{"title":"Research on the Method of Hook Height Measurement Based on Kingview","authors":"J. Jinyu","doi":"10.1109/IFCSTA.2009.237","DOIUrl":"https://doi.org/10.1109/IFCSTA.2009.237","url":null,"abstract":"This paper introduces a method of the hook height measurement in drilling process. The mathematical model of hook height is built according to the distributed situation of the wire line. Some relevant parameters of the hook height are acquired by using drawswork sensor, the phase demodulator, ADAM4080 and other components. The software design of the hook height measurement by kingview is given. The error of the hook height is analyzed. The value of the hook height measured is calibrated when the hook is in touch with the drilling platform. The design of the system is simple and flexible. The practical application shows the method running effectively in Tarim Oil Field. So, the method can be widely used in depth measurement.","PeriodicalId":256032,"journal":{"name":"2009 International Forum on Computer Science-Technology and Applications","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125919702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Shiping, Chen Tao, Z. Xianyin, Wang Jian, Wei Yuming
{"title":"Training Second-Order Hidden Markov Models with Multiple Observation Sequences","authors":"D. Shiping, Chen Tao, Z. Xianyin, Wang Jian, Wei Yuming","doi":"10.1109/IFCSTA.2009.12","DOIUrl":"https://doi.org/10.1109/IFCSTA.2009.12","url":null,"abstract":"Second-order hidden Markov models (HMM2) have been widely used in pattern recognition, especially in speech recognition. Their main advantages are their capabilities to model noisy temporal signals of variable length. In this article, we introduce a new HMM2 with multiple observable sequences, assuming that all the observable sequences are statistically correlated. In this treatment, the multiple observation probability is expressed as a combination of individual observation probabilities without losing generality. This combinatorial method gives one more freedom in making different dependence-independence assumptions. By generalizing Baum’s auxiliary function into this framework and building up an associated objective function using Lagrange multiplier method, several new formulae solving model training problem are theoretically derived. We show that the model training equations can be easily derived with an independence assumption.","PeriodicalId":256032,"journal":{"name":"2009 International Forum on Computer Science-Technology and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125456276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study and Realization of Generic Mechanism for Dynamic Loading Model Components in Simulation System","authors":"W. Feng, Yang Zhao Hong, Sun Yan","doi":"10.1109/IFCSTA.2009.149","DOIUrl":"https://doi.org/10.1109/IFCSTA.2009.149","url":null,"abstract":"This paper proposes a generic mechanism of loading model components in simulation system dynamically. It uses assembly language to realize the process of getting the class instance and calling members from the dynamic link library (DLL) of simulation model components dynamically. It also proposes solutions to the related problems such as memory alignment and object model By the proposed mechanism, you need not to declare the interface of component in simulation engine during compile time. Compared to other methods, the proposed mechanism is generic and imposes little restriction on simulation model components. It has been implemented in a combat simulation system written by C/C++ language and can improve the reusability of simulation model greatly.","PeriodicalId":256032,"journal":{"name":"2009 International Forum on Computer Science-Technology and Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124076932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Trademark Retrieval Method Based on Support Vector Machines Self-Learning","authors":"Ya-Li Qi","doi":"10.1109/IFCSTA.2009.170","DOIUrl":"https://doi.org/10.1109/IFCSTA.2009.170","url":null,"abstract":"Relevance feedback is a good method for semantic gap in image retrieval. In this paper we propose a method which uses support vector machines for conducting effective relevance feedback for trademark retrieval. The algorithm takes the test results to adjust the already trained support vector machines. We select the Tamura textures features which consistent with human vision perception and the low-level feature of image to trian support vector machines. Experimental results show that it achieves significantly higher search accuracy after just three or four rounds of relevance feedback.","PeriodicalId":256032,"journal":{"name":"2009 International Forum on Computer Science-Technology and Applications","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124144968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yang Xi-hui, Z. Dinghua, Lu Changde, Wang Fang, Lu Jixiang
{"title":"Environment Evaluation Index Reductions of Digital Workshop Based on Rough Set","authors":"Yang Xi-hui, Z. Dinghua, Lu Changde, Wang Fang, Lu Jixiang","doi":"10.1109/IFCSTA.2009.56","DOIUrl":"https://doi.org/10.1109/IFCSTA.2009.56","url":null,"abstract":"Human-machine environment evaluation of digital workshop involves physical, chemical, psychological, social environment for the workshop and many other factors. Attribution reductions of rough set theory reduces some redundant targets which are less important to human environmental assessment, thus to obtain the important index and to improve the ergonomic effect of the environmental layout of the digital workshop and to ensure the rationality and reliability of product lines.","PeriodicalId":256032,"journal":{"name":"2009 International Forum on Computer Science-Technology and Applications","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124389490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on Authentication for Live Streaming Media over P2P-Based Network","authors":"W. Xinli","doi":"10.1109/IFCSTA.2009.300","DOIUrl":"https://doi.org/10.1109/IFCSTA.2009.300","url":null,"abstract":"The purpose of this article is to discuss an authentication method for Peer to Peer (P2P)-based streaming media. Methods of encryption of streaming media data and digital signatures were used to improve the safety of the media. The digital certificate publishing service and management services of live streaming media authentication information are expanded in the live stream system based on P2P networks. Besides, software used in client are extended functions such as application of digital certificates, decryption of the media stream, request for certification in order to be used by the client to the provider of live stream. The live stream was received from P2P-based network, decrypted and played by the client. The security of media has been improved and the protection for live media copyright has been enhanced through this way.","PeriodicalId":256032,"journal":{"name":"2009 International Forum on Computer Science-Technology and Applications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130766040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and Implementation of Ancient Architecture Roaming System Based on VRML","authors":"Zhang Lin, Zhao Chunxiao, Zhao Hang","doi":"10.1109/IFCSTA.2009.188","DOIUrl":"https://doi.org/10.1109/IFCSTA.2009.188","url":null,"abstract":"Technology of Virtual Random Walk in building environment is one of the important contents of Virtual Reality Technology, which has a broad prospect for application in the fields of architecture, tourism, military and computer game design. This paper introduces the principle of Virtual Reality Modeling Language VRML, analyzes its operating principle and basic characteristics. Then it introduces some related technologies of the ancient cultural sites of the virtual roaming system. It introduces in detail three-dimensional modeling steps and methods including geometric modeling, physical modeling and Behavioral Modeling. Then, it give a detailed analysis of the key technology and the program realization of the ancient architecture of the virtual roaming system with the construction of Miaofeng Mountain as the background. Finally, it introduces the web-browse module and the optimization mode of the scene.","PeriodicalId":256032,"journal":{"name":"2009 International Forum on Computer Science-Technology and Applications","volume":"8 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116782398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Fuzzy Data Mining Algorithm in Performance Evaluation of Human Resource","authors":"Hang Jing","doi":"10.1109/IFCSTA.2009.90","DOIUrl":"https://doi.org/10.1109/IFCSTA.2009.90","url":null,"abstract":"The assessment of human resource performance objectively, thoroughly, and reasonably is critical to choosing managerial personnel suited for organizational development. Therefore, an efficient tool should be able to deal with various employees’ data and assist managers to make decision and strategic plan. As an effect mathematic tool to deal with the vagueness and uncertainty, fuzzy data mining is considered as a highly desirable tool being applied to many application areas. In this paper we applied the fuzzy data mining technique to make the assessment and selection of human resource in enterprise. We present and justify the capabilities of fuzzy data mining technology in the evaluation of human resource in enterprise by proposing a practical model for improving the efficiency and effectiveness of human resource management. Firstly, the paper briefly explained the basic fuzzy data mining theory, and proposed the fuzzy data mining algorithm in detail. We gave process steps and the flow chart of algorithm in this part. Secondly, we used the human resource management data as illustration to implement the algorithm. We used the maximal tree to cluster the human resource. Then the raw data of human resource management is compared with each cluster and calculate the proximal values based on the equation in fuzzy data mining algorithm. At last we determined the evaluation of human resource. The whole process was easy to be completed. The results of this study indicated that the methodology was practical and feasible. It could help managers in enterprise assess performance of the human resource swiftly and effectively.","PeriodicalId":256032,"journal":{"name":"2009 International Forum on Computer Science-Technology and Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131554424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Study of the Generalized PID Algorithm","authors":"Z. Xiaodong, Liang Yongqiang, Xue Anke","doi":"10.1109/IFCSTA.2009.67","DOIUrl":"https://doi.org/10.1109/IFCSTA.2009.67","url":null,"abstract":"A generalized PID algorithm (GPID) is proposed to improve the time response and control quality of the traditional PID control algorithm. The traditional PID controller is a special case of the generalized PID, this can be shown by comparing the coefficients of GPID and PID. GPID can be obtained by adding higher-order derivative terms in on the form of the traditional PID.GPID can get better control performance than PID by optimizing parameters. Finally simulations using Matlab7.0 are proposed. The step responses of several examples for different systems with or without time-delay and noises are shown.","PeriodicalId":256032,"journal":{"name":"2009 International Forum on Computer Science-Technology and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132718260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Algorithm for Solving the Intruder Deduction Problem","authors":"Cheng Chen, C. Weihong","doi":"10.1109/IFCSTA.2009.206","DOIUrl":"https://doi.org/10.1109/IFCSTA.2009.206","url":null,"abstract":"The intruder deduction problem is the key of formal analysis of crytographical protocol. Because many security protocols are based on the algebraic properties of original operation, so it must analyze the problem under the equational theory which is inducted by the set of equations that expressed the algebraic properties, then it becomes more difficult. A new algorithm for solving the intruder deduction problem which under the Dolev-Yao model is given, it is based on two ideas, one is dividing the equational theory into finite equivalence theory and cancellation equivalence theory, another is choosing representative element. The algorithm is same with most protocols, reduces the complexity of basic algorithm which adopted in usual. The result has been verified in related task","PeriodicalId":256032,"journal":{"name":"2009 International Forum on Computer Science-Technology and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128106103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}