2008 International Conference on Advanced Computer Theory and Engineering最新文献

筛选
英文 中文
Design of Electro-Hydraulic Servo Force Feedback System Based on the GPC with Simplified Model 基于GPC简化模型的电液伺服力反馈系统设计
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.108
Yadong Meng, Chang-chun Li, Hao Yan, Xiao-dong Liu
{"title":"Design of Electro-Hydraulic Servo Force Feedback System Based on the GPC with Simplified Model","authors":"Yadong Meng, Chang-chun Li, Hao Yan, Xiao-dong Liu","doi":"10.1109/ICACTE.2008.108","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.108","url":null,"abstract":"An electro-hydraulic servo force feedback system is disturbed by a band-limited white noise, it adopted the conventional PID control algorithm. Simulated its dynamic characteristics. Constructed the system simplified model, Designed the GPC Controller and summarized its design procedure. The simulation based on the GPC with simplified model has been done. Compared the two simulation results, The GPC controller is more suitable when the system is disturbed by serious noise interference, It had been validated in project. This research have proved that design the electro-hydraulic system and choose the control algorithm can be proceed simultaneously, The efficiency and accuracy of the electro-hydraulic servo system design can be improved.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129223028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Benefiting from Data Mining Techniques in a Hybrid Peer-to-Peer Network 受益于混合点对点网络中的数据挖掘技术
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.173
M. Ebrahimi, M. Bazyar, M. Tahmasbi, R. Boostani
{"title":"Benefiting from Data Mining Techniques in a Hybrid Peer-to-Peer Network","authors":"M. Ebrahimi, M. Bazyar, M. Tahmasbi, R. Boostani","doi":"10.1109/ICACTE.2008.173","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.173","url":null,"abstract":"The fast growing role of peer-to-peer networks in various distributed services and technologies as a well distributed, highly scalable and fault tolerant networking infrastructure together with large number of users inherent to these special networks has introduced P2P systems as a potential domain for data mining processes. Nevertheless, the distributed nature of P2P networks is in explicit contradiction with centralized characteristics of classical data analysis algorithms. Although there has recently been studies on Distributed Data Mining (DDM) as a possible solution, proposed DDM algorithms cover a small portion of the problem space and lack a theoretical proof of convergence. By considering the available potentials in well-known hybrid P2P architectures, we proposed a layered data-gathering and computing infrastructure on top of the hierarchical hybrid P2P networks. These layers provide optional computing and administrational capabilities for the entire network, without interrupting the underlying networkpsilas functionalities.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"27 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128658622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on Virtual History Reappearance System Oriented Education 面向教育的虚拟历史再现系统研究
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.46
Haiyan Wu, Xun Wang
{"title":"Research on Virtual History Reappearance System Oriented Education","authors":"Haiyan Wu, Xun Wang","doi":"10.1109/ICACTE.2008.46","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.46","url":null,"abstract":"A virtual history reappearance system oriented education is constructed in this paper. First we discussed the integration model of virtual reality technology and history education.Then we researched the visibility clipping and management techniques in dynamic large-scale virtual scene, texture mapping method on complex objects and extended script techniques. Finally, the architecture of virtual history reappearance system oriented education was constructed. On this basis, we presented a virtual history reappearance prototype system. the boring knowledge of history to be shown by fascinating interactive scenes in the system, it provides an aided way for history education, people can experience history by historical role-play and gain experience and lessons form historical events.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117050715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of E-Government Security System Based on Information Security Model 基于信息安全模型的电子政务安全系统设计
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.192
X.F. Zhang
{"title":"Design of E-Government Security System Based on Information Security Model","authors":"X.F. Zhang","doi":"10.1109/ICACTE.2008.192","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.192","url":null,"abstract":"Government departments play an important role in the country's economic development and building, along with the continuous deepening of network application, some important contents such as the government services have gradually started on the Internet. Based on information security model, we designed and implemented a security system of e-government information. And introduced the various components of the system and detailed described the overall design and concrete realization of these components.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117337587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Data Communication Analysis and Algorithm for the Efficiency of Data Distribution in High Performance Computing 高性能计算中数据分发效率的数据通信分析与算法
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.157
Jinchuan Ke, M. Jiang
{"title":"Data Communication Analysis and Algorithm for the Efficiency of Data Distribution in High Performance Computing","authors":"Jinchuan Ke, M. Jiang","doi":"10.1109/ICACTE.2008.157","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.157","url":null,"abstract":"To alleviate the data transfer communication cost among the processor elements, many of the hardware interconnects enable data transfer to be performed at the same time as computation. The assignment of tasks to processors problem is well known to be NP-complete except in a few special cases. To improve the overall performance of high performance computing (HPC), this paper develops a scheme of HPC code generator and presents a data partitioning algorithm for the efficiency of data distribution. The algorithm generates a efficient data partitions, from which the optimized assignments can be selected for reducing the processor element communications, and the complexity is greatly reduced from exponential to polynomial. The algorithm is tested and integrated in HPC tools running on CRAY-T3E, YMP, IBM Regatta, and SGI workstation.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"19 S6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114100446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UCaG: An Automatic C Code Generator for AADL Based upon DeltaOS 基于DeltaOS的AADL自动C代码生成器
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.68
Shenglin Gui, Liang Ma, Lei Luo, Limeng Yin, Yun Li
{"title":"UCaG: An Automatic C Code Generator for AADL Based upon DeltaOS","authors":"Shenglin Gui, Liang Ma, Lei Luo, Limeng Yin, Yun Li","doi":"10.1109/ICACTE.2008.68","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.68","url":null,"abstract":"Architecture analysis and design language (AADL), which is a modeling language standard brought forward by the Society of Automotive Engineers and Avionics Systems Division, is becoming a hot research topic for many organizations and institutes in the world. Though there are some tools could generate C code or Java code from a subset of AADL models as application program directly, it could not be applied in complex application without real-time embedded operating system. Based upon the hard-time operating system Delta OS, which is designed and developed by Coretek Systems Inc., this paper presents the mapping rules between the AADL elements and the elements in C language, designs an automatic C code generator and integrates it into OSATE which is an open-source tool developed by SEI, Carnegie Mellon University, and then, we use a case developed by Lambda tool that is the development and simulation environment for Delta OS to show the correctness of UCaG. Finally, we give the related work and future research directions.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126946146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Reconfigurable Instruction Set Processor Design Using Software Based Configuration 基于软件配置的可重构指令集处理器设计
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.74
M. Iqbal, U. S. Awan
{"title":"Reconfigurable Instruction Set Processor Design Using Software Based Configuration","authors":"M. Iqbal, U. S. Awan","doi":"10.1109/ICACTE.2008.74","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.74","url":null,"abstract":"Due to the potential enhancements in the execution of software based applications shown by Reconfigurable Instruction Set Processors (RISPs), reconfigurable computing has become a subject of great deal of research in the field of computer sciences. Its key feature is the ability to perform the computations in hardware to increase the performance on one hand while retaining much of the flexibility of the software on the other hand. The VLSI development is continuously improving and new ways must be obtained to become able to fully take the advantages of the emerging technology. Reconfigurable hardware might be the next step which will give computer performance a big leap forward. The idea is to use the now a daypsilas high performance FPGA technology to adapt the hardware to the problem. This research paper presents an alternative design of a RISP which supports multiple threads running concurrently, all with instant hardware support. Core of Xilinx FPGAs like Virtex series has been used to adapt the possibilities of loading partial hardware configurations while retaining the execution of the remaining active parts of the application.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126788094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Effective Remote Control System Based on TCP/IP 基于TCP/IP的有效远程控制系统
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.202
Xueyu Geng, Shunyao Wu, Jinlong Wang, Peng Li
{"title":"An Effective Remote Control System Based on TCP/IP","authors":"Xueyu Geng, Shunyao Wu, Jinlong Wang, Peng Li","doi":"10.1109/ICACTE.2008.202","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.202","url":null,"abstract":"With the network technology development, remote technology is gradually occupying the technology mainstream. It has become more and more popular in the home office and distance education. The rapid development provides a broad world to the remote control software. Pcanywhere, damewhere, QQ remote assistance, and other remote-control software have emerged. In remote control, improving efficiency and ensuring accuracy of the transmission are paramount to evaluate the success of a remote control software. This paper has developed a remote control system, and focuses on intercepting the control and the images, and TCP-stick packages. Solving these problems well is useful to improve the efficiency of the system and ease the pressure on network. Finally, through analysis and experiments, methods are proved to be effective.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"434 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124246577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on Multi-function Fault Management System Model Based on SNMP 基于SNMP的多功能故障管理系统模型研究
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.193
Y. Sun
{"title":"Research on Multi-function Fault Management System Model Based on SNMP","authors":"Y. Sun","doi":"10.1109/ICACTE.2008.193","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.193","url":null,"abstract":"The improving network technology and application make it a challenge to the network manager. A feasible and efficient network management strategy will become an important method to insure the network running well. Therefore, itpsilas meaningful to be familiar with the network and network management technology. In accordance with practical network environment, we design and implement fault management system FMS based on SNMP. Using Client/Server architecture, our system established a distributed management model which is compose of Console/Manager/Agent, finished network status monitoring, event processing, fault alarm and log etc.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122720190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ultra Sonic Sensor Based Blind Spot Accident Prevention System 基于超声波传感器的盲点事故预防系统
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.165
R. Mahapatra, K. Kumar, G. Khurana, R. Mahajan
{"title":"Ultra Sonic Sensor Based Blind Spot Accident Prevention System","authors":"R. Mahapatra, K. Kumar, G. Khurana, R. Mahajan","doi":"10.1109/ICACTE.2008.165","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.165","url":null,"abstract":"A blind spot detection device for protection against misshapenness such as automobiles collisions, obstacles, and accident that leads to great loss of human lives and can have disastrous results.Technology used for this purpose worked by detecting the other automobiles, obstacles and bystanders. Upon detecting, the device triggers a timer that delays the activation of alarm circuitry for a brief period of time.This time delay is instituted to minimize the triggers of nuisance alarm by a momentary intrusion in the hazard zone. If the obstaclepsilas presence is still detected after the delay time, LED's and audible alarms are triggered to alert the system operator of the dangerous situation. The alarms remain activated for a time period, allowing the operator to clear the hazard zone.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131526212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信