl":"https://doi.org/10.1109/ICCEA.2010.178","url":null,"abstract":"In this paper, we propose a technique for enhancing the quality of fingerprint images. Directional wavelet transform and second derivative of a Gaussian filter are applied. The original fingerprint image is decomposed into approximation and detail sub-images. To each sub-dimension a directional filter: second derivative of Gaussian filter is applied for tuning up the image features. The enhanced image is measured for its improvement by testing the success of core point identification where Poincare technique is used. The commonly-well-known database FVC-2004 is used in this study. The obtained results offer clean visualization as well as the increase the success of true core point detection.","PeriodicalId":207234,"journal":{"name":"2010 Second International Conference on Computer Engineering and Applications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116337862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Aspect Weaving in MDA for Ontology Modelling","authors":"F. Siddiqui, M. Alam","doi":"10.1109/ICCEA.2010.213","DOIUrl":"https://doi.org/10.1109/ICCEA.2010.213","url":null,"abstract":"A software developer’s dream is to capture the vision of an application and transform into its realization. In reality the requirement of an application is affected by the implementation platforms specifications. But recently the popularity of upcoming technologies like MDA has facilitated the clear separation of abstraction at different layers and then generation of implementation from them. Also separation of concerns is the desired feature of software development. Clearing concerns results in better modularity in both design and implementation. Aspect oriented programming (AOP) is another recent technology that promises separation of concerns. This paper proposes a model driven architecture with aspect weaving for ontology modelling","PeriodicalId":207234,"journal":{"name":"2010 Second International Conference on Computer Engineering and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114672413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}