Pub Date : 2010-06-25DOI: 10.1109/ICCDA.2010.5541237
Z. Kong, Lifu Wang, Zhaoxia Wu
This paper is concerned with the normal parameter reduction of soft sets. The problems of changing entries are presented. Then, we introduce the definition of positive and negative changed rates, and these properties are proposed. Furthermore, the normal parameter reduction is investigated after changing entries in soft set
{"title":"Changing entries in soft sets","authors":"Z. Kong, Lifu Wang, Zhaoxia Wu","doi":"10.1109/ICCDA.2010.5541237","DOIUrl":"https://doi.org/10.1109/ICCDA.2010.5541237","url":null,"abstract":"This paper is concerned with the normal parameter reduction of soft sets. The problems of changing entries are presented. Then, we introduce the definition of positive and negative changed rates, and these properties are proposed. Furthermore, the normal parameter reduction is investigated after changing entries in soft set","PeriodicalId":190625,"journal":{"name":"2010 International Conference On Computer Design and Applications","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123901608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-25DOI: 10.1109/ICCDA.2010.5541148
Lihui Ma, Mingbing Guo, Yanye Lu, Meng Dong, Zihui Wei, R. Tan
TRIZ theory has been widely used in solving engineering problems, but it is difficult for the transformation from the TRIZ solution to the domain solution. The transferring from TRIZ solution to domain solution can be realized by applying the method based on analogical-reasoning and unexpected discovery (UXD). The technical conflict of semiconductor silicon wafer laminator can be solved by applying this method in this paper.
{"title":"Application of the domain solutions' transferring method based on analogical-reasoning and UXD","authors":"Lihui Ma, Mingbing Guo, Yanye Lu, Meng Dong, Zihui Wei, R. Tan","doi":"10.1109/ICCDA.2010.5541148","DOIUrl":"https://doi.org/10.1109/ICCDA.2010.5541148","url":null,"abstract":"TRIZ theory has been widely used in solving engineering problems, but it is difficult for the transformation from the TRIZ solution to the domain solution. The transferring from TRIZ solution to domain solution can be realized by applying the method based on analogical-reasoning and unexpected discovery (UXD). The technical conflict of semiconductor silicon wafer laminator can be solved by applying this method in this paper.","PeriodicalId":190625,"journal":{"name":"2010 International Conference On Computer Design and Applications","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114460272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-25DOI: 10.1109/ICCDA.2010.5541378
Yang Chuan, Li Chen, Zhang Chao
Temperature drift is the important factor of the precision of diffused silicon pressure sensor, so author uses software to compensate for it to improve the precision of the sensor. At the data base of the temperature characteristic experiment of diffused silicon pressure sensor, author proposes to use RBF neural network to establish temperature drift compensated model with regression analysis. Compared with two-dimension regression analysis, RBF neural network can improve the precision of the model distinctly.
{"title":"The application of RBF neural network in the compensation for temperature drift of the silicon pressure sensor","authors":"Yang Chuan, Li Chen, Zhang Chao","doi":"10.1109/ICCDA.2010.5541378","DOIUrl":"https://doi.org/10.1109/ICCDA.2010.5541378","url":null,"abstract":"Temperature drift is the important factor of the precision of diffused silicon pressure sensor, so author uses software to compensate for it to improve the precision of the sensor. At the data base of the temperature characteristic experiment of diffused silicon pressure sensor, author proposes to use RBF neural network to establish temperature drift compensated model with regression analysis. Compared with two-dimension regression analysis, RBF neural network can improve the precision of the model distinctly.","PeriodicalId":190625,"journal":{"name":"2010 International Conference On Computer Design and Applications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114582481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, a general design of vehicle safety assistant system based on machine vision and electronic control steering system is presented. Machine vision system detects lane and obstacle (vehicle) on the highway environment. Electronic control steering system provides the realtime information of the steering operation, which represents the driver's purpose. If the real steering operation does not meet the safety operation requirement, a warning will be triggered to prevent Road Departure or Rear End.
{"title":"General design of vehicle safety assistant system based on machine vision and electronic control steering","authors":"Yongjin Zhang, Wei Li, Xiao Wang, Jianhui Zhao, Yidan Yuan","doi":"10.1109/ICCDA.2010.5541230","DOIUrl":"https://doi.org/10.1109/ICCDA.2010.5541230","url":null,"abstract":"In this paper, a general design of vehicle safety assistant system based on machine vision and electronic control steering system is presented. Machine vision system detects lane and obstacle (vehicle) on the highway environment. Electronic control steering system provides the realtime information of the steering operation, which represents the driver's purpose. If the real steering operation does not meet the safety operation requirement, a warning will be triggered to prevent Road Departure or Rear End.","PeriodicalId":190625,"journal":{"name":"2010 International Conference On Computer Design and Applications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114609849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-25DOI: 10.1109/ICCDA.2010.5541333
N. Yang, Tian Li-Qin, Shen Xue-li
Wireless sensor networks as sensor technology, microelectronics and wireless communication technology product of the combination, become an active field of computer science research branch, in the military and civilian applications has been widely. As WSNs is limited to low-power requirements of sensor nodes and nodes generally carry an energy which limited and non-replacement, the method which maintains node energy by changing the large number of battery is impossible. While the traditional network is committed to get to the higher quality network services, then the network protocol of WSNs pay more attention to be maintained in the node energy. The cost of communication is higher relative to the local computation. Date fusion, as a core technology, has played an important role in saving energy of the entire network, enhancing the accuracy of the collected data and improving the efficiency of data transfer. In this paper, a data fusion strategy for WSNs was proposed based on trust and cluster. In the Intra-Cluster, we carry out the data fusion by setting up the relay node and using the trust value of the node as weight of data. The selection principle of relay node, the process of choose the relay node and the data fusion based on the trust will be discussed. Finally, the effective and energy consumption of the data fusion algorithm will be analyzed, and through an example to illustrate the specific methods of data fusion and feasibility.
{"title":"The research of dynamic data fusion based-on node behavior trust for WSNs","authors":"N. Yang, Tian Li-Qin, Shen Xue-li","doi":"10.1109/ICCDA.2010.5541333","DOIUrl":"https://doi.org/10.1109/ICCDA.2010.5541333","url":null,"abstract":"Wireless sensor networks as sensor technology, microelectronics and wireless communication technology product of the combination, become an active field of computer science research branch, in the military and civilian applications has been widely. As WSNs is limited to low-power requirements of sensor nodes and nodes generally carry an energy which limited and non-replacement, the method which maintains node energy by changing the large number of battery is impossible. While the traditional network is committed to get to the higher quality network services, then the network protocol of WSNs pay more attention to be maintained in the node energy. The cost of communication is higher relative to the local computation. Date fusion, as a core technology, has played an important role in saving energy of the entire network, enhancing the accuracy of the collected data and improving the efficiency of data transfer. In this paper, a data fusion strategy for WSNs was proposed based on trust and cluster. In the Intra-Cluster, we carry out the data fusion by setting up the relay node and using the trust value of the node as weight of data. The selection principle of relay node, the process of choose the relay node and the data fusion based on the trust will be discussed. Finally, the effective and energy consumption of the data fusion algorithm will be analyzed, and through an example to illustrate the specific methods of data fusion and feasibility.","PeriodicalId":190625,"journal":{"name":"2010 International Conference On Computer Design and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114872230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-25DOI: 10.1109/ICCDA.2010.5541140
Ou Qingyu, Zhang Changhong
In all kinds of information systems, the amount of the key is large, and the correlation of which is complex. To solve this problem, an evaluation method for the key security based on the measure of the static state characteristics is proposed. In this way, the security state of all kinds of keys in the information systems, can be measured well and truly, by the means of formalization modeling of the set of keys, the design of the security level and the probability of uncontrollability. As well as it, the category and the level of the key can also be considered well, and the security states of the key can be reflected reliably, so the security of the information system can be achieved.
{"title":"Evaluation method of the security of key based on the measure of the static state characteristics","authors":"Ou Qingyu, Zhang Changhong","doi":"10.1109/ICCDA.2010.5541140","DOIUrl":"https://doi.org/10.1109/ICCDA.2010.5541140","url":null,"abstract":"In all kinds of information systems, the amount of the key is large, and the correlation of which is complex. To solve this problem, an evaluation method for the key security based on the measure of the static state characteristics is proposed. In this way, the security state of all kinds of keys in the information systems, can be measured well and truly, by the means of formalization modeling of the set of keys, the design of the security level and the probability of uncontrollability. As well as it, the category and the level of the key can also be considered well, and the security states of the key can be reflected reliably, so the security of the information system can be achieved.","PeriodicalId":190625,"journal":{"name":"2010 International Conference On Computer Design and Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114940128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-25DOI: 10.1109/ICCDA.2010.5541242
B. Zheng, Qinghua Feng
In this paper, we derive exact traveling wave Solut-ions of (2+1) dimensional BKK equation by a presented method. The method appears to be efficient in seeking exact solutions of no-nlinear equations.
本文给出了一种精确的(2+1)维BKK方程行波解。这种方法在求非线性方程的精确解方面显得很有效。
{"title":"Exact traveling wave solution for (2+1) dimensional BKK equation","authors":"B. Zheng, Qinghua Feng","doi":"10.1109/ICCDA.2010.5541242","DOIUrl":"https://doi.org/10.1109/ICCDA.2010.5541242","url":null,"abstract":"In this paper, we derive exact traveling wave Solut-ions of (2+1) dimensional BKK equation by a presented method. The method appears to be efficient in seeking exact solutions of no-nlinear equations.","PeriodicalId":190625,"journal":{"name":"2010 International Conference On Computer Design and Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115055617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-25DOI: 10.1109/ICCDA.2010.5540982
Pen Jiayin
The definitions of (∈,∈∨q)-fuzzy filter and (β̄,ᾱ)-fuzzy filter, and four new (β̄,ᾱ)-fuzzy filters are acquired. As a generalization of fuzzy BCK-filter, (∈,∈∨q) -fuzzy filter and (∈,∈̄∨q) -fuzzy filter, we give the definition of (s,t]-fuzzy filter with thresholds. The relations between these fuzzy filters and their level filters are discussed, some proposed are studed, and their equivalent descriptions are given. How to deal with the homomorphic image and inverse image of (s,t]-fuzzy filters are investigated.
{"title":"(s,t]-fuzzy filters of BCK-algebras","authors":"Pen Jiayin","doi":"10.1109/ICCDA.2010.5540982","DOIUrl":"https://doi.org/10.1109/ICCDA.2010.5540982","url":null,"abstract":"The definitions of (∈,∈∨q)-fuzzy filter and (β̄,ᾱ)-fuzzy filter, and four new (β̄,ᾱ)-fuzzy filters are acquired. As a generalization of fuzzy BCK-filter, (∈,∈∨q) -fuzzy filter and (∈,∈̄∨q) -fuzzy filter, we give the definition of (s,t]-fuzzy filter with thresholds. The relations between these fuzzy filters and their level filters are discussed, some proposed are studed, and their equivalent descriptions are given. How to deal with the homomorphic image and inverse image of (s,t]-fuzzy filters are investigated.","PeriodicalId":190625,"journal":{"name":"2010 International Conference On Computer Design and Applications","volume":"257 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116885034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-25DOI: 10.1109/ICCDA.2010.5541144
Hai-Long Wang, Liang Yue, Pengpeng Zhao, Zhi-ming Cui
This paper presents a classification method of data source using fuzzy set and probabilistic model. The words of each domain are classified into characteristic words and general words according to their contribution to the current domain. The fuzzy set is introduced into the simplification process of characteristic words and the common words as the normalized glossary tool, which can be able to find more precise glossary in the homepage text. And a vocabulary probabilistic model is build after the normalized process in various domains, these words are classified by calculating the distance between the data source form vector and each domain vector.
{"title":"Hierachical fuzzy set-based deep Web source classification","authors":"Hai-Long Wang, Liang Yue, Pengpeng Zhao, Zhi-ming Cui","doi":"10.1109/ICCDA.2010.5541144","DOIUrl":"https://doi.org/10.1109/ICCDA.2010.5541144","url":null,"abstract":"This paper presents a classification method of data source using fuzzy set and probabilistic model. The words of each domain are classified into characteristic words and general words according to their contribution to the current domain. The fuzzy set is introduced into the simplification process of characteristic words and the common words as the normalized glossary tool, which can be able to find more precise glossary in the homepage text. And a vocabulary probabilistic model is build after the normalized process in various domains, these words are classified by calculating the distance between the data source form vector and each domain vector.","PeriodicalId":190625,"journal":{"name":"2010 International Conference On Computer Design and Applications","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117157104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-25DOI: 10.1109/ICCDA.2010.5540842
Zhicheng Xue, Lu Yang, Zeng-jie Yang
Using the energy equivalent hypothesis, combining the tension and compression constitutive relation of concrete material in the code for design of concrete structure, the scalar form of damage variable is introducted and a new concrete damage model is proposed so as to use for damage analysis in concrete structures. In order to the unilateral incision concrete beams with a four-point shear loading, for example, this model is developed for structural damage analysis in the ABAQUS finite element softwre. And the damage is found on the right of upper incision. The damage max value is 0.9162. The damage zone prolongates downward along a curve form. The results show that the model damage evolution results accord the tendency of digital speckle test results. It means that the damage model for concrete structural damage anslysis is feasible.
{"title":"A damage model with subsection curve of concrete and its numerical verification based on ABAQUS","authors":"Zhicheng Xue, Lu Yang, Zeng-jie Yang","doi":"10.1109/ICCDA.2010.5540842","DOIUrl":"https://doi.org/10.1109/ICCDA.2010.5540842","url":null,"abstract":"Using the energy equivalent hypothesis, combining the tension and compression constitutive relation of concrete material in the code for design of concrete structure, the scalar form of damage variable is introducted and a new concrete damage model is proposed so as to use for damage analysis in concrete structures. In order to the unilateral incision concrete beams with a four-point shear loading, for example, this model is developed for structural damage analysis in the ABAQUS finite element softwre. And the damage is found on the right of upper incision. The damage max value is 0.9162. The damage zone prolongates downward along a curve form. The results show that the model damage evolution results accord the tendency of digital speckle test results. It means that the damage model for concrete structural damage anslysis is feasible.","PeriodicalId":190625,"journal":{"name":"2010 International Conference On Computer Design and Applications","volume":"103 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117311324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}