2009 International Conference on Computer Technology and Development最新文献

筛选
英文 中文
Graph Partitioning Method for Functional Module Detections of Protein Interaction Network 蛋白质相互作用网络功能模块检测的图划分方法
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.168
A. Abdullah, S. Deris, S. Hashim, Hamimah Mohd Jamil
{"title":"Graph Partitioning Method for Functional Module Detections of Protein Interaction Network","authors":"A. Abdullah, S. Deris, S. Hashim, Hamimah Mohd Jamil","doi":"10.1109/ICCTD.2009.168","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.168","url":null,"abstract":"Study on topology structure of protein interaction network has been suggested as a potential effort to discover biological functions and cellular mechanisms at systems level. In this work, we introduced a graph partitioning method to partition protein interaction network into several clusters of interacting proteins that share similar functions called functional modules. Our proposed method encompasses three major steps which are preprocessing, informative proteins selection and graph partitioning algorithm. We utilized the protein-protein interaction dataset from MIPS to test the proposed method. We use Gene Ontology information to validate the biological significance of the detected modules. We also downloaded protein complex information to evaluate the performance of our method. In our analysis, the method showed high accuracy performance indicates that this method capable to detect highly significance modules. Hence, this showed that functional modules detected by the proposed method are biologically significant which can be used to predict uncharacterized proteins and infer new complexes.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126114006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Betweeness-Centrality of Grid Networks 网格网络的中间-中心性
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.230
I. Rajasingh, Bharati Rajan, F. D.
{"title":"Betweeness-Centrality of Grid Networks","authors":"I. Rajasingh, Bharati Rajan, F. D.","doi":"10.1109/ICCTD.2009.230","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.230","url":null,"abstract":"Importance of estimating the centrality of the nodes in large networks has recently attracted increased interest. Betweenness is one of the most important centrality indices, which basically counts the number of shortest paths going through a node. Betweenness has been used in diverse applications such as social network analysis or route planning. In this paper we find a formula to obtain the betweeness-centrality for grids.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129064827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Verification and Validation of Activity Diagrams Using Graph Transformation 使用图转换的活动图的验证和确认
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.172
V. Rafe, R. Rafeh, S. Azizi, M. Miralvand
{"title":"Verification and Validation of Activity Diagrams Using Graph Transformation","authors":"V. Rafe, R. Rafeh, S. Azizi, M. Miralvand","doi":"10.1109/ICCTD.2009.172","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.172","url":null,"abstract":"Graphical structures (like graphs, diagrams, visual sentences and others) are very useful to describe complex structures and systems. These structures are often augmented by formalisms which add a further dimension to the static description allowing for the modeling of the evolution of systems via any kind of transformation of such graphical structures. Graph transformation has been widely used for modeling. Graphs are well suited to describe the underlying structures of models. They provide a good method to carry out the analysis and verification activities and using the AGG toolset for designing them. A major goal of this paper is the ability to determine the correctness behavior and formal semantics of UML2.0 activity diagrams by Graph Transformation Systems.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130607130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Secure Virtual Application Distribution 安全虚拟应用程序分发
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.56
W. Z. A. Zakaria, Mohd Azuddin Parman, Zharfan Hamdan, M. S. Rohmad, M. Isa
{"title":"Secure Virtual Application Distribution","authors":"W. Z. A. Zakaria, Mohd Azuddin Parman, Zharfan Hamdan, M. S. Rohmad, M. Isa","doi":"10.1109/ICCTD.2009.56","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.56","url":null,"abstract":"This paper describes about a framework for secure assignment of virtual application from server to client. The server is a gateway to many applications, which the client can utilize it by requesting the server through the client’s interface. The communication of this system is based on trust, where the Trusted Platform Module plays main role in communication part of this framework. Client machine applies virtualization technology, which is used to run the virtual application downloaded from the server.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116943160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study of Soft-sensing Method Used to Predict the Overhead Product Purity of the Styrene Distillation Column 软测量法预测苯乙烯精馏塔顶产物纯度的研究
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.99
Cao Wei, Zhao Ying-kai, L. Zhaojie, Liao Zhiliang
{"title":"Study of Soft-sensing Method Used to Predict the Overhead Product Purity of the Styrene Distillation Column","authors":"Cao Wei, Zhao Ying-kai, L. Zhaojie, Liao Zhiliang","doi":"10.1109/ICCTD.2009.99","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.99","url":null,"abstract":"In the paper, a new adaptive soft-sensor model has been used to predict the overhead product purity of the styrene distillation column. Combined with process characteristics of the tower, an adaptive correction method with three deviations is proposed, which based on the recursive PLS. The predictive ability of this soft-sensing method gives accurate predictions of both measured and unmeasured quantities, even in the presence of large unmeasured disturbances. The application results show that this model has a high accurate property. The proposed method also provides a case study to aid in applications to other industrial problems.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130972277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Submarine Maneuverability of Flooded Compartment 水淹舱潜艇机动性研究
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.70
Liu Hui, Pu Jinyun, Jin Tao
{"title":"Research on Submarine Maneuverability of Flooded Compartment","authors":"Liu Hui, Pu Jinyun, Jin Tao","doi":"10.1109/ICCTD.2009.70","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.70","url":null,"abstract":"The paper establishes the emergency recovery maneuver motion model. According to the characteristic of hydrodynamics coefficients on flooded submarine, attaining hydrodynamics coefficients of different angle of attack by limited ship model hydrodynamics experiment of large angle of attack. A sensitivity index is introduced to evaluate submarine’s controllability. The experiment results are regressed to two kinds of hydrodynamic coefficients for big sensitivity index hydrodynamic coefficients, then forecast the submarine’s maneuverability. The calculation example proves the validity and feasibility of applied method.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132356624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Effects of Heavy Tailed Distribution on Statistical and Neural Network Based Control Charts 重尾分布对基于统计和神经网络控制图的影响
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.55
Ong Hong Choon, Poh-Ying Lim
{"title":"Effects of Heavy Tailed Distribution on Statistical and Neural Network Based Control Charts","authors":"Ong Hong Choon, Poh-Ying Lim","doi":"10.1109/ICCTD.2009.55","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.55","url":null,"abstract":"Artificial Neural Networks (ANN) had been used for the detection and classification of patterns in control charts. It has been shown that neural network can detect smaller shifts better than statistical control charts. However, nearly all studies in this area assume that the in-control process data in the control charts follow a normal distribution. In our study, we focus on the effects of heavy tailed distributions on the performance of neural network based control chart and statistical control charts. Statistical control charts like Shewhart X control chart, Exponentially Weighted Moving Average (EWMA) control chart and Cumulative Sum (CUSUM) control chart are presented to make the comparison of the effects of heavy tailed distribution with Neural network based control chart. The criterion to compare the performance of both types of control charts is the average run length (ARL). From the results, the neural network is less robust than the statistical based control charts in the presence of heavy tailed data.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128123534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stress and Strain Distribution in Cemented Total Hip Arthroplasty for Walking Load Case 行走负荷下骨水泥全髋关节置换术的应力应变分布
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.28
A. H. Abdullah, M. Nor, A. Saman
{"title":"Stress and Strain Distribution in Cemented Total Hip Arthroplasty for Walking Load Case","authors":"A. H. Abdullah, M. Nor, A. Saman","doi":"10.1109/ICCTD.2009.28","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.28","url":null,"abstract":"Aseptic loosening is the critical reason for the failure of the cemented total hip arthroplasty. It occurs due to bone remodeling triggered by stress shielding and cement mantle fracture. In this study, stress shielding and bone thickening phenomenon of the cemented THA femur was analysed using three dimensional finite element method for walking load case. The intact femur is modeled to consist of cortical bone and cancellous bone. The prosthesis stem and bone cement are modeled to be biocompatibility Ti-6Al-4V alloy and polymethyl-methacrylate (PMMA). The maximum principal stress of THA femur is lower than that predicted in intact femur at the middle region which leads to stress shielding problems. While higher stress at the bottom region enhance bone thickening and contribute to prosthesis loosening.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134458849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A New Method for Large Scale Nonnegative Least Squares Problems 求解大规模非负最小二乘问题的一种新方法
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.88
Longquan Yong
{"title":"A New Method for Large Scale Nonnegative Least Squares Problems","authors":"Longquan Yong","doi":"10.1109/ICCTD.2009.88","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.88","url":null,"abstract":"We present a new method for solving large scale nonnegative least squares problems. Firstly, nonnegative least squares problem was transformed into monotone linear complementarity problem. Then we apply potential-reduction interior point algorithm to monotone linear complementarity problem which is based on the Newton direction and centering direction. We show that this algorithm have the polynomial complexity. Numerical results are reported which demonstrate very good computational performance on nonnegative least squares problems.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133447557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Reflection of Network Security Caused by a Wheel 车轮引发的网络安全反思
2009 International Conference on Computer Technology and Development Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.49
Ruan Hong-Wei, Li Hua, Ao Teng-He, Wu Cheng-yong
{"title":"Reflection of Network Security Caused by a Wheel","authors":"Ruan Hong-Wei, Li Hua, Ao Teng-He, Wu Cheng-yong","doi":"10.1109/ICCTD.2009.49","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.49","url":null,"abstract":"Starting from the popular application of JNLP protocol in the network flow monitor products, through the analysis of security issues, this article presents reflection of current network security for industry to explore and improve.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133951987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信