Seyed Mojtaba Saif, H. Shah-Hosseini, Mohammad Reza Feizi
{"title":"Empire Establishment Algorithm","authors":"Seyed Mojtaba Saif, H. Shah-Hosseini, Mohammad Reza Feizi","doi":"10.1109/ICCTD.2009.71","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.71","url":null,"abstract":"The main goal of the research has described in this paper is to change the simple GA (Genetic Algorithm) for better accuracy. The proposed Empire Establishment Algorithm is similar to the parallel Genetic Algorithm. Genetic Algorithms are a subclass of Evolutionary Algorithms. Genetic Algorithms mimic some processes of nature. Here, with the distribution fashion of the tribes in several regions and empire establishment, some changes in the simple Genetic Algorithm are proposed. These changes will add to the accuracy and the success of the GA.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132917466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Effect of Technological Improvement on the Development of Photovoltaic Industry","authors":"Chen Ming","doi":"10.1109/ICCTD.2009.250","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.250","url":null,"abstract":"In recent years, China's PV industry has being developed rapidly due to the demand from international market. Technological progress pushed the cost of power generation to decline continuously. Comparing to the cost of normal power generation, however, there is no competitive advantage, and there remains a huge gap with foreign companies in technology. In order to long-term development, greater scientific research investment should be given to promote independent innovation and speed up scientific and technological progress.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134135923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Stability Criterion of Networked Control Systems","authors":"Xiaohua Ge, Xiefu Jiang, Xinxin Zhang","doi":"10.1109/ICCTD.2009.73","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.73","url":null,"abstract":"This paper concerns with robust stability criteria of networked control systems (NCSs) with the effects of both the time-varying network-induced delay and data packet dropout taken into consideration. A less conservative delay-dependent stability condition is formulated in the form of a linear matrix inequality based on a Lyapunov–Krasovskii functional. No slack matrix variables are introduced and overly bounding for some term is avoided. Furthermore, a strict proof is given to show less conservatism of the proposed method.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134312521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Owner-Controlled Towards Personal Information Stored in Hippocratic Database","authors":"N. Ghani, Z. M. Sidek","doi":"10.1109/ICCTD.2009.90","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.90","url":null,"abstract":"Privacy protection has become one of the important requirement in web-based information system that deal with personal information. There are an issues arise that personal information collected should be privacy-protected. Owner should know to what extent information about them has been collected, how it’ll used and able to control their own information. Hippocratic Database (HDB) introduced by Agrawal, et al. (2002) is a relational database system that has been proposed in order to protect the privacy at database level. Hippocratic Database used the purpose as a central concept in the database development. But, currently with the notion of purpose, owner is unable to control his/her PI stored in HDB regardless they are able to. This paper discussed and introduced an initial architecture of owner-controlled Hippocratic Database","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134477964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interactive Electronic Reader to Support English Education","authors":"Rowel Atienza, T. Tai","doi":"10.1109/ICCTD.2009.108","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.108","url":null,"abstract":"Knowledge of English in the Philippines is important not only in the work place, but as well as in education. English is the primary language of instruction in the Philippines, even in public schools. Students who have difficulty understanding English will also have trouble with the other subjects like Science and Math. However, there is a lack of qualified English school teachers, particularly in the public school system where the teachers themselves use wrong grammar and mispronounce words. To help alleviate the problem, our group has partnered with the Department of Education to create an electronic reader. The electronic reader can demonstrate proper pronunciation and can supplement the lessons taught in a traditional classroom environment with interactive exercises and activities. A complete Grade 3 English course in an electronic game console format was developed and deployed in an elementary school to test its effectiveness. About 300 students got involved in the experiment. After one school year of monitoring and evaluation, students who used the reader showed improved scores in government administered tests. Students from low performing sections had particularly significant gains.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130297819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Devising a Biological Model to Detect Polymorphic Computer Viruses Artificial Immune System (AIM): Review","authors":"S. Abdulla, O. Zakaria","doi":"10.1109/ICCTD.2009.54","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.54","url":null,"abstract":"Currently, in most virus detection techniques the signature recognition process of unknown viruses are challenging task. The process has become more difficulties after the complexities of the viruses’ structure have developed, as in the Polymorphic computer viruses. This paper reviews and then explains some used techniques to detect the known polymorphic viruses. Besides, the paper contains the review of some biological models for virus detection. Finally, a new biological model for detecting polymorphic viruses is suggested.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"384 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123092120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stress and Strain Distribution in Cemented Total Hip Arthroplasty for Walking Load Case","authors":"A. H. Abdullah, M. Nor, A. Saman","doi":"10.1109/ICCTD.2009.28","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.28","url":null,"abstract":"Aseptic loosening is the critical reason for the failure of the cemented total hip arthroplasty. It occurs due to bone remodeling triggered by stress shielding and cement mantle fracture. In this study, stress shielding and bone thickening phenomenon of the cemented THA femur was analysed using three dimensional finite element method for walking load case. The intact femur is modeled to consist of cortical bone and cancellous bone. The prosthesis stem and bone cement are modeled to be biocompatibility Ti-6Al-4V alloy and polymethyl-methacrylate (PMMA). The maximum principal stress of THA femur is lower than that predicted in intact femur at the middle region which leads to stress shielding problems. While higher stress at the bottom region enhance bone thickening and contribute to prosthesis loosening.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134458849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Submarine Maneuverability of Flooded Compartment","authors":"Liu Hui, Pu Jinyun, Jin Tao","doi":"10.1109/ICCTD.2009.70","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.70","url":null,"abstract":"The paper establishes the emergency recovery maneuver motion model. According to the characteristic of hydrodynamics coefficients on flooded submarine, attaining hydrodynamics coefficients of different angle of attack by limited ship model hydrodynamics experiment of large angle of attack. A sensitivity index is introduced to evaluate submarine’s controllability. The experiment results are regressed to two kinds of hydrodynamic coefficients for big sensitivity index hydrodynamic coefficients, then forecast the submarine’s maneuverability. The calculation example proves the validity and feasibility of applied method.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132356624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Method for Large Scale Nonnegative Least Squares Problems","authors":"Longquan Yong","doi":"10.1109/ICCTD.2009.88","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.88","url":null,"abstract":"We present a new method for solving large scale nonnegative least squares problems. Firstly, nonnegative least squares problem was transformed into monotone linear complementarity problem. Then we apply potential-reduction interior point algorithm to monotone linear complementarity problem which is based on the Newton direction and centering direction. We show that this algorithm have the polynomial complexity. Numerical results are reported which demonstrate very good computational performance on nonnegative least squares problems.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133447557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reflection of Network Security Caused by a Wheel","authors":"Ruan Hong-Wei, Li Hua, Ao Teng-He, Wu Cheng-yong","doi":"10.1109/ICCTD.2009.49","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.49","url":null,"abstract":"Starting from the popular application of JNLP protocol in the network flow monitor products, through the analysis of security issues, this article presents reflection of current network security for industry to explore and improve.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133951987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}