2012 Fourth International Conference on Computational and Information Sciences最新文献

筛选
英文 中文
Modeling and Simulation of Mounting Machine Based on VRML 基于VRML的安装机建模与仿真
2012 Fourth International Conference on Computational and Information Sciences Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.185
Lan Li
{"title":"Modeling and Simulation of Mounting Machine Based on VRML","authors":"Lan Li","doi":"10.1109/ICCIS.2012.185","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.185","url":null,"abstract":"Mounting machine is the most critical bottleneck equipment in the SMT, the production efficiency of which restricts the entire assembly line's productivity dramatically. In order to enhance the virtual manufacture of paste simulation for PCB circuit modular, it is essential and critical for virtual reality simulation to build 3D model for the mounting machine in an efficient and accurate way. Based on the modeling principles, we have done extensive research on critical techniques on VRML geometric modeling. We have proposed the VRML based method that utilizes several modeling tools to build the geometric models efficiently. Using the boom mounting machine as an example, we have focused on the interior and the exterior cases of the mounting machine, to illustrate the construction of its static model that is based on VRML. The result of the simulation has proved the efficiency of the modeling methodology. The models generated have high degree of fidelity. This paper has built the foundation for visual system of mounting machine.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126373922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Study on the Shortest Path Problem Based on Improved Genetic Algorithm 基于改进遗传算法的最短路径问题研究
Zongyan Xu, Haihua Li, Ye Guan
{"title":"A Study on the Shortest Path Problem Based on Improved Genetic Algorithm","authors":"Zongyan Xu, Haihua Li, Ye Guan","doi":"10.1109/ICCIS.2012.52","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.52","url":null,"abstract":"This paper adresses a shortest path problem in network optimization, and proposes a model with constraints. In order to solve the problem, we present an improved genetic algorithm through optimal selection and crossover strategy of genetic algorithm, and explore the framework and key steps of improved genetic algorithm for solving shortest path problem. This algorithm with advantages of intelligent computation has the strong optimization ability and simple structure, which can handle the constraints easily. The results of experiment demonstrate the effectiveness of the improved genetic algorithm and show the search efficiency and solution quality of the algorithm.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125788352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Prior Distribution of Missile Range Trial Successive Test Data Based on Random Weighting 基于随机加权的导弹靶场试验连续试验数据先验分布
2012 Fourth International Conference on Computational and Information Sciences Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.212
Jin Sun, Guolin Li, Cheng Xu
{"title":"Prior Distribution of Missile Range Trial Successive Test Data Based on Random Weighting","authors":"Jin Sun, Guolin Li, Cheng Xu","doi":"10.1109/ICCIS.2012.212","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.212","url":null,"abstract":"Aiming at the small sample of missile range trial successive test data, a random weighting method is used to get the prior distribution function of population's parameter with the known prior information under the situation that the parameters' format of general distribution is unknown. Bayesian method is adopted to determine the posterior distribution by using the prior information, population information and sample information. The illustration shows that this method can greatly improve the accuracy of statistic inference, and overcome the shortage of small sample size.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121861717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Research and Implement of a Dual-Controller System 双控制器系统的研究与实现
2012 Fourth International Conference on Computational and Information Sciences Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.340
Yi Chen, Yihua Lan, H. Ren
{"title":"The Research and Implement of a Dual-Controller System","authors":"Yi Chen, Yihua Lan, H. Ren","doi":"10.1109/ICCIS.2012.340","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.340","url":null,"abstract":"With the rapid development of information construction around the world, it needs special storage system to provide a stable, reliable, safe data storage service. This paper develops a Dual-Controller system which adds the hardware level redundant relative to Single-Controller system, so it has high stability and reliability in the level of disk and controller. It can satisfy the requirements of storage service stability of higher industry. The Dual-Controller system uses the special heart module between the controllers for communication. So when the system is running, one controller is always getting the mirror controller's state, which helps to detect the fault when the mirror controller is fault. We create the CACHE module to maintain two types of data of CACHE and MIRROR. The experimental result shows the performance of Dual-Controller system is almost the same with the Single-Controller system, but the Dual-Controller system won't loss the data and can continue to provide data services.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127940283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Rapid Surface Remodeling of Human Body Based on Scanned Data 基于扫描数据的人体快速表面重构
Xiaofang Huang, Shouqian Sun
{"title":"A Rapid Surface Remodeling of Human Body Based on Scanned Data","authors":"Xiaofang Huang, Shouqian Sun","doi":"10.1109/ICCIS.2012.39","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.39","url":null,"abstract":"3D human model is widely used in various fields, especially real human model. Along with the development of 3D scanning techniques, real human body data can be acquired by 3D scanner. But the number of point cloud data is huge. Human model data processing requires massive calculation although the computer hardware performance is better and better. In order to overcome the problem, this paper presents a rapid surface remodeling of human body based on scanned data. The results show that this method can quickly and effectively simplify large point cloud data and get satisfied real human models. This method can be applied to reconstruct a large number of human models and display their human figure in real time.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131370382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Effective Apply of Design Pattern in Database-Based Application Development 设计模式在数据库应用程序开发中的有效应用
2012 Fourth International Conference on Computational and Information Sciences Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.138
Haoyue Dai
{"title":"Effective Apply of Design Pattern in Database-Based Application Development","authors":"Haoyue Dai","doi":"10.1109/ICCIS.2012.138","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.138","url":null,"abstract":"In the design of database-based application, effective use of object-oriented programming methodology to optimize the database access code is related to the structure and maintainability of the entire application. Without proper optimization of the access code will cause significant incensement of the degree of coupling between modules, and increase the cost of application maintenance. This paper discusses how to effectively apply thoughts of Design Patterns and technique of Object Oriented Programming to construct the database applications, which will be made to well formed, easy to understand and maintain. Practice has proved that effective apply of appropriate design patterns make database application structure be easy to understand, thereby greatly improve the scalability and maintainability of the whole application.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130275941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on Network Security Situation Assessment and Prediction 网络安全态势评估与预测研究
2012 Fourth International Conference on Computational and Information Sciences Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.249
Xiaorong Cheng, S. Lang
{"title":"Research on Network Security Situation Assessment and Prediction","authors":"Xiaorong Cheng, S. Lang","doi":"10.1109/ICCIS.2012.249","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.249","url":null,"abstract":"The overall objective of the network security situation assessment is to establish security situation assessment system. This system can unify the large-scale network. First, it provides a security policy unified the whole network. It also provides the techniques for wide-area situation assessment. At the same time this system provides situational awareness and decision support tools for the implementation of network security command. Firstly, the information model of security situation was studied based on XML. Then the security situation value of system including three levels: service, host and network was analyzed and calculated. The-support vector regression machine was chosen for predicting the network security situation and determined the parameter values. Finally, the effectiveness of the method was verified through experimental analysis.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130277615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Research of Mining Effective and Weighted Association Rules Based on Dual Confidence 基于对偶置信度的有效加权关联规则挖掘研究
2012 Fourth International Conference on Computational and Information Sciences Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.232
Yihua Zhong, Yuxin Liao
{"title":"Research of Mining Effective and Weighted Association Rules Based on Dual Confidence","authors":"Yihua Zhong, Yuxin Liao","doi":"10.1109/ICCIS.2012.232","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.232","url":null,"abstract":"Association rule is an important model in data mining. However, traditional association rules are mostly based on the support and confidence metrics, and most algorithms and researches assumed that each attribute in the database is equal. In fact, because the user preference to the item is different, the mining rules using the existing algorithms are not always appropriate to users. By introducing the concept of weighted dual confidence, a new algorithm which can mine effective weighted rules is proposed in this paper, which is on the basis of the dual confidence association rules used in algorithm. The case studies show that the algorithm can reduce the large number of meaningless association rules and mine interesting negative association rules in real life.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130450933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Research Method of Fuzzy Neural Network of Reservoir Heterogeneity 储层非均质性模糊神经网络研究方法
2012 Fourth International Conference on Computational and Information Sciences Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.229
Li Guorong, H. Jingjing, Liao Tai-ping, Lin Zhicheng, Z. Furong
{"title":"Research Method of Fuzzy Neural Network of Reservoir Heterogeneity","authors":"Li Guorong, H. Jingjing, Liao Tai-ping, Lin Zhicheng, Z. Furong","doi":"10.1109/ICCIS.2012.229","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.229","url":null,"abstract":"For analysis of the reservoir, due to complexity of the reservoir heterogeneity, the relationship between the logging response value and the non-homogenous reservoir is complex and fuzzy. The use of fuzzy clustering method of neural network combines the adaptivity and the fault tolerance of the neural network organic manner with the fuzzy comprehensive discrimination in the human thinking simulation of fuzzy logic, so as to recognize the reservoir heterogeneity through multi-factor fuzzy comprehensive judgment and reasoning. This method has been used to treat the data about the 135 wells in Xujiahe Group in central Sichuan, and has shown good results, with a coincidence rate as high as 87.6%. The result demonstrates that this method enjoys good adaptivity against the problem of automatic recognition of the reservoir heterogeneity, and could improve the precision of automatic recognition of the reservoir heterogeneity.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134291560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application Research of MPLS VPN All-in-One Campus Card Network Based on IPSec 基于IPSec的MPLS VPN校园一卡通应用研究
Mu Zhang, Zhongping Tao
{"title":"Application Research of MPLS VPN All-in-One Campus Card Network Based on IPSec","authors":"Mu Zhang, Zhongping Tao","doi":"10.1109/ICCIS.2012.86","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.86","url":null,"abstract":"This paper describes the MPLS VPN technology and IPSec protocol, and explains how the technology which is based on the IPSec MPLS VPN technology works and how to put this kind of technology into practice. Through the profound research of the advantages and disadvantages of the MPLS VPN and the IPSec technology, I have worked out a solution named the MPLS VPN ALL-in-One Card Network based on IPSec and its practicable model. This solution has not only the high-speed exchange of MPLS VPN, excellent quality of QoS and good expandability, but also the assurance of the high security and dependability of IPSec. This paper gives the detailed description of the comprehensive and effective applications of the MPLS VPN network technology used in the all-in-one campus card network in universities with multi-campuses in the multi-service system like the teaching, management, finance and the campus life, etc, by showing the campus network construction example between one university's main campus and its other campuses.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131748912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信