2010 5th International Conference on Computer Science & Education最新文献

筛选
英文 中文
A PID neural network control for permanent magnet synchronous motor servo system 永磁同步电机伺服系统的PID神经网络控制
2010 5th International Conference on Computer Science & Education Pub Date : 2010-09-30 DOI: 10.1109/ICCSE.2010.5593702
Lixiong Lin, Xiafu Peng
{"title":"A PID neural network control for permanent magnet synchronous motor servo system","authors":"Lixiong Lin, Xiafu Peng","doi":"10.1109/ICCSE.2010.5593702","DOIUrl":"https://doi.org/10.1109/ICCSE.2010.5593702","url":null,"abstract":"This paper investigates the Application of PID neural network(PIDNN) control law for a permanent magnet synchronous motor(PMSM) servo system. First, the math model of a PMSM is introduced for the PMSM servo system, on which PIDNN controller with on-line learning, tracking and regulating ability is applied. This PIDNN controller is campared with the conventional PID controller, and single neural PID controller. The simulation results show that the control law of PIDNN yields excellent performance for both track following and real-time control in the PMSM servo system.","PeriodicalId":377991,"journal":{"name":"2010 5th International Conference on Computer Science & Education","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123082283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Flow-like textures with line-like structures images inpainting by improved tensor diffusion model 用改进的张量扩散模型绘制具有线状结构的流状纹理图像
2010 5th International Conference on Computer Science & Education Pub Date : 2010-09-30 DOI: 10.1109/ICCSE.2010.5593835
Cui Xuehong
{"title":"Flow-like textures with line-like structures images inpainting by improved tensor diffusion model","authors":"Cui Xuehong","doi":"10.1109/ICCSE.2010.5593835","DOIUrl":"https://doi.org/10.1109/ICCSE.2010.5593835","url":null,"abstract":"For inpainting of the flow-like textures with line-like structures images, we present an model based on tensor diffusion. The proposed model is to reconstruct a damaged original image by acting along the texture's direction and the vertical texture's direction which is determined by the texture's trend of the local image structure (This local image structure is measured by the so-called structure tensor). In order to guarantee better results, the intensity of the diffusion along the texture's direction should be much greater than that of the diffusion along the vertical texture's direction. The nonnegativity discretization method and optimized rotation invariance method is used to calculate the proposed model. It was shown in experiments that this model can get good results for inpainting the flow-like textures with line-like structures images that contain nicks or small broken areas.","PeriodicalId":377991,"journal":{"name":"2010 5th International Conference on Computer Science & Education","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116677882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimal hierarchical partition for k-Anonymity k-匿名的最优分层划分
2010 5th International Conference on Computer Science & Education Pub Date : 2010-09-30 DOI: 10.1109/ICCSE.2010.5593667
Qingming Tang, Yingjie Wu, Xiaodong Wang
{"title":"Optimal hierarchical partition for k-Anonymity","authors":"Qingming Tang, Yingjie Wu, Xiaodong Wang","doi":"10.1109/ICCSE.2010.5593667","DOIUrl":"https://doi.org/10.1109/ICCSE.2010.5593667","url":null,"abstract":"K-Anonymity is a famous and widely used privacy principle for protecting private information. It requires that each tuple of a public released data table must be indistinguishable from at least other k − 1 tuples. Given a table, finding an optimal k-anonymous version is NP-hard in most previous recoding ”model”. Thus, designing an efficient algorithm to find high-quality k-anonymous version is still challenge, though k-anonymity is well-researched. In recent years, hierarchical partition is proposed and widely accepted. Viewing the given table as a multidimensional space, each hierarchical partition of the space is a multidimensional recoding under some special constraints. Previous works need huge computation to find optimal hierarchical partition, and efficient algorithms just find a reasonable hierarchical partition. In this paper, we show that optimal hierarchical partition for k-anonymity can be obtained within polynomial time when a fixed quasi-identifier is given. We then design a bottom-up algorithm using dynamic approach. Through theoretical analysis and experiments, we show that our algorithm finds better results than related works, and our algorithm runs significantly fast comparing with other optimal algorithms for hierarchical partition.","PeriodicalId":377991,"journal":{"name":"2010 5th International Conference on Computer Science & Education","volume":"36 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120885524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of 3-dimensional CAD management system software for EPS EPS三维CAD管理系统软件的开发
2010 5th International Conference on Computer Science & Education Pub Date : 2010-09-30 DOI: 10.1109/ICCSE.2010.5593828
Zhao Yan, Li Yufei
{"title":"Development of 3-dimensional CAD management system software for EPS","authors":"Zhao Yan, Li Yufei","doi":"10.1109/ICCSE.2010.5593828","DOIUrl":"https://doi.org/10.1109/ICCSE.2010.5593828","url":null,"abstract":"Electronic Power Steering (EPS) has become the direction of the development of modern steering system for its excellent functions. The manufacturers and the researchers need pay attention not only to the improvement and innovation of the technology of the products but also to the control and management on course of designing, producing, dynamic capability research etc. So it's necessary to develop one kind of 3-dimensional Computer Aided Design (CAD) management system for electronic power steering. Using the mind of Concurrent Engineering and Modularization facing to the users, different functions of the system are contacted by the database of management information under this platform. Which make the exchange of different information turn to reality, fasting the speed of products developing. Visual FoxPro, which used Object-Oriented technology and the 3D CAD software, and Solid Works were used to design this system. A good interface and database were set up at the same time.","PeriodicalId":377991,"journal":{"name":"2010 5th International Conference on Computer Science & Education","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121117769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fingerprint ID cards and the recognition system 指纹身份证及识别系统
2010 5th International Conference on Computer Science & Education Pub Date : 2010-09-30 DOI: 10.1109/ICCSE.2010.5593447
Wenzhou Liu, Changqing Cai, Zhuo Zhang
{"title":"Fingerprint ID cards and the recognition system","authors":"Wenzhou Liu, Changqing Cai, Zhuo Zhang","doi":"10.1109/ICCSE.2010.5593447","DOIUrl":"https://doi.org/10.1109/ICCSE.2010.5593447","url":null,"abstract":"Applying IC-card technology, fingerprint recognition technology and the single chip microcomputer control technology, we verify the fingerprint recognition and design a kind of ID card based on IC card and its recognition system. This system includes: M04 fingerprint module, IC-card reader, microcomputer system, warning circuit, voltage stabilizing circuit and some other components. The fingerprint is stored into IC cart of the ID card via microcomputer system, and matched with the information of the holder when necessary. The identification result can be shown on the PC screen to protect the basic information of the holder. This system has the feature of reliable performance, easy to use, higher security, and greater practicability and so on.","PeriodicalId":377991,"journal":{"name":"2010 5th International Conference on Computer Science & Education","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127160453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Mining positive and negative association rules 挖掘正面和负面关联规则
2010 5th International Conference on Computer Science & Education Pub Date : 2010-09-30 DOI: 10.1109/ICCSE.2010.5593755
B. Ramasubbareddy, Dr. A Govardhan, Dr. A. Ramamohanreddy
{"title":"Mining positive and negative association rules","authors":"B. Ramasubbareddy, Dr. A Govardhan, Dr. A. Ramamohanreddy","doi":"10.1109/ICCSE.2010.5593755","DOIUrl":"https://doi.org/10.1109/ICCSE.2010.5593755","url":null,"abstract":"Association rule mining is one of the most popular data mining techniques to find associations among items in a set by mining necessary patterns in a large database. Typical association rules consider only items enumerated in transactions. Such rules are referred to as positive association rules. Negative association rules also consider the same items, but in addition consider negated items (i.e. absent from transactions). Negative association rules are useful in market-basket analysis to identify products that conflict with each other or products that complement each other. They are also very useful for constructing associative classifiers. In this paper, we propose an algorithm that mines positive and negative association rules without adding any additional measure and extra database scans.","PeriodicalId":377991,"journal":{"name":"2010 5th International Conference on Computer Science & Education","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125833835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Weighted Random sampling based hierarchical amnesic synopses for data streams 基于加权随机抽样的数据流分层遗忘概要
2010 5th International Conference on Computer Science & Education Pub Date : 2010-09-30 DOI: 10.1109/ICCSE.2010.5593801
Chen Hua-hui, Liao Kang-Li
{"title":"Weighted Random sampling based hierarchical amnesic synopses for data streams","authors":"Chen Hua-hui, Liao Kang-Li","doi":"10.1109/ICCSE.2010.5593801","DOIUrl":"https://doi.org/10.1109/ICCSE.2010.5593801","url":null,"abstract":"Maintaining a synopsis structure dynamically from data stream is vital for a variety of streaming data applications, such as approximate query or data mining. In many cases, the significance of data item in streams decays with age: this item perhaps conveys critical information first, but, as time goes by, it gets less and less important until it eventually becomes useless. This characteristic is termed amnesic. Random Sampling is often used in construction of synopsis for streaming data. This paper proposed a Weighted Random Sampling based Hierarchical Amnesic Synopses which includes the amnesic characteristic of data stream in the generation of synopsis. The construction methods for weighted random sampling with and without replacement are discussed. We experimentally evaluate the proposed synopsis structure.","PeriodicalId":377991,"journal":{"name":"2010 5th International Conference on Computer Science & Education","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123505715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on a method of P2P traffic identification based on multi-dimension characteristics 基于多维特征的P2P流量识别方法研究
2010 5th International Conference on Computer Science & Education Pub Date : 2010-09-30 DOI: 10.1109/ICCSE.2010.5593400
Wang Chunzhi, Jiang Wei, Chen Hong, Wei Luo, H. Fang
{"title":"Research on a method of P2P traffic identification based on multi-dimension characteristics","authors":"Wang Chunzhi, Jiang Wei, Chen Hong, Wei Luo, H. Fang","doi":"10.1109/ICCSE.2010.5593400","DOIUrl":"https://doi.org/10.1109/ICCSE.2010.5593400","url":null,"abstract":"With the increasingly development of P2P in recent years, the operational mechanism of P2P application has varied, it's very difficult to distinguish P2P traffic from normal traffic by using single traffic characteristics. The paper put forward a method of P2P traffic identification based on multi-dimension characteristics. Extracting multi-dimension characteristics of P2P application such as ratio of UDP/TCP protocol packet, packet changing ratio, average data transmitting size and ratio of up/down traffic, to indentify P2P traffic under off line status by using decision tree. Test result indicated that P2P traffic in network could be effectively identified by using this method, with an accuracy over 97 percent.","PeriodicalId":377991,"journal":{"name":"2010 5th International Conference on Computer Science & Education","volume":"2 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123758617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The research on index system optimization of graduation design based on Cronbach coefficient 基于Cronbach系数的毕业设计指标体系优化研究
2010 5th International Conference on Computer Science & Education Pub Date : 2010-09-30 DOI: 10.1109/ICCSE.2010.5593808
Hong Yan, L. Yibing
{"title":"The research on index system optimization of graduation design based on Cronbach coefficient","authors":"Hong Yan, L. Yibing","doi":"10.1109/ICCSE.2010.5593808","DOIUrl":"https://doi.org/10.1109/ICCSE.2010.5593808","url":null,"abstract":"In order to evaluate the graduation designs more objective and fair, take the scores of students majored in the same field as samples, the index system is analyzed by the method of Cronbach reliability coefficient. According to the results, countermeasures are brought forward to optimize the system and increase the reliability and validity.","PeriodicalId":377991,"journal":{"name":"2010 5th International Conference on Computer Science & Education","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125340491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Research on application of Netlink socket communication in linux IPSec support mechanism Netlink套接字通信在linux IPSec支持机制中的应用研究
2010 5th International Conference on Computer Science & Education Pub Date : 2010-09-30 DOI: 10.1109/ICCSE.2010.5593459
Zhou-jun Li, Tan Fang-yong, Gao Xiao-hui
{"title":"Research on application of Netlink socket communication in linux IPSec support mechanism","authors":"Zhou-jun Li, Tan Fang-yong, Gao Xiao-hui","doi":"10.1109/ICCSE.2010.5593459","DOIUrl":"https://doi.org/10.1109/ICCSE.2010.5593459","url":null,"abstract":"As a comparatively new IPC, Netlink socket has its own predominance in the communication between user process and kernel space. This paper has analyzed the application of Netlink socket in the IPSec support mechanism, summarized the Netlink socket message supported by kernel IPSec module, implemented the IPSec configuration with Netlink sockets.","PeriodicalId":377991,"journal":{"name":"2010 5th International Conference on Computer Science & Education","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125380917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书