2009 International Conference on Computer Technology and Development最新文献

筛选
英文 中文
Empire Establishment Algorithm 帝国建立算法
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.71
Seyed Mojtaba Saif, H. Shah-Hosseini, Mohammad Reza Feizi
{"title":"Empire Establishment Algorithm","authors":"Seyed Mojtaba Saif, H. Shah-Hosseini, Mohammad Reza Feizi","doi":"10.1109/ICCTD.2009.71","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.71","url":null,"abstract":"The main goal of the research has described in this paper is to change the simple GA (Genetic Algorithm) for better accuracy. The proposed Empire Establishment Algorithm is similar to the parallel Genetic Algorithm. Genetic Algorithms are a subclass of Evolutionary Algorithms. Genetic Algorithms mimic some processes of nature. Here, with the distribution fashion of the tribes in several regions and empire establishment, some changes in the simple Genetic Algorithm are proposed. These changes will add to the accuracy and the success of the GA.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132917466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Effect of Technological Improvement on the Development of Photovoltaic Industry 技术进步对光伏产业发展的影响
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.250
Chen Ming
{"title":"The Effect of Technological Improvement on the Development of Photovoltaic Industry","authors":"Chen Ming","doi":"10.1109/ICCTD.2009.250","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.250","url":null,"abstract":"In recent years, China's PV industry has being developed rapidly due to the demand from international market. Technological progress pushed the cost of power generation to decline continuously. Comparing to the cost of normal power generation, however, there is no competitive advantage, and there remains a huge gap with foreign companies in technology. In order to long-term development, greater scientific research investment should be given to promote independent innovation and speed up scientific and technological progress.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134135923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A New Stability Criterion of Networked Control Systems 一种新的网络控制系统稳定性判据
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.73
Xiaohua Ge, Xiefu Jiang, Xinxin Zhang
{"title":"A New Stability Criterion of Networked Control Systems","authors":"Xiaohua Ge, Xiefu Jiang, Xinxin Zhang","doi":"10.1109/ICCTD.2009.73","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.73","url":null,"abstract":"This paper concerns with robust stability criteria of networked control systems (NCSs) with the effects of both the time-varying network-induced delay and data packet dropout taken into consideration. A less conservative delay-dependent stability condition is formulated in the form of a linear matrix inequality based on a Lyapunov–Krasovskii functional. No slack matrix variables are introduced and overly bounding for some term is avoided. Furthermore, a strict proof is given to show less conservatism of the proposed method.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134312521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Owner-Controlled Towards Personal Information Stored in Hippocratic Database 所有者控制对希波克拉底数据库中存储的个人信息
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.90
N. Ghani, Z. M. Sidek
{"title":"Owner-Controlled Towards Personal Information Stored in Hippocratic Database","authors":"N. Ghani, Z. M. Sidek","doi":"10.1109/ICCTD.2009.90","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.90","url":null,"abstract":"Privacy protection has become one of the important requirement in web-based information system that deal with personal information. There are an issues arise that personal information collected should be privacy-protected. Owner should know to what extent information about them has been collected, how it’ll used and able to control their own information. Hippocratic Database (HDB) introduced by Agrawal, et al. (2002) is a relational database system that has been proposed in order to protect the privacy at database level. Hippocratic Database used the purpose as a central concept in the database development. But, currently with the notion of purpose, owner is unable to control his/her PI stored in HDB regardless they are able to. This paper discussed and introduced an initial architecture of owner-controlled Hippocratic Database","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134477964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Interactive Electronic Reader to Support English Education 互动式电子阅读器支援英语教育
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.108
Rowel Atienza, T. Tai
{"title":"Interactive Electronic Reader to Support English Education","authors":"Rowel Atienza, T. Tai","doi":"10.1109/ICCTD.2009.108","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.108","url":null,"abstract":"Knowledge of English in the Philippines is important not only in the work place, but as well as in education. English is the primary language of instruction in the Philippines, even in public schools. Students who have difficulty understanding English will also have trouble with the other subjects like Science and Math. However, there is a lack of qualified English school teachers, particularly in the public school system where the teachers themselves use wrong grammar and mispronounce words. To help alleviate the problem, our group has partnered with the Department of Education to create an electronic reader. The electronic reader can demonstrate proper pronunciation and can supplement the lessons taught in a traditional classroom environment with interactive exercises and activities. A complete Grade 3 English course in an electronic game console format was developed and deployed in an elementary school to test its effectiveness. About 300 students got involved in the experiment. After one school year of monitoring and evaluation, students who used the reader showed improved scores in government administered tests. Students from low performing sections had particularly significant gains.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130297819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Devising a Biological Model to Detect Polymorphic Computer Viruses Artificial Immune System (AIM): Review 设计一种检测多态计算机病毒的生物模型——人工免疫系统(AIM):综述
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.54
S. Abdulla, O. Zakaria
{"title":"Devising a Biological Model to Detect Polymorphic Computer Viruses Artificial Immune System (AIM): Review","authors":"S. Abdulla, O. Zakaria","doi":"10.1109/ICCTD.2009.54","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.54","url":null,"abstract":"Currently, in most virus detection techniques the signature recognition process of unknown viruses are challenging task. The process has become more difficulties after the complexities of the viruses’ structure have developed, as in the Polymorphic computer viruses. This paper reviews and then explains some used techniques to detect the known polymorphic viruses. Besides, the paper contains the review of some biological models for virus detection. Finally, a new biological model for detecting polymorphic viruses is suggested.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"384 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123092120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Stress and Strain Distribution in Cemented Total Hip Arthroplasty for Walking Load Case 行走负荷下骨水泥全髋关节置换术的应力应变分布
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.28
A. H. Abdullah, M. Nor, A. Saman
{"title":"Stress and Strain Distribution in Cemented Total Hip Arthroplasty for Walking Load Case","authors":"A. H. Abdullah, M. Nor, A. Saman","doi":"10.1109/ICCTD.2009.28","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.28","url":null,"abstract":"Aseptic loosening is the critical reason for the failure of the cemented total hip arthroplasty. It occurs due to bone remodeling triggered by stress shielding and cement mantle fracture. In this study, stress shielding and bone thickening phenomenon of the cemented THA femur was analysed using three dimensional finite element method for walking load case. The intact femur is modeled to consist of cortical bone and cancellous bone. The prosthesis stem and bone cement are modeled to be biocompatibility Ti-6Al-4V alloy and polymethyl-methacrylate (PMMA). The maximum principal stress of THA femur is lower than that predicted in intact femur at the middle region which leads to stress shielding problems. While higher stress at the bottom region enhance bone thickening and contribute to prosthesis loosening.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134458849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Research on Submarine Maneuverability of Flooded Compartment 水淹舱潜艇机动性研究
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.70
Liu Hui, Pu Jinyun, Jin Tao
{"title":"Research on Submarine Maneuverability of Flooded Compartment","authors":"Liu Hui, Pu Jinyun, Jin Tao","doi":"10.1109/ICCTD.2009.70","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.70","url":null,"abstract":"The paper establishes the emergency recovery maneuver motion model. According to the characteristic of hydrodynamics coefficients on flooded submarine, attaining hydrodynamics coefficients of different angle of attack by limited ship model hydrodynamics experiment of large angle of attack. A sensitivity index is introduced to evaluate submarine’s controllability. The experiment results are regressed to two kinds of hydrodynamic coefficients for big sensitivity index hydrodynamic coefficients, then forecast the submarine’s maneuverability. The calculation example proves the validity and feasibility of applied method.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132356624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A New Method for Large Scale Nonnegative Least Squares Problems 求解大规模非负最小二乘问题的一种新方法
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.88
Longquan Yong
{"title":"A New Method for Large Scale Nonnegative Least Squares Problems","authors":"Longquan Yong","doi":"10.1109/ICCTD.2009.88","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.88","url":null,"abstract":"We present a new method for solving large scale nonnegative least squares problems. Firstly, nonnegative least squares problem was transformed into monotone linear complementarity problem. Then we apply potential-reduction interior point algorithm to monotone linear complementarity problem which is based on the Newton direction and centering direction. We show that this algorithm have the polynomial complexity. Numerical results are reported which demonstrate very good computational performance on nonnegative least squares problems.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133447557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Reflection of Network Security Caused by a Wheel 车轮引发的网络安全反思
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.49
Ruan Hong-Wei, Li Hua, Ao Teng-He, Wu Cheng-yong
{"title":"Reflection of Network Security Caused by a Wheel","authors":"Ruan Hong-Wei, Li Hua, Ao Teng-He, Wu Cheng-yong","doi":"10.1109/ICCTD.2009.49","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.49","url":null,"abstract":"Starting from the popular application of JNLP protocol in the network flow monitor products, through the analysis of security issues, this article presents reflection of current network security for industry to explore and improve.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133951987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信