1,021 results on '"COMPUTER science education"'
Search Results
2. Populating the global software talent pool: An effective approach to computer science education in China.
- Author
-
Kun Shao and Maher, P.
- Published
- 2009
- Full Text
- View/download PDF
3. Toward Simple Learning Design 2.0
- Author
-
Stephen Downes and Guillaume Durand
- Subjects
Knowledge management ,Instructional design ,business.industry ,Computer science ,Modeling language ,Interoperability ,Educational technology ,Context (language use) ,Unified Modeling Language ,Virtual learning environment ,Learning Management ,business ,Software engineering ,computer ,computer.programming_language - Abstract
In 2003, based on the work done by the OUNL on Educational Modeling Language, IMS-LD was released and brought to the research community a new era in the design of learning activities. Six years later, IMS-LD is no longer evolving while facing an increasing number of critiques. The specification is still not implemented by any leading brands in the e-learning industry. The current development of new IMS specifications offers a window of opportunity to rethink IMS-LD. After discussing IMS-LD, trying to understand the existing critiques and analyzing the new technical context, this paper proposes the guidelines for the creation of this new learning design specification. This specification would be split in two specifications satisfying both the instructional designers and the learning platform developers and vendors. The specification optimized to learning platform vendors, called Simple Learning Design 2.0 will be designed to ease the deployment of the learning design concepts in the existing Learning Management Systems. SLD 2.0 is currently developed in the context of the SynergiC3 project.
- Published
- 2009
4. The conditional diagnosability of locally twisted cubes
- Author
-
Shuming Zhou
- Subjects
Computer science ,Reliability (computer networking) ,Component (UML) ,Process (computing) ,System testing ,Algorithm design ,Hypercube ,Parallel computing ,Fault (power engineering) - Abstract
The growing size of the multiprocessor systems increases their vulnerability to component failures. It is crucial to locate and to replace the faulty processors to maintain system's high reliability. The fault diagnosis is the process of identifying faulty processors in a system through testing. The conditional diagnosis requires that for each processor v in a system, all the processors that are directly connected to v do not fail at the same time. In this paper, the conditional diagnosability of the locally twisted cubes LTQ n under the comparison diagnosis model is 3n-5 when n≫6. Hence the conditional diagnosability of LTQ n is three times larger than its classical diagnosability.
- Published
- 2009
5. Adaptive inverse control based on recusive least-squares algorithm
- Author
-
Xi Bin and Ao Lu
- Subjects
Recursive least squares filter ,Adaptive control ,Adaptive algorithm ,Automatic control ,Computer science ,Least squares ,Least mean squares filter ,Rate of convergence ,Computer Science::Sound ,Control theory ,Control system ,Adaptive system ,Inverse control ,Algorithm design ,Minimum phase - Abstract
In recent years, adaptive inverse control is a very vivid field because of its advantages. It is quite different from the traditional control. Adaptive inverse control adopts feedback in parameters tuning of the system, not the signal flow. In this paper, we apply the recursive least-squares (RLS) algorithm to the adaptive inverse control to achieve the learning of the inverse model quickly. Besides, we compare it with the least mean-square (LMS) algorithm. The results show that when SNR is high, the convergence rate of RLS algorithm is faster than the LMS algorithm.
- Published
- 2009
6. An improved 32-bit carry-lookahead adder with Conditional Carry-Selection
- Author
-
Guo-bo Xie, Ping-hua Chen, Juan Zhao, and Yi-jun Li
- Subjects
Adder ,Propagation time ,Computer science ,Carry (arithmetic) ,Serial binary adder ,Parallel computing ,Carry-save adder ,Hardware_ARITHMETICANDLOGICSTRUCTURES ,Carry-lookahead adder ,32-bit ,Field-programmable gate array ,Electronic circuit - Abstract
An improved 32-bit carry-lookahead adder (CLA) with Conditional Carry-Selection (CSS) is proposed in this paper. The new adder is compared with Serial Adder and pure Carry-Lookahead Adder. The three adders is simulated in FPGA circuits, the results show that the propagation time of the carry of the new 32-bit adder is reduced 26% compared with Serial Adder and 3.17% with pure Carry-Lookahead Adder.
- Published
- 2009
7. A research for the optimization of MIPS instruction set simulation
- Author
-
Ming Liu and Qixian Cai
- Subjects
Instruction set ,Microprocessor ,Reduced instruction set computing ,Computer architecture ,Computer science ,law ,Instruction set simulation ,law.invention - Abstract
The main idea of this article is through using Multi-level index and instruction abstract technology to improve the decode methods of the traditional MIPS instruction set simulation, The experiments show that this method can greatly improve the efficiency of program execution.
- Published
- 2009
8. Improved fingerprint thinning algorithm based on directional images
- Author
-
Yang Fan and Li Nan
- Subjects
Pixel ,Computer science ,business.industry ,Feature extraction ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Pattern recognition ,Fingerprint recognition ,ComputingMethodologies_PATTERNRECOGNITION ,Fingerprint ,Computer vision ,Algorithm design ,Artificial intelligence ,Automated fingerprint identification ,business - Abstract
Thinning algorithm for fingerprint image based on directional images is studied deeply in this paper, and a high-efficiency improved algorithm come up. The method of labeled data is used in this paper. On the premise of ensuring the quality, the improved algorithm not only can accelerate the rate of thinning, but also extract the characteristic of the fingerprint.
- Published
- 2009
9. News story segmentation based on audio-visual features fusion
- Author
-
Wen-Hong Wang, Yu Song, and Feng-Juan Guo
- Subjects
Computer science ,business.industry ,Speech recognition ,Shot (filmmaking) ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Image segmentation ,Silence ,Feature (computer vision) ,Audio visual ,Segmentation ,Computer vision ,Artificial intelligence ,business ,Hidden Markov model - Abstract
This paper presents a method for news video story segmentation, which fuses multi-feature including audio and visual. At first, this paper detects the anchorperson shot for news video and determines the beginning of news story, and then detects topic caption between anchorperson shots. In the next step, silence clips in news video are detected using short-time energy and short-time average zero-crossing rate parameters, and then voice features of anchorperson is analyzed. At last, this method fuses multi-feature such as anchorperson shot, topic caption, silence and voice feature to segment news stories. Experimental results show that the approach is valid and avoid the deficiency of detecting news story by a single feature.
- Published
- 2009
10. Personalized web based English learning system using artificial neural networks
- Author
-
Zheng Liu, Huimin Wu, Shiqiang Wang, and Yuhang He
- Subjects
Vocabulary ,Forgetting curve ,Multimedia ,Artificial neural network ,Computer science ,business.industry ,media_common.quotation_subject ,E-learning (theory) ,Boredom ,Language acquisition ,computer.software_genre ,E learning ,medicine ,Web application ,Web navigation ,medicine.symptom ,Web service ,business ,computer ,Natural language ,media_common - Abstract
Traditional educational systems are usually presented in a course based and static way, without taking into account the learner's interests and learning progress. Language learning by that means could be accompanied by boredom and lack of real experiences, which is a great barrier to improving language skills. This paper presents an English learning system that is based on web browsing. Users browse English websites of their own interests and the system grabs the proper words for the user to learn. A personalized forgetting curve is stored in the system and adapted to the user using a back-propagation artificial neural network. The system selects the learning contents according to the personalized forgetting curve. The learning data is sent to the server through Web Service, to get assistance from a tutor or share the vocabulary list with other users.
- Published
- 2009
11. Application of the swarm intelligence in the organization of agricultural products logistics
- Author
-
Yao Xin-sheng, Xu Guangyin, Wei Jianguang, Cui Yan, and Fan Shasha
- Subjects
ComputingMilieux_GENERAL ,Computer science ,Agriculture ,business.industry ,Ant colony optimization algorithms ,Supply chain ,Production (economics) ,Particle swarm optimization ,Algorithm design ,Ant colony ,business ,Swarm intelligence ,Industrial organization - Abstract
There are numerous enterprises for agricultural products logistics in China. However, the survey found the efficiency, effectiveness and capability of most these enterprises are not performing well, less competitive power in this modern market economy. This result is caused by the very low level of industry organization in agricultural products. Then, the evolution of agricultural products logistics organization is analyzed. With ant colony algorithm of swarm intelligence, it is proposed that to build virtual enterprise in the horizontal for the agricultural products logistics operation, and to design dynamic alliance in the longitudinal for the agricultural products supply chain. At last, the algorithm and the simulation are discussed.
- Published
- 2009
12. A model on adaptive example recommendation for programming learning
- Author
-
Jinghua Zhang
- Subjects
Computer science ,business.industry ,Process (engineering) ,Active learning (machine learning) ,Machine learning ,computer.software_genre ,Robot learning ,Personalization ,Adaptive system ,Adaptive learning ,State (computer science) ,Artificial intelligence ,Student learning ,Automatic programming ,business ,Software engineering ,computer - Abstract
This paper discusses a practice system to aid programming learning by program examples. The idea is to offer a large quantity of well designed examples, and through suitable examples to enlighten the student thinking. So a learning guidance by adaptive example recommendation is needed to achieve personalization for every student during his learning process. At first, as a basis, an example design plan based on summarized learning objectives is introduced, and then an objective based adaptive model is given, which can recommends suitable examples to a student by an adaptive pedagogical strategy combined with the example model, the learning objective and the student learning state.
- Published
- 2009
13. An approach to analyze grid service reliability subject to failures
- Author
-
Jun Gu and Jin Zhang
- Subjects
Service (systems architecture) ,Grid computing ,Computer science ,Server ,Distributed computing ,Software fault tolerance ,computer.software_genre ,Grid ,computer ,Software quality ,Reliability (statistics) - Abstract
With the rapid advances in grid technology, grid reliability becomes an issue of increasing practical concern and research attention. However, managing grid reliability is not easy due to the complicated, large-scale and dynamic natures. This paper studies the reliability problem of grid service imposed by software or hardware failures, and presents a new approach to analyze grid service reliability subject to failures. The grid service process is described and the service execution is defined as a directed acyclic graph. Then the failure types and contributing factors happened to grid service process are expatiated. Moreover, the reliability evaluation equations about request process, matchmaking process, and service execution are respectively suggested. Lastly, a numerical example is given to illustrate these equations. The results show that our approach is feasible.
- Published
- 2009
14. Strategic intelligence model based on SOA and BPC
- Author
-
Wu Qingqiang and Wu Maowen
- Subjects
Strategic planning ,Hierarchy ,Virtue ,Knowledge management ,Process management ,Computer science ,computer.internet_protocol ,business.industry ,Business process ,media_common.quotation_subject ,Interoperability ,Military intelligence ,Service-oriented architecture ,computer.software_genre ,Strategic intelligence ,Choreography ,Web service ,Software architecture ,business ,Business communication ,computer ,media_common - Abstract
To tackle the current problem of the research on the strategy intelligence, this paper proposes a hierarchy structure model of strategic intelligence based on the service oriented architecture and business process choreography. The proposed strategic intelligence mode is agility to adapt to new demands with the virtue of seamless integration for new modules and the high interoperability among modules. The processes of registration, discovery, binding, usage and integration of the strategic intelligence services are illustrated by an example. Finally, some future research issues are also presented.
- Published
- 2009
15. Making XML schema to support multilingual markup
- Author
-
Ying-ai Tian, Qi Liang, and Ning Li
- Subjects
Document Structure Description ,XML Encryption ,Markup language ,RuleML ,Computer science ,computer.internet_protocol ,Schematron ,Efficient XML Interchange ,Document type definition ,computer.software_genre ,XML Schema Editor ,Schema (psychology) ,Streaming XML ,RELAX NG ,XML schema ,SGML ,computer.programming_language ,XHTML ,Information retrieval ,Programming language ,XML validation ,computer.file_format ,Geography Markup Language ,XML framework ,XML Schema (W3C) ,Data exchange ,Document Definition Markup Language ,ComputingMethodologies_DOCUMENTANDTEXTPROCESSING ,computer ,XML - Abstract
Understanding and exchanging XML documents with multilingual markups is a common requirement. This paper proposes a schema design method to support multilingual markup of XML based on two attributes introduced for every element to be transformed, i.e., locID and attrList. It ensures that all XML instances derived from the translated schema no matter what language used and how the name is translated can be well understood by the program developed for the original language after transformation. The transformation process is rather automatic, low cost and straightforward; also semantics of elements and attributes are precisely reserved. An example of email is illustrated to show the effect of the method.
- Published
- 2009
16. Notice of Violation of IEEE Publication Principles: Development of steering simulator system for evaluation of Electric Power Steering
- Author
-
Zhao Yan, Wang Hong, and Wang Yili
- Subjects
Energy conservation ,Notice ,Computer science ,law ,Control (management) ,Tie rod ,engineering ,Torque ,engineering.material ,Servomotor ,Power steering ,Simulation ,law.invention - Abstract
Electric Power Steering (EPS) is one new type power steering system which is developing rapidly resent years due to their superior energy efficiency and energy conservation. Installation of EPS expanded rapidly by world automakers. Steering reaction torque is one important type of information for drivers since it has significant influence on vehicle maneuverability. Even with today's advanced simulation technology, however, it is very difficult to accurately simulate steering feeling. The purpose of this study is to develop a steering simulator that can quantitatively evaluate EPS systems. This simulator can control the force on the tie rod by means of an AC servomotor. And at the end of this paper, validity of this simulator has been ascertained by comparing the simulation results with those obtained during actual vehicle testing.
- Published
- 2009
17. Design of processing and display system for intelligent structure characteristic data based on LabVIEW
- Author
-
Lang Liying and Shen Lan
- Subjects
Measure (data warehouse) ,Software ,business.industry ,Computer science ,Embedded system ,SIGNAL (programming language) ,Synchronization (computer science) ,Real-time computing ,Scalability ,State (computer science) ,business - Abstract
Non-electrical signal such as temperature and strain is an important basis for evaluation of the health state of building structure. How to measure and collect non-electricity information in building structure and how to deal with this information is introduced in this paper. Intelligent structure characteristic data analysis and display system is developed by LabVIEW including filtering, spectral analysis, the current data and historical data display. LabVIEW has characteristic of multi-task real-time synchronization operation, guarantee requirements such as real-time, reliability and scalability of the intelligent structural characteristics data processing and display system.
- Published
- 2009
18. A new trusted software modeling method
- Author
-
Li Yi, Yang Jie, and Yu Min-cong
- Subjects
Computer science ,Modeling language ,business.industry ,Programming language ,Process calculus ,Interoperability ,Access control ,computer.software_genre ,Software ,Unified Modeling Language ,business ,Software architecture ,Formal verification ,computer ,computer.programming_language - Abstract
The paper introduces the process algebra based modeling language and its powerful standard model-checking tools for trusted software architectures, which deals with incompatibility between two components due to a single interaction or the combination of several interactions and with the lack of interoperability among a set of components through architectural compatibility check and interoperability check relying on standard observational equivalences.
- Published
- 2009
19. Design and implementation of image compression core based on CCSDS algorithm
- Author
-
Xiaodong Gu, Huaichao Wang, Shijun Xu, and Xuequan Zhang
- Subjects
Parallel processing (DSP implementation) ,Computer science ,Pipeline (computing) ,Real-time computing ,Algorithm ,Data compression ,Image compression - Abstract
Image compression is one of the major services in space flight mission and remote sensing system. This paper presents a high speed and high performance image compressor for future spacecrafts and micro-satellites. The proposed compression core is based on a modified CCSDS algorithm and the processing speed is improved 40 times using parallel architecture and pipeline technique. The experimental results indicate that this core has high performance at coding efficiency, data rate and error containment. A data rate of about 12.5Mpixels/s can be sustained at 50MHz.
- Published
- 2009
20. ESP verification for custom SRAM array design
- Author
-
Manqiong Tan, Hongyan Du, Hongliang Xu, and Xinhua Tian
- Subjects
Digital electronics ,High-level verification ,Hardware_MEMORYSTRUCTURES ,Physical verification ,Functional verification ,business.industry ,Computer science ,Symbolic simulation ,Integrated circuit design ,Intelligent verification ,Computer architecture ,Embedded system ,Verification ,business ,Software verification - Abstract
ESP-CV is a symbolic simulation-based formality verification tool intended to perform custom equivalence(EQ) checking and provide functional verification coverage for full-custom IC design. This paper introduced the basic principle and work flow of ESP verification firstly, and then the ESP verification method and flow of our custom SRAM array design was demonstrated.
- Published
- 2009
21. Efficient algorithms to embed Hamiltonian Paths and Cycles in faulty crossed cubes
- Author
-
Jianxi Fan, Wujun Zhou, Guangquan Zhang, and Yue-Juan Han
- Subjects
Discrete mathematics ,symbols.namesake ,Efficient algorithm ,symbols ,Embedding ,Graph theory ,Hypercube ,Cube ,Hamiltonian (quantum mechanics) ,Hamiltonian path ,Critical property ,Mathematics - Abstract
The crossed cube is an important variation of the hypercube. It possesses many desirable properties for interconnection networks. Hamiltonicity is a critical property in interconnection networks. In this paper, we study fault-tolerant embedding algorithms of Hamiltonian paths and cycles in crossed cubes. We provide two algorithms HamiltonianPath and HamiltonianCycle. For any integer n ≥ 3, letting CQ n (V,E) denote the n-dimensional crossed cubes and F ⊂ V (CQ n )∪E(CQ n ) denote a faulty set in CQ n , (1) if |F| ≤ n − 3, HamiltonianPath can construct a Hamiltonian path between any two distinct nodes in CQ n − F in O(NlogN) time; and (2) if |F| ≤ n − 2, Hamiltoniancycle can construct a Hamiltonian cycle in CQ n −F in O(NlogN) time, where N is the node number of CQ n − F.
- Published
- 2009
22. Design and application of structure mechanics CAI courseware
- Author
-
Keqin Yan and Tao Cheng
- Subjects
Structure (mathematical logic) ,Multimedia ,Computer science ,business.industry ,media_common.quotation_subject ,Computer-Assisted Instruction ,Mechanics ,computer.software_genre ,Software ,Active learning ,ComputingMilieux_COMPUTERSANDEDUCATION ,Consciousness ,business ,computer ,media_common - Abstract
The course of structure mechanics' design and execution is introduced in the article. And the particularity of professional course multimedia courseware is also expatiated. Then, the importance of multimedia teaching applied to professional courses in colleges is explained by a “3-step” teaching example. It is shown that the CAI courseware is applicable to bring up the active learning custom and innovation consciousness of applied talents in civil engineering.
- Published
- 2009
23. A new algorithm for watermarking based On DCT and chaotic scrambling
- Author
-
Xiuhua Ji and Yanling Wang
- Subjects
business.industry ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Image processing ,Watermark ,Scrambling ,symbols.namesake ,Gaussian noise ,Human visual system model ,Discrete cosine transform ,Median filter ,symbols ,Computer vision ,Artificial intelligence ,business ,Digital watermarking ,Transform coding - Abstract
This paper presents a robust image watermarking method in discrete cosine transform (DCT) domain based on chaotic sequences encryption. Exploiting some characteristics of Human Visual System (HVS) and DC(Direct Current) components having much larger perceptual capacity than any AC (Alternating Current)components, watermark is embedded into the DC components of the host image. First, we scramble the watermark image to avoid the block effect. Then we split the host image and the scrambled watermark image into 8×8block respectively, and the scrambled watermark is embedded into the DC components of the host image. The experimental results show that the embedded watermark is invisible and robust against noise and commonly used image processing methods such as Gaussian, JPEG compression, Median filtering etc.
- Published
- 2009
24. One database pass algorithms of mining top-k frequent closed itemsets
- Author
-
Yong Qiu and Yong-Jie Lan
- Subjects
Structure (mathematical logic) ,Database ,Association rule learning ,Computer science ,InformationSystems_DATABASEMANAGEMENT ,computer.software_genre ,GSP Algorithm ,Tree (data structure) ,Algorithm design ,Set theory ,Data mining ,Cluster analysis ,computer ,Algorithm - Abstract
The FP-growth algorithm is a powerful algorithm to mine frequent patterns and it is non-candidate generation algorithm using a special structure FP-tree. Many algorithms proposed recently are based on FP-tree. These algorithms include all frequent itemsets mining, closed frequent itemsets mining and top-k closed frequent itemsets mining. However, it still requires two database scans, Although it is not a problem for static database, it is not efficient for frequent pattern mining, interactive and incremental mining. In order to enhance the efficiency of FP-tree based algorithms, propose a novel algorithm called QFPC which can create FP-tree with one database pass. Also propose a novel algorithm PFPTC to create FP-tree parallelly.
- Published
- 2009
25. Lowering the requirement of line-speed processing by considering traffic characteristics
- Author
-
Lv Ping, Zhao Xin, and Zhang Xiaohui
- Subjects
Router ,business.industry ,Network packet ,Computer science ,Real-time computing ,Packet processing ,The Internet ,Internet traffic ,business ,Multiplexing ,Networking hardware ,Computer network - Abstract
To have line-speed processing ability is a fundamental rule in the design of high-density linecard in router and other network equipment. To satisfy this requirement, the traffic processing speed of the linecard should be not less than the sum of the individual link rates. With the quick increasing of link rate, the line speed processing requirement becomes too hard in high-density linecard design. This paper proposes that several characteristics of Internet traffic can be used to lower the packet processing speed of the high-density linecard. Thus it can help the community to change the design methodology from worst case oriented to real world traffic oriented. By introducing Multiplexing gain, packet size gain and link efficiency gain, this paper shows that the total gain lowers the requirement of line-speed requirement significantly without damaging the line speed processing ability. Performance cost and engineering questions involved in the implementing of this method are also covered.
- Published
- 2009
26. The control to eliminate impulse for a class of singular interval systems
- Author
-
Ruliang Wang, Yanchao Wen, and Hong Lei
- Subjects
Adaptive control ,Control theory ,Singular solution ,Robustness (computer science) ,Computer science ,Orthogonal transformation ,Spectral radius ,Control system ,Impulse (physics) - Abstract
The problem of eliminating impulse for a class of interval singular systems was considered in this paper. Firstly, the impulse control problem for interval singular systems discussed in this paper was transform into uncertain singular systems. Secondly, using orthogonal transformation, the uncertain singular systems was transform into the singular standard form to be discussed, then a sufficient condition which there is a output feedback controller such that the closed-loop systems impulse-free was given by means of the properties of spectral radius, more over, the designing steps for eliminating impulse for singular interval systems were given. Base on the results, the existence of a output feedback controller with perturbation such that the closed-loop systems is impulse-free was discussed later. Finally, a numerical example was presented to illustrate the feasibility of the main result in this paper.
- Published
- 2009
27. The Anchored Instruction for programming courses: Cases, tasks and knowledge transfer
- Author
-
Qi Liu and Xiaorong Wang
- Subjects
Enthusiasm ,Multimedia ,business.industry ,Process (engineering) ,Computer science ,media_common.quotation_subject ,Computer programming ,computer.software_genre ,Anchored Instruction ,ComputingMilieux_COMPUTERSANDEDUCATION ,Mathematics education ,business ,Knowledge transfer ,Curriculum ,computer ,media_common - Abstract
Programming is the nucleus foundation course in computer subjects, and also is considered generally as a hard learning and teaching course. With the introduction of Anchored Instruction in the course teaching, the study environment focusing on some true cases has been created. tasks with different degree of difficulties have been assigned to students for leading study. Cultivation of knowledge transfer ability for students has been highlighted in teaching process. Lecturer can mobilize the students' interest and enthusiasm in learning, reduce the difficulty of the curricula entry, stimulate learning motivation and guide self study. Practice has proved that the approach can quickly improve the students' practical programming capability to solve problems by using computer, which has significantly teaching effectiveness.
- Published
- 2009
28. Design of e-Government broadband IP network
- Author
-
Hsingbai Chen, Ying Lu, and Liuqing Yang
- Subjects
business.product_category ,business.industry ,computer.internet_protocol ,Computer science ,Broadband networks ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,IP forwarding ,Gigabit Ethernet ,IP Multimedia Subsystem ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Optical IP Switching ,Loose Source Routing ,IP tunnel ,Internet protocol suite ,ATM adaptation layer ,Asynchronous Transfer Mode ,Broadband ,Cable modem ,Network switch ,TDMoIP ,business ,computer ,Computer network - Abstract
This paper describes several broadband IP network' key technologies (include ATM :Asynchronous Transfer Mode, IP over SDH, IP over WDM and Gigabit Ethernet technologies) and solutions on e-Government broadband IP network, and comparing, analysis to them. On this basis, proposed three-layer hierarchical structure design of construction e-Government broadband IP network system on core layer, aggregation layer, access layer, which is used to practical network system' implementation.
- Published
- 2009
29. Exponential stability of Cohen-Grossberg neural networks with delays and impulses
- Author
-
Qing Tang, Anping Liu, Min Zou, and Huijuan Li
- Subjects
Equilibrium point ,Lyapunov function ,Mathematics::Commutative Algebra ,Artificial neural network ,Computer science ,Group (mathematics) ,Differential equation ,Stability (learning theory) ,Image processing ,Mathematics::Logic ,symbols.namesake ,Exponential stability ,Control theory ,symbols ,Numerical stability - Abstract
As an important tool to study practical problems of biology, engineering and image processing, the neural networks has caused more and more attention. Some interesting results on the stability have been obtained. In this paper, the exponential stability of the equilibrium point of a group of Cohen-Grossberg neural networks is obtained by using Lyapunov method and Razumikhin technique.
- Published
- 2009
30. Producing synoptic data structure for high speed data streams in telecommunication network management
- Author
-
Deng Bo, Jiang Guo-quan, Ding Kun, and Zhang Xiaoyi
- Subjects
Data stream ,Network architecture ,Computer science ,Data stream mining ,Network packet ,business.industry ,Network information system ,Real-time computing ,Network delay ,Network monitoring ,computer.software_genre ,Telecommunications network ,Network traffic control ,Technology management ,Data modeling ,Network simulation ,Intelligent computer network ,Network management ,Network element ,Sliding window protocol ,Network performance ,Data mining ,business ,computer ,Network management station - Abstract
In large telecommunication network management system, substantial data containing the information of network traffic, network element status, device running situation and all other messages are continuously sent from each special network management system to the integrated network management system. This kind of data is typically the stream data. Current network management system employs traditional database technology to store and process such kind of data. However, the managed network grows larger and larger over time, and the data cumulates, too. The disadvantages of current technology gradually show up. Stream data usually arrives continuously and is often of high speed and large amount. Thus, a data stream algorithm based on self-adapting sliding window model is proposed here to build synoptic data structure in memory. By this algorithm, network manager is able to get the approximate query result after judging the accuracy requirement and processing ability.
- Published
- 2009
31. The research on modeling and optimizing of remanufacturing reverse logistics networks
- Author
-
Wu MiLiang
- Subjects
Waste treatment ,Linear programming ,Computer science ,Integrated logistics support ,Reverse logistics ,Raw material ,Remanufacturing ,Manufacturing engineering ,Operating cost - Abstract
Arm at problems for waste recycle and treatment, the article construct system of remanufacturing industry reverse logistics networks, and build MILP(Mixed-Integer Linear Programming) model in order to minimize operating cost of reverse logistics from two reverse logistics handling methods of remanufacturing and raw materials recycle . Then the article ascertain the number and location of all kind of recycle center and handling establishment local and assign optimizing logistics amount at logistics route consist of net nodes . Finally, the article validates model validity and feasibility.
- Published
- 2009
32. Cultivating the ability of security coding for undergraduates in programming teaching
- Author
-
Si-dan Gao, Bo Chen, Da-wei Xu, and Ling Yu
- Subjects
Multimedia ,Computer science ,business.industry ,Best practice ,Information security ,computer.software_genre ,Software quality ,Software ,Software security assurance ,ComputingMilieux_COMPUTERSANDEDUCATION ,business ,computer ,Curriculum ,Coding (social sciences) - Abstract
To address the problems existing in current college programming education, we consider that the cultivation of security coding ability may be combined within existing courses, such as programming courses, operating system and software engineering curriculum, etc. This paper reviews the authors' several-year practice of integrating the training of the students' security coding ability with programming courses. Three key stages of practice are introduced, which are organic combination with programming curricula, choosing proper textbooks and the introduction of security coding examples. The authors strive to achieve three improvements in the cultivation of students' ability: improvements from defensive programming to security programming, adding secure functions instead of security functions, and paying more attention to enhancing the software quality instead of security. The main contents of security software coding best practices integrated into our teaching practice are given. The testing result shows that the students' security coding ability can be improved, and in fact many of whom have performed well in job interview and get a good job.
- Published
- 2009
33. CNclustering: Clustering with compatible nucleoids
- Author
-
Lixin Wang, Mingjun Wang, Renxia Wan, Xiaoya Yan, and Xiaoke Su
- Subjects
Fuzzy clustering ,Computer science ,Single-linkage clustering ,Correlation clustering ,computer.software_genre ,Measure (mathematics) ,Data set ,ComputingMethodologies_PATTERNRECOGNITION ,CURE data clustering algorithm ,Canopy clustering algorithm ,Data mining ,Cluster analysis ,Algorithm ,computer - Abstract
Dissimilarity measure plays a very important role in traditional data clustering. In this paper, we extend the dissimilarity measure as compatible measure and present a new algorithm (CNclustering) based on this measure. The algorithm is a rigorous partition method, it first gets some compatible clusters with a Compclustering method as the initial nucleoids, then absorbs other objects by the absorbing step to form the final clusters. We use S20 and S200 data sets to demonstrate the clustering performance of the algorithm and get some consistent results.
- Published
- 2009
34. Using speech recognition technology to come true Liberated Learning for deaf students
- Author
-
Xu Jia cheng and Li Ye
- Subjects
Vocabulary ,Computer science ,business.industry ,Speech recognition ,media_common.quotation_subject ,Educational technology ,Information technology ,Sign language ,Reading (process) ,ComputingMilieux_COMPUTERSANDEDUCATION ,Computer aided instruction ,Function (engineering) ,business ,media_common - Abstract
For many years, the teaching for deaf students usually used sign language, lip reading and writing. However, as time goes on, these three methods show lots of disadvantages. It is difficult to come true the Liberated Learning for deaf students using these methods. Thanks to the development of the modern information technology, IBM and the International Liberated Learning Alliance developed a new technology which named Speech Recognition. The function of this technology can help the deaf students to come true liberated learning as the healthy students. In this article the author will introduce the function of this technology and how it will help the deaf students to “listen” more easily.
- Published
- 2009
35. Design and implementation of a distributed IDS alert aggregation model
- Author
-
Guo Fan, Ye Jihua, and Yu Min
- Subjects
Distributed database ,business.industry ,Computer science ,Aggregate (data warehouse) ,Feature (machine learning) ,Data set (IBM mainframe) ,Intrusion detection system ,Data mining ,business ,computer.software_genre ,computer ,Computer network - Abstract
How to aggregate and reduce duplicated alerts from different IDSs is one of the most important problems in distributed IDS research area. The article proposes a distributed alert aggregation model composed of local components and network components. Local components transform raw alerts originating from traditional IDSs to IDMEF-based alerts with uniform format, which are sent to network components. Network components aggregate similar alerts into a meta-alert, using an aggregation algorithm based on category and feature similarity. A subscription-based communication mechanism is and multiple kinds of messages are also proposed to meet the demands of the communication between the components and to realize information share in the whole network. Experiments on DARPA99 data set indicated the effectiveness of the model.
- Published
- 2009
36. Empirical analysis on the development level of regional finance in China
- Author
-
Hong Lei
- Subjects
Financial management ,Development (topology) ,Economic indicator ,Computer science ,business.industry ,Accounting management ,Regional science ,Econometrics ,Financial modeling ,China ,business ,Variety (cybernetics) - Abstract
In this paper we designed index system of regional financial development combining the relevant literature of financial development with the actual situation, And constructed a mathematical assessment model of financial development level with a variety of evaluation methods.And made the empirical analysis on the financial development extent of all regions by collecting corresponding data.
- Published
- 2009
37. Research on key technologies of free stereoscopic display under Multi-views and Multi-view Video Coding
- Author
-
Wen Zhang and Juan Wu
- Subjects
Liquid-crystal display ,Contextual image classification ,Computer science ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Stereoscopy ,GeneralLiterature_MISCELLANEOUS ,law.invention ,law ,Computer graphics (images) ,Computer vision ,Artificial intelligence ,Multiview Video Coding ,business ,ComputingMethodologies_COMPUTERGRAPHICS ,Data compression ,Coding (social sciences) - Abstract
Free stereoscopic display offers a new means for stereoscopic observation, with the greatest strongpoint of experiencing true stereoscopic image without any aided equipments. It is a complex and highly technical process to achieve free stereoscopic display, among which the key technologies are: the components of stereoscopic display hardware, the formation of a stereoscopic data, Multi - view Video Coding, storage and eventual broadcast. Every detail is explained about the design of stereo video player based on Davinci™ DM6446. A novel method of MVC coding structure is proposed after the study of H.264 MVC and character of stereo video. The experiment's results indicate that, compared with the original structure, the classification performance is improved in the coding structure.
- Published
- 2009
38. Study on a speech learning approach based on interval support vector regression
- Author
-
Peipei Liu
- Subjects
Training set ,Computer science ,business.industry ,Speech recognition ,Fuzzy set ,Speech synthesis ,Regression analysis ,Interval (mathematics) ,computer.software_genre ,Machine learning ,Support vector machine ,Kernel (statistics) ,Linear regression ,Credible interval ,Artificial intelligence ,business ,computer - Abstract
In this paper an interval regression model has been established to cope with the situation that the input training data is accurate while the output one is interval. And the model has been applied in English speech learning system to predict the credible interval of correct speech and then give a correct judgment for the learners. Experimental data show that the new model reduces the workload of fuzzy prediction and has good accuracy, so it can be effective in speech learning system.
- Published
- 2009
39. Modeling decision and cooperation of multi-agent system using Petri net
- Author
-
Li Maoqing, Li Wei, and Lin Zishen
- Subjects
Discrete system ,business.industry ,Event (computing) ,Computer science ,Distributed computing ,Multi-agent system ,Server ,Stochastic Petri net ,Artificial intelligence ,Discrete event simulation ,Process architecture ,Petri net ,business - Abstract
The RoboCup 2D server simulates soccer team of real world in a multi-agent environment, which possesses characteristics of dynamic discrete system. This paper proposes a method to model and analyze the decision making process of single agent using improved Condition/event Petri net. The cooperation process of multi-agents is modeling later using simple Petri net based on environment built previously. The hierarchy structure of Petri nets and the method to avoid conflicts are discussed at last.
- Published
- 2009
40. Ontology-based domain knowledge representation
- Author
-
Zhiping Li and Yu Sun
- Subjects
Ontology Inference Layer ,Commonsense knowledge ,Knowledge representation and reasoning ,Computer science ,Process ontology ,Open Knowledge Base Connectivity ,Reuse ,Ontology (information science) ,computer.software_genre ,Body of knowledge ,Knowledge-based systems ,Ontology chart ,Ontology components ,Formal specification ,Upper ontology ,business.industry ,Ontology-based data integration ,Suggested Upper Merged Ontology ,Ontology language ,Knowledge base ,Ontology ,Domain knowledge ,Artificial intelligence ,business ,Ontology alignment ,computer ,Natural language processing - Abstract
A formalism of ontology-based domain knowledge representation in intelligent tutoring systems is presented in this paper. Domain knowledge representation is based on ontologies in order to improve the sharing and reusing of multimedia teaching materials. After discussing the three-level ontology-based knowledge representation structure, the language of ontology representation is defined and then the formal description of ontology-based domain knowledge base is proposed.
- Published
- 2009
41. The research of display system for surface surveillance radar
- Author
-
Lin Wang, Nan Li, and Xiaohao Xu
- Subjects
Surface (mathematics) ,Computer science ,business.industry ,OpenGL ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,law.invention ,law ,Computer vision ,Artificial intelligence ,Radar ,Graphics ,business ,Secondary surveillance radar - Abstract
The research of display system for surface surveillance radar is discussed. The paper emphatically introduces the image display module in that system. This module adds a third party library to read the DXF file, and uses OpenGL to draw the airport map and aircrafts, to achieve the image interaction for users.
- Published
- 2009
42. A novel local area interpolation algorithm for heart 3D recreation form 2D cardiac ultrasound images with ball filter
- Author
-
Lixue Yin, Fu Qi, Tigang Jiang, and Chen Zhi
- Subjects
Demosaicing ,Computer science ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Bilinear interpolation ,Stairstep interpolation ,Linear interpolation ,Multivariate interpolation ,Nearest-neighbor interpolation ,Bicubic interpolation ,Computer vision ,Artificial intelligence ,business ,Algorithm ,ComputingMethodologies_COMPUTERGRAPHICS ,Interpolation - Abstract
This paper proposes a new novel local area interpolation algorithm for heart 3D recreation form cardiac ultrasound images. Compare with the traditional local area linear interpolation algorithm, we introduced a 3d ball Filter, which leads to the number of slice and the number of the interpolation candidate points are dynamic, the experiment results show that our results are much more smoother and realistic than that of the traditional one which the number of slice and points are fixed.
- Published
- 2009
43. Research on dynamic semantic integration of EERP based on SOA
- Author
-
Baoan Li and Jingzhi Liu
- Subjects
Service (systems architecture) ,Database ,business.industry ,Computer science ,computer.internet_protocol ,Service-oriented architecture ,computer.software_genre ,Formal specification ,Semantic integration ,Web service ,Software architecture ,business ,Software engineering ,computer ,Enterprise resource planning ,Semantic Web - Abstract
The current business challenge and solution supported by EERP (End-to-End Resource Planning) is presented in this paper. The relevant technologies about SOA and Semantic SOA to realize EERP have been researched in detail. After analyzing the production value chains and service requirements of power enterprise, a new approach based on dynamic semantic SOA and Component oriented technologies for EERP has been proposed and applied, which can help to realize business-goal-driven dynamic semantic integration of the Web services.
- Published
- 2009
44. Research on construction technology of equipment support information integration platform
- Author
-
Shaoli Fan, Huazhang Liu, and Min Zhu
- Subjects
Database ,Distributed database ,Computer science ,business.industry ,Information technology ,computer.software_genre ,Information and Communications Technology ,Middleware ,Middleware (distributed applications) ,Information system ,Systems engineering ,Business logic ,Informatization ,business ,computer ,Information integration - Abstract
Because of the different function of various departments and agencies, a large number of different, isolated, heterogeneous information systems are set up in equipment support informatization construction at present. This status beacome the bottleneck to restrict the construction of equipment support informatization. Abandoning these informantion systems and redevelopment new systems will result in a great waste of resources. A common database middleware is established. A middle layer between system business logic, common component service and data source is built. The differences of a variety of heterogeneous data sources are shielded. Equipment support information integration platform is constructed. Information integration is realized on the basis of the existing information systems.
- Published
- 2009
45. Reflections on the practice of bilingual approach in teaching network security and management
- Author
-
Wenjuan Jiang, Zhaohui Lu, and Shuqian He
- Subjects
Higher education ,Computer science ,business.industry ,Network security ,Bilingual teaching ,InformationSystems_INFORMATIONSTORAGEANDRETRIEVAL ,Knowledge engineering ,ComputingMethodologies_DOCUMENTANDTEXTPROCESSING ,ComputingMilieux_COMPUTERSANDEDUCATION ,Mathematics education ,China ,business ,ComputingMethodologies_ARTIFICIALINTELLIGENCE - Abstract
Bilingual Teaching is one of the important measures to bring China's higher education in line with international practices. However, there are many issues to be studied and discussed in this new teaching approach. Based on the practice and experience of bilingual approach in teaching the course of Network Security and Management, this paper explored the necessity and significance of offering bilingual teaching to undergraduates majoring in computer science, and the specific ways to implement bilingual teaching. In the meanwhile, problems that exist in the bilingual teaching initiatives are analyzed and summarized.
- Published
- 2009
46. OQ-Quad: An efficient query processing for continuous k-nearest neighbor based on quad tree
- Author
-
Yong-Gui Zou and Qing-Lin Fan
- Subjects
Tree (data structure) ,Theoretical computer science ,Computer science ,Mobile computing ,Quadtree ,Point (geometry) ,Focus (optics) ,Hash table ,Database index ,k-nearest neighbors algorithm ,Temporal database - Abstract
With the growing popularity of mobile computing and wireless communications, managing the continuously changing information of the moving objects is becoming feasible, especially in LBS application which is characterized by a large number of moving objects and a large number of continuous queries. In this paper, we focus on continuous k-nearest neighbor (CkNN for short) query and propose a query method based on a quad tree to support continuous k-nearest neighbor query for moving objects, in which the main idea is to use a quad tree to divide the static spatial space for the moving objects. In the interested region, we use the quad tree and hash tables as an index to store the moving objects. Then we calculate the distances between the query point and the moving objects from inside to outside to get the result. Our comprehensive experimentation shows that the performance of the proposed method is better in memory consumption and processing time than the CMP algorithm.
- Published
- 2009
47. An application of low private exponent attack on RSA
- Author
-
Yong-Hui Zheng, Yue-Fei Zhu, and Hong Xu
- Subjects
Public-key cryptography ,Discrete mathematics ,Theoretical computer science ,Computational complexity theory ,Integer ,business.industry ,Generalization ,Exponent ,Public key cryptosystem ,Lattice reduction ,business ,Mathematics - Abstract
RSA is one of the most popular and widely used public key cryptosystems. In this paper, an application of low private exponent attack on it is presented. More precisely, let (N, e) be an RSA public key with corresponding private key d, then N can be factored provided that there exists a proper integer k such that ek is relatively small and dk mod φ(N) is small (or large) enough. Experiment shows that our generalization of low private exponent attack can seek out some new weak keys of RSA.
- Published
- 2009
48. A geometrically robust watermarking scheme based on perceptual hashes and genetic Algorithm
- Author
-
Song Hai-ming and Li Chuanmu
- Subjects
business.industry ,Computer science ,Feature extraction ,Hash function ,Geometric transformation ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Pattern recognition ,Watermark ,Object detection ,Computer Science::Multimedia ,Human visual system model ,Artificial intelligence ,business ,Digital watermarking ,Computer Science::Cryptography and Security - Abstract
A geometrically robust image watermarking scheme based on perceptual hashes and genetic algorithm is proposed. The synchronization information, which is generated by perceptual image hashes and pseudo-random number (PRN), and the watermark are embedded into the image based on the human visual system (HVS). In watermark extracting, the geometric transformation parameters are computed from perceptual hash values of the image, which is realized by genetic algorithm. And then the image is re-synchronized by inverse transforming with the parameters. According to the locally optimum detection and a threshold can decide the watermark is present or not, and the threshold is obtained by the Neyman-Pearson (NP) criterion. Simulation results show that the proposed scheme is not only invisible, but also robust against regular signal processing and geometric attacks.
- Published
- 2009
49. A teaching model based on schema theory for economic data analysis curriculum
- Author
-
Ming Ma, Chijun Zhang, Peng Cheng, and Jianhua Jiang
- Subjects
Knowledge management ,Economic data ,business.industry ,Computer science ,Schema (psychology) ,ComputingMilieux_COMPUTERSANDEDUCATION ,business ,Application software ,computer.software_genre ,Curriculum ,computer ,Data modeling - Abstract
The ability of economic data analysis is very important to information major students in economic and economic universities. However, mastering the skill of economic data analysis is not easy to them. The design and construction of a teaching model based on schema theory in economic data analysis curriculum is described, and then it is applied to information major students. The teaching result shows that there is a significant difference in final exam and practice exam between the proposed model and a regular teaching model.
- Published
- 2009
50. Design of revs curve programmable servo control system
- Author
-
Boxue Tan and Dejie Song
- Subjects
Acceleration ,Microcontroller ,Control theory ,Computer science ,Control system ,Servo control system ,Servo control ,Process (computing) ,Servomotor ,AC motor ,Revolutions per minute ,Machine control - Abstract
A revs curve programmable servo control system on servo motor has been developed in order to look for optimum control parameters of a single crystal growth. The main parts of the system are Micro Controller Unit (MCU), AC servomotor, Digital Analog Converter (DAC) and so on. By means of a new arithmetic, a crucible rotary speed realized linear change in a process of acceleration and deceleration for given revs in 1∼600 revolutions per minute (rpm). Its control precision is high, and the program method is simple.
- Published
- 2009
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.