2010 International Conference on Networking and Digital Society最新文献

筛选
英文 中文
Research on finite element modeling technique of precision forming simulation for complex precision forging part 复杂精密锻件精密成形仿真的有限元建模技术研究
2010 International Conference on Networking and Digital Society Pub Date : 2010-05-30 DOI: 10.1109/ICNDS.2010.5479434
Ping Wang, Bin Wang, Liang Li, Aihua Chen
{"title":"Research on finite element modeling technique of precision forming simulation for complex precision forging part","authors":"Ping Wang, Bin Wang, Liang Li, Aihua Chen","doi":"10.1109/ICNDS.2010.5479434","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479434","url":null,"abstract":"This paper discusses the key technique of finite element modeling for complex precision forging part, which includes geometrical modeling, element type selecting, element meshing and remeshing, material model selecting, friction model definition and contact problem, In addition, the particular application of complex precision forging part in precision forming finite element modeling was shown combined with Hooke's Joint. Finally the main problems being studied subsequently of the finite element modeling for complex precision forging part were also presented.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"36 8-12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122124880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the edge-balance index sets of Cn × P2 关于Cn × P2的边平衡索引集
2010 International Conference on Networking and Digital Society Pub Date : 2010-05-30 DOI: 10.1109/ICNDS.2010.5479431
Yuge Zheng, Ying Wang
{"title":"On the edge-balance index sets of Cn × P2","authors":"Yuge Zheng, Ying Wang","doi":"10.1109/ICNDS.2010.5479431","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479431","url":null,"abstract":"In this paper, the edge-friendly and the edges-balance index set are defined, the edges-balance index set of C<inf>n</inf> × P<inf>2</inf> (n ≡ 0,1(mod 4))and a structural method of graphs are researched.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128705318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A new architecture of broadband network system suitable for asymmetric digital subscriber line application 一种适用于非对称数字用户线路应用的新型宽带网络体系结构
2010 International Conference on Networking and Digital Society Pub Date : 2010-05-30 DOI: 10.1109/ICNDS.2010.5479285
Guo-Ming Sung, Yen-Tang Chang, Wen-Huei Chen, Hsiang-Yuan Hsieh
{"title":"A new architecture of broadband network system suitable for asymmetric digital subscriber line application","authors":"Guo-Ming Sung, Yen-Tang Chang, Wen-Huei Chen, Hsiang-Yuan Hsieh","doi":"10.1109/ICNDS.2010.5479285","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479285","url":null,"abstract":"This paper presents the design and implementation on a new architecture of broadband network system which suitable for asymmetric digital subscriber line (ADSL) application. The main design skill is based on the cell-based digital IC design process, and is implemented in 0.18 µm 1P6M CMOS process. The main function of this chip is to build a bridge between Ethernet and ATM which is used to substitute for RISC processor, leading to enhance the broadband network switching ability and stability. Furthermore, the clock management system is adopted to manage the packages. By this technique, a small size and low cost chip will be obtained.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126754435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research and practice on the cooperative concealing technology of Trojan horses 木马协同隐藏技术的研究与实践
2010 International Conference on Networking and Digital Society Pub Date : 2010-05-30 DOI: 10.1109/ICNDS.2010.5479153
Yongchang Ren, Tao Xing, Guanghui Cao, E. Xu, Xiaoji Chen
{"title":"Research and practice on the cooperative concealing technology of Trojan horses","authors":"Yongchang Ren, Tao Xing, Guanghui Cao, E. Xu, Xiaoji Chen","doi":"10.1109/ICNDS.2010.5479153","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479153","url":null,"abstract":"Trojan is a Trojan horse hiding technology, one of the key technologies, directly determine the viability of Trojan horses. This paper describes the current commonly used Trojan horse hiding technology, the traditional implementation method Trojan hidden lack of independence, according to concerted hidden thought, given the four threading model under Windows systems and their specific implementation method to explain the problems encountered in the implementation process and solution approach. In response to the four further threading model is just to restore the initial state of the shortcomings of the passive given extension model. Experiments show that the four threads together more independent thought hidden Trojan horse has a better prospect.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123155127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design concept on information sharing platform of technological innovation 技术创新信息共享平台的设计理念
2010 International Conference on Networking and Digital Society Pub Date : 2010-05-30 DOI: 10.1109/ICNDS.2010.5479438
Benzhao Yang
{"title":"Design concept on information sharing platform of technological innovation","authors":"Benzhao Yang","doi":"10.1109/ICNDS.2010.5479438","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479438","url":null,"abstract":"Information sharing is a new service mode originated from academic libraries in the United States in the 1990s. Having analyzed the causes of low level of technological innovation in universities from information sharing perspective, the paper suggests constructing a information sharing platform of technological innovation achievements on the basis of service science and knowledge sharing. Moreover, the author approaches a subject on building a new information sharing mode, which is market-oriented, research-based, product-linked and innovation-aimed. This mode is also expected to provide special knowledge products and services.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"568 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120876728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The selection of project management software by FAHP and FMCDM in automobile R&D process FAHP和FMCDM在汽车研发过程中项目管理软件的选择
2010 International Conference on Networking and Digital Society Pub Date : 2010-05-30 DOI: 10.1109/ICNDS.2010.5479297
Lei Fu, Li Shi, Ying Yang, Bengong Yu
{"title":"The selection of project management software by FAHP and FMCDM in automobile R&D process","authors":"Lei Fu, Li Shi, Ying Yang, Bengong Yu","doi":"10.1109/ICNDS.2010.5479297","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479297","url":null,"abstract":"The selection of project management (PM) software is a complex issue and has significant impacts to the efficiency of the automobile research & development (R&D) process. Given two alternatives based on critical path method (CPM) and critical chain project management (CCPM) respectively, decision-makers usually cause confusion. This paper analyzed the characteristic of automobile R&D project and developed an evaluation model based on the fuzzy analytic hierarchy process (FAHP) and fuzzy multiple criteria decision making (FMCDM) methods, which can help the managers in automobile industry to select more appropriate software in the course of product R&D. In particular, the FAHP method is used to obtain the weights of evaluation criteria, and the FMCDM method is used to determine the final rank of the software. The uncertainty and vagueness in evaluation procedure were presented as the fuzzy triangular numbers. The proposed method is applied to the case study of evaluating the performance of PM software based on CPM and CCPM respectively for a car manufacturer. The result of evaluation not only assisted managers in choosing suitable software but also outline the trend in development of CCPM software.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116279372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Social context for Computer-supported Collaborative Learning 计算机支持的协作学习的社会背景
2010 International Conference on Networking and Digital Society Pub Date : 2010-05-30 DOI: 10.1109/ICNDS.2010.5479204
Zheng Yanlin, Ling Luyi, Zheng Fanglin
{"title":"Social context for Computer-supported Collaborative Learning","authors":"Zheng Yanlin, Ling Luyi, Zheng Fanglin","doi":"10.1109/ICNDS.2010.5479204","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479204","url":null,"abstract":"A technology-mediated learning space is not a technology-shielded island. Technologies may promise to facilitate human learning, but should never detach learning from social context. Computer-mediated communication (CMC) has created new opportunities for synchronous and asynchronous collaborative learning among geographically dispersed individuals. This study especially explores four social considerations in Computer-supported collaborative learning (CSCL), including roles, trust, nimbus, and interpersonal familiarity.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121556585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Teaching methods for a school-based curriculum 校本课程的教学方法
2010 International Conference on Networking and Digital Society Pub Date : 2010-05-30 DOI: 10.1109/ICNDS.2010.5479445
Wen Shiyan
{"title":"Teaching methods for a school-based curriculum","authors":"Wen Shiyan","doi":"10.1109/ICNDS.2010.5479445","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479445","url":null,"abstract":"Teaching method is the means and ways to implement the task of teaching. The purpose of this study is to select the appropriate teaching methods for a newly developed school-based curriculum Introduction to Zhejiang Business Culture. A validated and reliable self-administered questionnaire developed by the investigators was used in the study. 70 students from Zhejiang Economic & Trade Polytechnic were chosen as samples randomly. It was emphasized that participation was voluntary, and respondent confidentiality was assured. Results shows majority of students believe that visits to businesses, real circumstance training, and group discussion may work well. Questionnaire results also indicated that the examination form should be flexible. In stead of the solely writing examination, the performance of students in the discussions and training should be given full consideration and appropriate rating. Flexible teaching methods can stimulate student's passion for learning, develop their independent problem-solving skills, and markedly increase the student's satisfaction to the curriculum.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"315 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127702145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design of high speed burst-mode BERT based on FPGA 基于FPGA的高速突发模式BERT设计
2010 International Conference on Networking and Digital Society Pub Date : 2010-05-30 DOI: 10.1109/ICNDS.2010.5479306
Leijun Sun, Wei Chen, Qiuyuan Huang, Chao-Ying Ma
{"title":"Design of high speed burst-mode BERT based on FPGA","authors":"Leijun Sun, Wei Chen, Qiuyuan Huang, Chao-Ying Ma","doi":"10.1109/ICNDS.2010.5479306","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479306","url":null,"abstract":"Being different from general continual-data stream BER tester, the receiver of burst-mode BER tester is required to extract clock and recover data accurately from the incoming datasteam characterized by phase variation within a dozen bits time before error bits detection is conducted, moreover, while error bits detecting, the receiver should filter the preamble and delimiter and execute error bits statistic only for Payload. In this paper a design method for Burst-mode BER Tester Based on FPGA is put forward. First of all, the whole structure of this design is introduced, and then the logic function modules implemented in the FPGA and system control program are presented in detail separately. The experimental results of applying this test equipment to 1.25G burst-mode optical receiver in GPON system illustrate that it has good performance and practical value.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125591741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Study on congestion control in internet 网络拥塞控制研究
2010 International Conference on Networking and Digital Society Pub Date : 2010-05-30 DOI: 10.1109/ICNDS.2010.5479370
Lu Guang, Luo Guoming, Zeng Fan, Pan Jia
{"title":"Study on congestion control in internet","authors":"Lu Guang, Luo Guoming, Zeng Fan, Pan Jia","doi":"10.1109/ICNDS.2010.5479370","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479370","url":null,"abstract":"After evolution for decades, Large bandwidth-delay product became to an obvious character of internet. the content it transfers has changed profoundly too. This changes brought the developments of congestion control technology. In this article, the study on congestion control in internet were divided into congestion control based on measurement, improvement on AIMD mathematic models and congestion control based on control theory. The actuality and development of current congestion control studies were summarized in the three sorts. Finally the emphases and directions for further study were proposed.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115904867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信