2009 2nd IEEE International Conference on Computer Science and Information Technology最新文献

筛选
英文 中文
On-line diagnosis for Sync brake system of combined train based on multi-agent technique 基于多智能体技术的组合列车同步制动系统在线诊断
2009 2nd IEEE International Conference on Computer Science and Information Technology Pub Date : 2009-09-11 DOI: 10.1109/ICCSIT.2009.5234444
Yang Yingze, Gui Weihua, Huang Zhiwu
{"title":"On-line diagnosis for Sync brake system of combined train based on multi-agent technique","authors":"Yang Yingze, Gui Weihua, Huang Zhiwu","doi":"10.1109/ICCSIT.2009.5234444","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234444","url":null,"abstract":"In view of that Sync brake system of combined-train has a complex configuration and distributed control characteristic, an on-line diagnosis system based on multi-agent technique is designed. The diagnosis system is a two-level multi-agent system, in which diagnosis tasks are divided into simple tasks and accomplished by agents with collaboration. Based on the design of the diagnosis system, the key problems such as the mechanism of task decomposition as well as agent collaboration are resolved. The application results show the validity of this diagnosis method.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126623370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Investigating the feasibility of a Swarm-Array Computing approach 研究群阵列计算方法的可行性
2009 2nd IEEE International Conference on Computer Science and Information Technology Pub Date : 2009-09-11 DOI: 10.1109/ICCSIT.2009.5234902
B. Varghese, G. McKee
{"title":"Investigating the feasibility of a Swarm-Array Computing approach","authors":"B. Varghese, G. McKee","doi":"10.1109/ICCSIT.2009.5234902","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234902","url":null,"abstract":"The work reported in this paper proposes a novel synergy between parallel computing and swarm robotics to offer a new computing paradigm, ‘Swarm-Array Computing’ that can harness and apply autonomic computing for parallel computing systems. One approach among three proposed approaches in swarm-array computing based on landscapes of intelligent cores, in which the cores of a parallel computing system are abstracted to swarm agents, is investigated. A task is executed and transferred seamlessly between cores in the proposed approach thereby achieving self-ware properties that characterize autonomic computing. FPGAs are considered as an experimental platform taking into account its application in space robotics. The feasibility of the proposed approach is validated on the SeSAm multi-agent simulator","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126630424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Energy efficient transport protocol for wireless sensor networks 无线传感器网络的节能传输协议
2009 2nd IEEE International Conference on Computer Science and Information Technology Pub Date : 2009-09-11 DOI: 10.1109/ICCSIT.2009.5234908
S. Ganesh, R. Amutha
{"title":"Energy efficient transport protocol for wireless sensor networks","authors":"S. Ganesh, R. Amutha","doi":"10.1109/ICCSIT.2009.5234908","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234908","url":null,"abstract":"Reliable transport protocols such as TCP are tuned to perform well in traditional networks where packet losses occur mostly because of congestion. Many applications of wireless sensor networks are useful only when connected to an external network. Previous research on transport layer protocols for sensor networks has focused on designing protocols specifically targeted for sensor networks. The deployment of TCP/IP in sensor networks would, however, enable direct connection between the sensor network and external TCP/IP networks. In this paper we focus on the performance of TCP in the context of wireless sensor networks. TCP is known to exhibit poor performance in wireless environments, both in terms of throughput and energy efficiency. To overcome these problems we introduce a mechanism called TCP Segment Caching .We show by simulation that TCP Segment Caching significantly improves TCP Performance so that TCP can be useful even in wireless sensor networks.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126711936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Mining the whole set of person names from the Tibetan Web 从藏文网络中挖掘整个人名集
2009 2nd IEEE International Conference on Computer Science and Information Technology Pub Date : 2009-09-11 DOI: 10.1109/ICCSIT.2009.5234752
T. Jiang, Hongzhi Yu
{"title":"Mining the whole set of person names from the Tibetan Web","authors":"T. Jiang, Hongzhi Yu","doi":"10.1109/ICCSIT.2009.5234752","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234752","url":null,"abstract":"Along with the rapid development of Tibetan language information and Tibetan Web in recent years, personal information becomes a main focus of researchers. While, due to the complexity of the Web information, the extraction of person names is difficult, especially in Tibetan Web. This paper presents a rule-based approach, which is based on the case-auxiliary words and lexicon, to extract the person name from the Tibetan Web. According to the grammar information and statistical rules, we have developed a person name extraction system, which is used for the Tibetan Web. We design a series of experiments to evaluate the performance of the system, and the evaluation results are satisfactory.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126712246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and study of strain data communication system based on LabVIEW 基于LabVIEW的应变数据通信系统的设计与研究
2009 2nd IEEE International Conference on Computer Science and Information Technology Pub Date : 2009-09-11 DOI: 10.1109/ICCSIT.2009.5234852
L. Li-ying, Shen Lan
{"title":"Design and study of strain data communication system based on LabVIEW","authors":"L. Li-ying, Shen Lan","doi":"10.1109/ICCSIT.2009.5234852","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234852","url":null,"abstract":"Because information transmission between monitoring site and monitoring center is required in the building structure strain monitoring system, in order to solve this problem, a remote distributed strain monitoring network system based on TCP and UDP is proposed in this paper. The system mentioned in this paper improves the measurement accuracy and measurement speed, which is easy to expand and modify, thus achieving for stable and reliable communications, security, flexibility and high efficiency in the remote monitoring system.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123171052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
PCA fused NN approach for drill wear prediction in drilling mild steel specimen 基于PCA融合神经网络的低碳钢钻削磨损预测
2009 2nd IEEE International Conference on Computer Science and Information Technology Pub Date : 2009-09-11 DOI: 10.1109/ICCSIT.2009.5234475
S. S. Panda, S. Mahapatra
{"title":"PCA fused NN approach for drill wear prediction in drilling mild steel specimen","authors":"S. S. Panda, S. Mahapatra","doi":"10.1109/ICCSIT.2009.5234475","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234475","url":null,"abstract":"The present paper describes use of principal components for drill wear prediction. It also makes a comparative analysis in using large sensor based technique in predicting drill wear. In order to reduce the redundancy of the network, principal component has been fused with artificial neural network (ANN) for prediction of drill wear. Large numbers of experiments have been conducted and sensor signals have been acquired using data acquisition system. Cutting force, torque, vibrations along with other process parameters such as spindle speed, feed rate, drill diameter, chip thickness and surface roughness have been used as indicative parameters for characterizing the progressive wear of drill. Principal component of these input parameters has been derived thereafter and has been used to predict the flank wear using BPNN","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123258935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design and realization of personalized service in electronic commerce 电子商务中个性化服务的设计与实现
2009 2nd IEEE International Conference on Computer Science and Information Technology Pub Date : 2009-09-11 DOI: 10.1109/ICCSIT.2009.5234605
Liu Xiao-liang
{"title":"Design and realization of personalized service in electronic commerce","authors":"Liu Xiao-liang","doi":"10.1109/ICCSIT.2009.5234605","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234605","url":null,"abstract":"Classical collaborative filtering recommendation is the most successful recommendation algorithm in electronic commerce system application. However, along with the continuous increase of site structure, content complexity and user number, data is extremely sparse and the real-time property and recommendation accuracy of algorithm decrease significantly, even no any commodity can be recommended. This paper classifies the users in electronic commerce by collaborative clustering and carries out different page recommendations for different types of users to realize the personalized service in electronic commerce.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126210702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research and application on INTERBUS operator terminal INTERBUS运营商终端的研究与应用
2009 2nd IEEE International Conference on Computer Science and Information Technology Pub Date : 2009-09-11 DOI: 10.1109/ICCSIT.2009.5234561
Hui Li, Hao Zhang, D. Peng
{"title":"Research and application on INTERBUS operator terminal","authors":"Hui Li, Hao Zhang, D. Peng","doi":"10.1109/ICCSIT.2009.5234561","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234561","url":null,"abstract":"As a fully developed fieldbus technology, INTERBUS is widely used in the world. This paper mainly focuses on the research and development process of INTERBUS Operator Terminal. It consists of three traditional main steps: system design, hardware design and software design. Meanwhile, this paper also aims at INTERBUS network structure, hardware selection and protocol realization, especially discusses how to realize INTERBUS Universal Digital I/O board driver, INTERBUS process data and parameter data transmission and GUI interface. This paper's work will enhance application level of industrial automation.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126337460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Notice of RetractionMotivating students to speak out 撤课通知激励学生发声
2009 2nd IEEE International Conference on Computer Science and Information Technology Pub Date : 2009-09-11 DOI: 10.1109/ICCSIT.2009.5234467
Kawan Soetanto, Sakumi Shimizu
{"title":"Notice of RetractionMotivating students to speak out","authors":"Kawan Soetanto, Sakumi Shimizu","doi":"10.1109/ICCSIT.2009.5234467","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234467","url":null,"abstract":"To create a better society including within the school system, people need to work on listening and exchanging ideas with one another. The decline in nation's birthrate and nuclear family decreased the chances of children socializing with siblings, parents, and older generations. Hence, this makes it difficult for children to develop relationship with others. Moreover, children who feel neglected by their parents or teachers often express their feelings through violence. Thus, rigorous and intense higher education with less socializing time will negatively impact society. Instead, school should also consider the importance of communication; most importantly through restructuring schools to nurture children's analytical skills as well as communication skills. A method as one possible solution is presented, student will learn to not be afraid to speak out and develop their analytical skills and critical thinking.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126565387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on strong-association rule based web application vulnerability detection 基于强关联规则的web应用漏洞检测研究
2009 2nd IEEE International Conference on Computer Science and Information Technology Pub Date : 2009-09-11 DOI: 10.1109/ICCSIT.2009.5234394
He Tian, Jing Xu, Kunmei Lian, Ying Zhang
{"title":"Research on strong-association rule based web application vulnerability detection","authors":"He Tian, Jing Xu, Kunmei Lian, Ying Zhang","doi":"10.1109/ICCSIT.2009.5234394","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234394","url":null,"abstract":"With the increase of the web applications in information society, web application software security become more and more important. Recent investigations show that web application vulnerabilities have become the largest security threat. Websense security report shows that in the first half of year 2008 above 75% of the most popular web site have utilized by the hackers to run malicious code. Detecting and solving vulnerability is the effective way to enhance web security. In this paper we focus on the regression test in web vulnerability detection, and present a strong-association rule based algorithm to make the detection more efficient. In the first step we traverse the whole web site to get the web page collection. And then, in the regression test, we make the association between the pages and expand the pages to a collection set. The set will used in the following iterate traverse. And we define the relational grade to describe the association. Finally, we do the experiment on our target web site which contains the known vulnerabilities such as XSS and SQL injection, and the result shows that the algorithm can detect almost all the pages that may contains vulnerabilities in the target web site.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122171932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信