2009 International Forum on Computer Science-Technology and Applications最新文献

筛选
英文 中文
Research on the Method of Hook Height Measurement Based on Kingview 基于组态王的吊钩高度测量方法研究
2009 International Forum on Computer Science-Technology and Applications Pub Date : 2009-12-25 DOI: 10.1109/IFCSTA.2009.237
J. Jinyu
{"title":"Research on the Method of Hook Height Measurement Based on Kingview","authors":"J. Jinyu","doi":"10.1109/IFCSTA.2009.237","DOIUrl":"https://doi.org/10.1109/IFCSTA.2009.237","url":null,"abstract":"This paper introduces a method of the hook height measurement in drilling process. The mathematical model of hook height is built according to the distributed situation of the wire line. Some relevant parameters of the hook height are acquired by using drawswork sensor, the phase demodulator, ADAM4080 and other components. The software design of the hook height measurement by kingview is given. The error of the hook height is analyzed. The value of the hook height measured is calibrated when the hook is in touch with the drilling platform. The design of the system is simple and flexible. The practical application shows the method running effectively in Tarim Oil Field. So, the method can be widely used in depth measurement.","PeriodicalId":256032,"journal":{"name":"2009 International Forum on Computer Science-Technology and Applications","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125919702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Training Second-Order Hidden Markov Models with Multiple Observation Sequences 多观测序列二阶隐马尔可夫模型的训练
2009 International Forum on Computer Science-Technology and Applications Pub Date : 2009-12-25 DOI: 10.1109/IFCSTA.2009.12
D. Shiping, Chen Tao, Z. Xianyin, Wang Jian, Wei Yuming
{"title":"Training Second-Order Hidden Markov Models with Multiple Observation Sequences","authors":"D. Shiping, Chen Tao, Z. Xianyin, Wang Jian, Wei Yuming","doi":"10.1109/IFCSTA.2009.12","DOIUrl":"https://doi.org/10.1109/IFCSTA.2009.12","url":null,"abstract":"Second-order hidden Markov models (HMM2) have been widely used in pattern recognition, especially in speech recognition. Their main advantages are their capabilities to model noisy temporal signals of variable length. In this article, we introduce a new HMM2 with multiple observable sequences, assuming that all the observable sequences are statistically correlated. In this treatment, the multiple observation probability is expressed as a combination of individual observation probabilities without losing generality. This combinatorial method gives one more freedom in making different dependence-independence assumptions. By generalizing Baum’s auxiliary function into this framework and building up an associated objective function using Lagrange multiplier method, several new formulae solving model training problem are theoretically derived. We show that the model training equations can be easily derived with an independence assumption.","PeriodicalId":256032,"journal":{"name":"2009 International Forum on Computer Science-Technology and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125456276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Study and Realization of Generic Mechanism for Dynamic Loading Model Components in Simulation System 仿真系统中动态加载模型部件通用机制的研究与实现
2009 International Forum on Computer Science-Technology and Applications Pub Date : 2009-12-25 DOI: 10.1109/IFCSTA.2009.149
W. Feng, Yang Zhao Hong, Sun Yan
{"title":"Study and Realization of Generic Mechanism for Dynamic Loading Model Components in Simulation System","authors":"W. Feng, Yang Zhao Hong, Sun Yan","doi":"10.1109/IFCSTA.2009.149","DOIUrl":"https://doi.org/10.1109/IFCSTA.2009.149","url":null,"abstract":"This paper proposes a generic mechanism of loading model components in simulation system dynamically. It uses assembly language to realize the process of getting the class instance and calling members from the dynamic link library (DLL) of simulation model components dynamically. It also proposes solutions to the related problems such as memory alignment and object model By the proposed mechanism, you need not to declare the interface of component in simulation engine during compile time. Compared to other methods, the proposed mechanism is generic and imposes little restriction on simulation model components. It has been implemented in a combat simulation system written by C/C++ language and can improve the reusability of simulation model greatly.","PeriodicalId":256032,"journal":{"name":"2009 International Forum on Computer Science-Technology and Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124076932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Trademark Retrieval Method Based on Support Vector Machines Self-Learning 基于支持向量机自学习的商标检索方法
2009 International Forum on Computer Science-Technology and Applications Pub Date : 2009-12-25 DOI: 10.1109/IFCSTA.2009.170
Ya-Li Qi
{"title":"A Trademark Retrieval Method Based on Support Vector Machines Self-Learning","authors":"Ya-Li Qi","doi":"10.1109/IFCSTA.2009.170","DOIUrl":"https://doi.org/10.1109/IFCSTA.2009.170","url":null,"abstract":"Relevance feedback is a good method for semantic gap in image retrieval. In this paper we propose a method which uses support vector machines for conducting effective relevance feedback for trademark retrieval. The algorithm takes the test results to adjust the already trained support vector machines. We select the Tamura textures features which consistent with human vision perception and the low-level feature of image to trian support vector machines. Experimental results show that it achieves significantly higher search accuracy after just three or four rounds of relevance feedback.","PeriodicalId":256032,"journal":{"name":"2009 International Forum on Computer Science-Technology and Applications","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124144968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Environment Evaluation Index Reductions of Digital Workshop Based on Rough Set 基于粗糙集的数字化车间环境评价指标约简
2009 International Forum on Computer Science-Technology and Applications Pub Date : 2009-12-25 DOI: 10.1109/IFCSTA.2009.56
Yang Xi-hui, Z. Dinghua, Lu Changde, Wang Fang, Lu Jixiang
{"title":"Environment Evaluation Index Reductions of Digital Workshop Based on Rough Set","authors":"Yang Xi-hui, Z. Dinghua, Lu Changde, Wang Fang, Lu Jixiang","doi":"10.1109/IFCSTA.2009.56","DOIUrl":"https://doi.org/10.1109/IFCSTA.2009.56","url":null,"abstract":"Human-machine environment evaluation of digital workshop involves physical, chemical, psychological, social environment for the workshop and many other factors. Attribution reductions of rough set theory reduces some redundant targets which are less important to human environmental assessment, thus to obtain the important index and to improve the ergonomic effect of the environmental layout of the digital workshop and to ensure the rationality and reliability of product lines.","PeriodicalId":256032,"journal":{"name":"2009 International Forum on Computer Science-Technology and Applications","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124389490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on Authentication for Live Streaming Media over P2P-Based Network 基于p2p网络的流媒体直播认证研究
2009 International Forum on Computer Science-Technology and Applications Pub Date : 2009-12-25 DOI: 10.1109/IFCSTA.2009.300
W. Xinli
{"title":"Study on Authentication for Live Streaming Media over P2P-Based Network","authors":"W. Xinli","doi":"10.1109/IFCSTA.2009.300","DOIUrl":"https://doi.org/10.1109/IFCSTA.2009.300","url":null,"abstract":"The purpose of this article is to discuss an authentication method for Peer to Peer (P2P)-based streaming media. Methods of encryption of streaming media data and digital signatures were used to improve the safety of the media. The digital certificate publishing service and management services of live streaming media authentication information are expanded in the live stream system based on P2P networks. Besides, software used in client are extended functions such as application of digital certificates, decryption of the media stream, request for certification in order to be used by the client to the provider of live stream. The live stream was received from P2P-based network, decrypted and played by the client. The security of media has been improved and the protection for live media copyright has been enhanced through this way.","PeriodicalId":256032,"journal":{"name":"2009 International Forum on Computer Science-Technology and Applications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130766040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research and Implementation of Ancient Architecture Roaming System Based on VRML 基于VRML的古建筑漫游系统的研究与实现
2009 International Forum on Computer Science-Technology and Applications Pub Date : 2009-12-25 DOI: 10.1109/IFCSTA.2009.188
Zhang Lin, Zhao Chunxiao, Zhao Hang
{"title":"Research and Implementation of Ancient Architecture Roaming System Based on VRML","authors":"Zhang Lin, Zhao Chunxiao, Zhao Hang","doi":"10.1109/IFCSTA.2009.188","DOIUrl":"https://doi.org/10.1109/IFCSTA.2009.188","url":null,"abstract":"Technology of Virtual Random Walk in building environment is one of the important contents of Virtual Reality Technology, which has a broad prospect for application in the fields of architecture, tourism, military and computer game design. This paper introduces the principle of Virtual Reality Modeling Language VRML, analyzes its operating principle and basic characteristics. Then it introduces some related technologies of the ancient cultural sites of the virtual roaming system. It introduces in detail three-dimensional modeling steps and methods including geometric modeling, physical modeling and Behavioral Modeling. Then, it give a detailed analysis of the key technology and the program realization of the ancient architecture of the virtual roaming system with the construction of Miaofeng Mountain as the background. Finally, it introduces the web-browse module and the optimization mode of the scene.","PeriodicalId":256032,"journal":{"name":"2009 International Forum on Computer Science-Technology and Applications","volume":"8 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116782398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Fuzzy Data Mining Algorithm in Performance Evaluation of Human Resource 模糊数据挖掘算法在人力资源绩效评价中的应用
2009 International Forum on Computer Science-Technology and Applications Pub Date : 2009-12-25 DOI: 10.1109/IFCSTA.2009.90
Hang Jing
{"title":"Application of Fuzzy Data Mining Algorithm in Performance Evaluation of Human Resource","authors":"Hang Jing","doi":"10.1109/IFCSTA.2009.90","DOIUrl":"https://doi.org/10.1109/IFCSTA.2009.90","url":null,"abstract":"The assessment of human resource performance objectively, thoroughly, and reasonably is critical to choosing managerial personnel suited for organizational development. Therefore, an efficient tool should be able to deal with various employees’ data and assist managers to make decision and strategic plan. As an effect mathematic tool to deal with the vagueness and uncertainty, fuzzy data mining is considered as a highly desirable tool being applied to many application areas. In this paper we applied the fuzzy data mining technique to make the assessment and selection of human resource in enterprise. We present and justify the capabilities of fuzzy data mining technology in the evaluation of human resource in enterprise by proposing a practical model for improving the efficiency and effectiveness of human resource management. Firstly, the paper briefly explained the basic fuzzy data mining theory, and proposed the fuzzy data mining algorithm in detail. We gave process steps and the flow chart of algorithm in this part. Secondly, we used the human resource management data as illustration to implement the algorithm. We used the maximal tree to cluster the human resource. Then the raw data of human resource management is compared with each cluster and calculate the proximal values based on the equation in fuzzy data mining algorithm. At last we determined the evaluation of human resource. The whole process was easy to be completed. The results of this study indicated that the methodology was practical and feasible. It could help managers in enterprise assess performance of the human resource swiftly and effectively.","PeriodicalId":256032,"journal":{"name":"2009 International Forum on Computer Science-Technology and Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131554424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
The Study of the Generalized PID Algorithm 广义PID算法的研究
2009 International Forum on Computer Science-Technology and Applications Pub Date : 2009-12-25 DOI: 10.1109/IFCSTA.2009.67
Z. Xiaodong, Liang Yongqiang, Xue Anke
{"title":"The Study of the Generalized PID Algorithm","authors":"Z. Xiaodong, Liang Yongqiang, Xue Anke","doi":"10.1109/IFCSTA.2009.67","DOIUrl":"https://doi.org/10.1109/IFCSTA.2009.67","url":null,"abstract":"A generalized PID algorithm (GPID) is proposed to improve the time response and control quality of the traditional PID control algorithm. The traditional PID controller is a special case of the generalized PID, this can be shown by comparing the coefficients of GPID and PID. GPID can be obtained by adding higher-order derivative terms in on the form of the traditional PID.GPID can get better control performance than PID by optimizing parameters. Finally simulations using Matlab7.0 are proposed. The step responses of several examples for different systems with or without time-delay and noises are shown.","PeriodicalId":256032,"journal":{"name":"2009 International Forum on Computer Science-Technology and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132718260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A New Algorithm for Solving the Intruder Deduction Problem 求解入侵者演绎问题的一种新算法
2009 International Forum on Computer Science-Technology and Applications Pub Date : 2009-12-25 DOI: 10.1109/IFCSTA.2009.206
Cheng Chen, C. Weihong
{"title":"A New Algorithm for Solving the Intruder Deduction Problem","authors":"Cheng Chen, C. Weihong","doi":"10.1109/IFCSTA.2009.206","DOIUrl":"https://doi.org/10.1109/IFCSTA.2009.206","url":null,"abstract":"The intruder deduction problem is the key of formal analysis of crytographical protocol. Because many security protocols are based on the algebraic properties of original operation, so it must analyze the problem under the equational theory which is inducted by the set of equations that expressed the algebraic properties, then it becomes more difficult. A new algorithm for solving the intruder deduction problem which under the Dolev-Yao model is given, it is based on two ideas, one is dividing the equational theory into finite equivalence theory and cancellation equivalence theory, another is choosing representative element. The algorithm is same with most protocols, reduces the complexity of basic algorithm which adopted in usual. The result has been verified in related task","PeriodicalId":256032,"journal":{"name":"2009 International Forum on Computer Science-Technology and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128106103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信