2008 International Conference on Advanced Computer Theory and Engineering最新文献

筛选
英文 中文
Evolutionary Algorithm for Protein Structure Prediction 蛋白质结构预测的进化算法
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2010-09-23 DOI: 10.1109/ICNC.2010.5584796
N. Mansour, Fatima Kanj, H. Khachfe
{"title":"Evolutionary Algorithm for Protein Structure Prediction","authors":"N. Mansour, Fatima Kanj, H. Khachfe","doi":"10.1109/ICNC.2010.5584796","DOIUrl":"https://doi.org/10.1109/ICNC.2010.5584796","url":null,"abstract":"A protein is characterized by its 3D structure,which defines its biological function. In this paper, we present a scatter search algorithm for predicting 3D structures of proteins based on torsion angles representation. Given the protein¿s sequence of amino acids, our algorithm produces a 3D structure that aims to minimize the energy function associated with the structure. Scatter search is an evolutionary approach that is based on a population of candidate solutions. We evaluate our algorithm on proteins taken from a protein data bank. The results show that our algorithm is able to produce 3D structures with good sub-optimal energy values. Also, the root mean square deviations of these structures from the reference proteins are promising within limits imposed by the assumptions made.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"187 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114074952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
The Method of Damaged Pavement Image Splicing Based on Image Pyramid and FCM Clustering 基于图像金字塔和FCM聚类的破损路面图像拼接方法
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.85
Jie Song, Rong-Yan Sun, Yongjie Zhang, Na-Na Li, Junhua Gu
{"title":"The Method of Damaged Pavement Image Splicing Based on Image Pyramid and FCM Clustering","authors":"Jie Song, Rong-Yan Sun, Yongjie Zhang, Na-Na Li, Junhua Gu","doi":"10.1109/ICACTE.2008.85","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.85","url":null,"abstract":"There are usually large noise and anomalistic distribution of characteristic points in the damaged pavement images, which bring great difficulty to splice. In view of the characters, this paper forms one kind of splicing method of the pavement images which is based on image Pyramid, the Harris vertex examination and FCM clustering. Firstly, it forms several groups of the structure of the criterion spaces carrying on the transformation of the multi-criteria and multi-resolution Pyramid. Then it takes this stratification structure as the foundation, and carries on the Harris vertex examination to each structure. Thus it makes the characters carry on the FCM clustering and realize splicing of neighboring damaged pavement surface images.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116761908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Throughput Analysis of Go-Back-N ARQ Protocol under Markovian Interruptions 马尔可夫中断下Go-Back-N ARQ协议的吞吐量分析
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.189
D. Khongorzul, B. Shinn
{"title":"Throughput Analysis of Go-Back-N ARQ Protocol under Markovian Interruptions","authors":"D. Khongorzul, B. Shinn","doi":"10.1109/ICACTE.2008.189","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.189","url":null,"abstract":"In this paper, we determine the performance of a packet data multiplexer with go-back-N ARQ protocol under Markovian interruption. It is assumed that the input process into the system is Poisson process. The output channel is divided into a series of time slots and a data packet can be transmitted in a slot time. It is modeled that the output channel can be blocked by some Markovian interruption, whose state change between the blocking and non-blocking states is given by Markov process.The overall system has been analyzed by considering a relationship, taking the Markovian interruption into account, about the buffer behavior between two successive frames or slots. The concept of virtual buffer occupancy is introduced to simplify the analysis. As a result of this analysis, the buffer behavior has been found. The validity of this analytical results has been verified by computer simulation.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116998227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on Transforming Relational Database into Enriched Ontology 关系数据库向丰富本体转换的研究
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.117
Zhenxin Qu, Shengqun Tang
{"title":"Research on Transforming Relational Database into Enriched Ontology","authors":"Zhenxin Qu, Shengqun Tang","doi":"10.1109/ICACTE.2008.117","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.117","url":null,"abstract":"A method transforming relational database into enriched ontology is proposed. Many methods merely focus on transforming of database schema, transformed ontology has weak semantics and inconsistency. In this paper, database is transformed into ontology by traditional methods firstly, then consistency check is applied on it, at last its semantics is enriched, this course ensures high quality of the transformed ontology. During this course, a predefined basis ontology is used to reduce ontology-mapping and improve consistency. Experiment has been done to prove quality of transformed ontology is improved.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117135105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Session Key Based Manipulated Iteration Encryption Technique (SKBMIET) 基于会话密钥的操纵迭代加密技术
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.179
S. Som, D. Mitra, J. Haldar
{"title":"Session Key Based Manipulated Iteration Encryption Technique (SKBMIET)","authors":"S. Som, D. Mitra, J. Haldar","doi":"10.1109/ICACTE.2008.179","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.179","url":null,"abstract":"In this paper a session key based encryption system has been proposed and termed as \"Session Key Based Manipulated Iteration Encryption Technique (SKBMIET)\". A Key is created from the input. Generating different randomized Matrices forms the Key. The value of the generated is manipulated with the individual ASCII values of the plain text. After completion of this process all the different resultant ASCII values will be further converted into their corresponding binary values. Then a block of stream of bits (n) is taken as input, which is variable. The encryption process is operated on this binary block of different size, which is multiple of 64 bits. The block division process intends to generate the bigger blocks more than the smaller blocks; therefore, the total block-number remains within certain limit. The binary string of source is padded with zero (0) at the end till the stream-size meets the nearest multiple of 64bits. For the purpose of encryption rotate the block in right and left direction and make a group of two bits each and swapped with the group of last two bits. Make a group of four bits each and swapped with the group of last four bits. Further repeat the same process by taking 8, 16 and 32 bits in a group depending on the block size. Divide the newly arranged block into right and left parts of equal bits. Rotate left part one bit-left wise and Rotate-right part one bit-right wise. Rotate the total block in either direction to get the cipher text.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124989694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Study on Vulnerability Model of Spacecraft Impacting by Orbital Debris 航天器轨道碎片撞击易损性模型研究
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.103
Chunmei Liu, Shunshan Feng, Xurong Zhang
{"title":"Study on Vulnerability Model of Spacecraft Impacting by Orbital Debris","authors":"Chunmei Liu, Shunshan Feng, Xurong Zhang","doi":"10.1109/ICACTE.2008.103","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.103","url":null,"abstract":"The spacecraft was studied. Spacecraft vulnerability was analyzed in some aspects as environment, representative structure, aviation theory, damage principle and existence speciality. Then the destruction types were advanced on debris against double plates. The damage types included local perforation and avulsion. And the respective lethality model was put forward. At last the damage probability was obtained when one fragment impacts the double boards by hypervelocity. It is a certain reference and important reality signification, that the vulnerability analysis and lethality mathematical model of spacecraft are researched, to strengthen our space defense ability.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126095445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Three-Tier Architecture for Integrating Mobile Ad Hoc Network and the Internet Using a Hierarchical Integrated Routing Protocol 使用分层集成路由协议集成移动自组织网络和因特网的三层体系结构
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.40
K. Khan, R. Zaman, A. V. Reddy
{"title":"A Three-Tier Architecture for Integrating Mobile Ad Hoc Network and the Internet Using a Hierarchical Integrated Routing Protocol","authors":"K. Khan, R. Zaman, A. V. Reddy","doi":"10.1109/ICACTE.2008.40","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.40","url":null,"abstract":"Connecting the wired and wireless networks particularly the Mobile ad hoc Network is interesting in real world situations due to its usefulness and practicality. Different mechanisms have been proposed to integrate MANETs and the Internet. These strategies differ in gateway discovery mechanism, cell switching criteria, ad hoc routing protocol.In this paper, Mobile-IP is integrated with Hierarchical Cluster-Head Gateway Switch Routing (CGSR) Protocol to provide Internet access to the mobile node of the ad hoc Network. This paper discusses a mechanism for selecting an alternate route in case if the Cluster Head is unable to forward the packets to the destination. The proposed framework provides bi-directional connectivity between the MANET and the Internet nodes. A detailed performance comparison is made between the proposed approach and the other three-tier strategies based on mobility of cluster heads and cluster gateways and other network parameters. The experimental results indicate that the proposed architecture has better packet delivery ratio, end-end delay and mobile node-gateway connectivity ratio for providing full bi-directional connectivity.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114479538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Similarity and Feedback Based Query Routing Across Unstructured Peer-to-Peer Networks 基于相似性和反馈的非结构化点对点网络查询路由
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.134
I. Ishak, N. Salim
{"title":"A Similarity and Feedback Based Query Routing Across Unstructured Peer-to-Peer Networks","authors":"I. Ishak, N. Salim","doi":"10.1109/ICACTE.2008.134","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.134","url":null,"abstract":"In this paper, we propose a query-feedback based routing approach for efficient routing in unstructured peer-to-peer network. In our approach, each node maintains a table that stores information about past queries that have been forward and answered. Each past query represents a number of peers. Each incoming query will be compared with the past queries in the table and similar and reliable peers will be selected to be routed to have an efficient routing approach. Experimental results show that our proposed approach outperforms other feedback based query routing technique in unstructured peer-to-peer networks.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114564775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Computational Approach to Arabic Broken Derived Nouns Morphology 阿拉伯语破碎派生名词形态的计算方法
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.182
Naser K. A. Alajmi, S. bin Deris, S. Alnajem
{"title":"Computational Approach to Arabic Broken Derived Nouns Morphology","authors":"Naser K. A. Alajmi, S. bin Deris, S. Alnajem","doi":"10.1109/ICACTE.2008.182","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.182","url":null,"abstract":"Arabic morphology is generally considered to be of non-concatenative type which depends on manipulating root letters by means which are called patterns. In addition, the affixation, syllabifications and derivational processes may cause stems to undergo redundant modifications. The basic problem is the large number of redundant variants that must be captured and implemented in a prefect irredundant manner. In this paper, we seek to reduce the redundancy of Arabic broken noun morphology using root-and-pattern morphology theory to represent linguistic resources and Xerox finite state machine as a computational tool to implement them. We show that the space of the meta-data network morphology can be kept small if we consider pattern-sharing technique above pattern-non-sharing. The reduction in the number of states and arcs keeps the system small. By this, it is saving time, memory and processing cost. We primarily focus on broken noun patterns because of their complexity and diversity.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121850188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on Navigation Terminal Oriented POI Compression and Retrieval 面向导航终端的POI压缩与检索研究
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.158
Kang Jianchu, Liu Peng, Zhu Tong-yu
{"title":"Research on Navigation Terminal Oriented POI Compression and Retrieval","authors":"Kang Jianchu, Liu Peng, Zhu Tong-yu","doi":"10.1109/ICACTE.2008.158","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.158","url":null,"abstract":"Based on Berkeley DB, this paper presents a block-oriented compression storage method. Following the characteristics of point of interest (POI), this method clusters, sorts and word-segments the data records, and stores these records based on compressed data block. In addition, this paper implements the fast retrieval of POI records by means of building inverted index. The experimental results demonstrated that the suggested method can solve the problem of how to compress massive POI records on an embedded navigation terminal with limited resources, so as to provide fast retrieval for the users.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121899471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信