{"title":"Defect Recognition of X-Ray Steel Rope Cord Conveyer Belt Image Based on BP Neural Network","authors":"Wang Wen, Miao Chang-yun, Wang Ji, Li Xian-guo","doi":"10.1109/ISCCS.2011.53","DOIUrl":"https://doi.org/10.1109/ISCCS.2011.53","url":null,"abstract":"BP neural network is used to recognize X-ray steel rope cord conveyer belt image with defect in this paper. Firstly, the model of three layers BP neural network is established, and it is made up of 240 input nodes, 20 hidden layer nodes, and 1 output node. Then, the BP neural network is trained and tested in MATLAB. The results show that X-ray steel rope cord conveyer belt image with defect can be identified by the neural network.","PeriodicalId":326328,"journal":{"name":"2011 International Symposium on Computer Science and Society","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122021550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Linear Algorithms for Reconstructing Complicated Targets from Experimental Data","authors":"J. Miao, Y. Xie, Jianxiong Li, R. Marklein","doi":"10.1109/ISCCS.2011.15","DOIUrl":"https://doi.org/10.1109/ISCCS.2011.15","url":null,"abstract":"In this paper two linear algorithms, the multiple signal classification (MUSIC) algorithm combined with time reversal imaging and the synthetic aperture focussing technique (SAFT), are applied to reconstruct two complicated targets. One target is in an anechoic chamber from experimental microwave data and the other is immersed in water from the experimental elastic wave data. Inversion results from these datasets using the multi frequency multi-bistatic measurement, verify the MUSIC algorithm and SAFT are both promising methods for real time imaging.","PeriodicalId":326328,"journal":{"name":"2011 International Symposium on Computer Science and Society","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121350775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Website Construction Based on Web2.0 Technology","authors":"Li Dong, Jin Shangjie","doi":"10.1109/ISCCS.2011.8","DOIUrl":"https://doi.org/10.1109/ISCCS.2011.8","url":null,"abstract":"The Internet application faces a world revolution from Web1.0 to Web2.0. The motives which cause this revolution are the internet application already the evolution arrive acculturation stage. The customer of internet has the demand of the characteristic and acculturation. This article on the basis of analysis and research to the Web2.0 related key technology AJAX, RSS, builts a personalized website of weather inquiry according to the Web2.0 technique. Andthe main realization procedures are also introduced.","PeriodicalId":326328,"journal":{"name":"2011 International Symposium on Computer Science and Society","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126771499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Organization and Construction Strategies for Online Learning Resources in Lifelong Learning Based on Problems Discovery","authors":"Jie Cheng","doi":"10.1109/ISCCS.2011.58","DOIUrl":"https://doi.org/10.1109/ISCCS.2011.58","url":null,"abstract":"In order to make up the early missing education and keep up with the requirement of career, or just to be make oneself happier, lifelong learning has been one of the most urgent demands for every person. Online learning resources construction is an essential task to carry out and develop lifelong learning for more people. However, there still exist many problems, such as scarce of sharing mechanism, serious re-construction, non-structure and semistructure resources organization, etc. This paper aims at the existing problems and puts forward five strategies for organization and construction of online learning resources. It also provides a research and development network framework with blended topology by universities and agencies nodes.","PeriodicalId":326328,"journal":{"name":"2011 International Symposium on Computer Science and Society","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126427680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of Real-Time Data OPC Asynchronous Communication in Incentive-Type Simulator","authors":"Xianmin Wei","doi":"10.1109/ISCCS.2011.31","DOIUrl":"https://doi.org/10.1109/ISCCS.2011.31","url":null,"abstract":"This paper describes the working principle of OPC technology, combined with incentive-type simulator working mechanism, and given the development method of OPC asynchronous communication and the concrete realization using Visual C + +6.0. Using memory-mapped file to set up real-time database for system running, through memory-mapped file to open shared memory area and to operate its data. This method can realize the sharing of process data, and ensures the real-time responsiveness to Ovation DCS server database to read and write data. With faster data transfer rates, security and high reliability in the thermal power plant automation has a strong versatility and practicality.","PeriodicalId":326328,"journal":{"name":"2011 International Symposium on Computer Science and Society","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134041821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hock Chuan Lim, M. Barlow, Henry Larkin, Rob Stocker
{"title":"Generative Experimentation and Social Simulation: Exploring Gaming for Model Verification and Validation","authors":"Hock Chuan Lim, M. Barlow, Henry Larkin, Rob Stocker","doi":"10.1109/ISCCS.2011.94","DOIUrl":"https://doi.org/10.1109/ISCCS.2011.94","url":null,"abstract":"The agent-based modeling paradigm has been actively applied to address social normative issues such as: values, cognition, morality and behaviors. The abstraction of human and human-like social processes and mechanisms result in misalignment of computational model with existing (old) verification and validation techniques and expose significant challenges. We argue that human sources represent a sound approach for verification and validation of agent-based social simulation models. We propose a novel conceptual gaming framework that extracts required information from relevant sources as part of game play.","PeriodicalId":326328,"journal":{"name":"2011 International Symposium on Computer Science and Society","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122513221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Research of Social Characteristics on Chinese Female Scientific Elites--Taking the Female Academicians of CAS for Example","authors":"Zengjie Cao, F. Zhai, Cong Zhao","doi":"10.1109/ISCCS.2011.93","DOIUrl":"https://doi.org/10.1109/ISCCS.2011.93","url":null,"abstract":"This paper analyzed the relative data, compared them with female Nobel Prize winners, research on social characteristics of Chinese female scientific elites. The result shows that the work of geography, background and family are the important social factors of the Chinese female scientific elites.","PeriodicalId":326328,"journal":{"name":"2011 International Symposium on Computer Science and Society","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123842078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prediction for Magnitude of Short Circuit Current in Power Distribution System Based on ANN","authors":"Chen Li-an","doi":"10.1109/ISCCS.2011.43","DOIUrl":"https://doi.org/10.1109/ISCCS.2011.43","url":null,"abstract":"With the growth seen by power systems lately, short circuits have become some of the most common and damaging power system failures. Accurate forecasting of short circuit faults and predicting for magnitude of short circuit current are becoming increasingly important. Power system short circuit fault research is a basic technological problem, but at the same time a rather difficult one, which has played an important role in the design of smart grids. The introduction of ANN prediction has led to improved results over prior art fault diagnosis technologies. Although it has been employed with good results in various fields, reports of its application in power distribution short-circuit current prediction are rather limited. This article introduces the ANN theory in the sphere of short-circuit current prediction in power distribution systems. The prediction model formulated shall serve as theoretical foundation for the design of intelligent switching equipment, with global and selective protection, very likely to be found in future smart grids.","PeriodicalId":326328,"journal":{"name":"2011 International Symposium on Computer Science and Society","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127859304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of Encoding Technology in Large-Scale Streaming Media Application","authors":"Xianmin Wei","doi":"10.1109/ISCCS.2011.36","DOIUrl":"https://doi.org/10.1109/ISCCS.2011.36","url":null,"abstract":"Large-scale online streaming video application has gradually become the most important and potential technology of multimedia applications. Since Internet is heterogeneous and there is no Quality of Service (QoS) and security guarantee, large scale online streaming video application over the Internet faces many challenges. This paper, following the development of video sourcing coding, comprehensive and deeply presents the scalable encoding and error-resilient encoding technology. Some detailed analysis and comparisons are conducted in this paper. At last, future research direction is proposed in this paper too.","PeriodicalId":326328,"journal":{"name":"2011 International Symposium on Computer Science and Society","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131400762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blocking Based Approach for Classification Rule Hiding to Preserve the Privacy in Database","authors":"Anita A. Parmar, U. P. Rao, D. Patel","doi":"10.1109/ISCCS.2011.103","DOIUrl":"https://doi.org/10.1109/ISCCS.2011.103","url":null,"abstract":"Now-a-days it is common to share data between two organizations in many application areas. When data are to be shared between parties, there could be some sensitive patterns which should not be disclosed to the other parties. We address such the problem of sensitive classification rule hiding. We propose a blocking based approach for sensitive classification rule hiding. First we find the supporting transactions of sensitive rules. Then we replace known values with unknown values (\"?\") in those transactions to hide a given sensitive classification rule. Finally the sanitized dataset is generated from which sensitive classification rules are no longer mined. We also discuss experimental results of our algorithm.","PeriodicalId":326328,"journal":{"name":"2011 International Symposium on Computer Science and Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128204368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}