首页 > 最新文献

2010 5th International Conference on Computer Science & Education最新文献

英文 中文
A PID neural network control for permanent magnet synchronous motor servo system 永磁同步电机伺服系统的PID神经网络控制
Pub Date : 2010-09-30 DOI: 10.1109/ICCSE.2010.5593702
Lixiong Lin, Xiafu Peng
This paper investigates the Application of PID neural network(PIDNN) control law for a permanent magnet synchronous motor(PMSM) servo system. First, the math model of a PMSM is introduced for the PMSM servo system, on which PIDNN controller with on-line learning, tracking and regulating ability is applied. This PIDNN controller is campared with the conventional PID controller, and single neural PID controller. The simulation results show that the control law of PIDNN yields excellent performance for both track following and real-time control in the PMSM servo system.
研究了PID神经网络(PIDNN)控制律在永磁同步电机伺服系统中的应用。首先,介绍了永磁同步电机伺服系统的数学模型,并在其上应用了具有在线学习、跟踪和调节能力的PIDNN控制器。并与传统PID控制器和单神经PID控制器进行了比较。仿真结果表明,所提出的pid神经网络控制律对永磁同步电机伺服系统的跟踪和实时控制都具有良好的性能。
{"title":"A PID neural network control for permanent magnet synchronous motor servo system","authors":"Lixiong Lin, Xiafu Peng","doi":"10.1109/ICCSE.2010.5593702","DOIUrl":"https://doi.org/10.1109/ICCSE.2010.5593702","url":null,"abstract":"This paper investigates the Application of PID neural network(PIDNN) control law for a permanent magnet synchronous motor(PMSM) servo system. First, the math model of a PMSM is introduced for the PMSM servo system, on which PIDNN controller with on-line learning, tracking and regulating ability is applied. This PIDNN controller is campared with the conventional PID controller, and single neural PID controller. The simulation results show that the control law of PIDNN yields excellent performance for both track following and real-time control in the PMSM servo system.","PeriodicalId":377991,"journal":{"name":"2010 5th International Conference on Computer Science & Education","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123082283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Flow-like textures with line-like structures images inpainting by improved tensor diffusion model 用改进的张量扩散模型绘制具有线状结构的流状纹理图像
Pub Date : 2010-09-30 DOI: 10.1109/ICCSE.2010.5593835
Cui Xuehong
For inpainting of the flow-like textures with line-like structures images, we present an model based on tensor diffusion. The proposed model is to reconstruct a damaged original image by acting along the texture's direction and the vertical texture's direction which is determined by the texture's trend of the local image structure (This local image structure is measured by the so-called structure tensor). In order to guarantee better results, the intensity of the diffusion along the texture's direction should be much greater than that of the diffusion along the vertical texture's direction. The nonnegativity discretization method and optimized rotation invariance method is used to calculate the proposed model. It was shown in experiments that this model can get good results for inpainting the flow-like textures with line-like structures images that contain nicks or small broken areas.
针对类流纹理与类线结构图像的融合问题,提出了一种基于张量扩散的模型。所提出的模型是通过纹理方向和垂直纹理方向来重建受损的原始图像,而纹理方向是由图像局部结构的纹理趋势决定的(该局部图像结构由所谓的结构张量测量)。为了保证更好的效果,沿纹理方向的扩散强度应该远大于沿垂直纹理方向的扩散强度。采用非负离散化方法和优化旋转不变性方法对模型进行了计算。实验结果表明,该模型对含有切口或小破碎区域的线状结构图像进行流状纹理的涂绘,可以获得较好的效果。
{"title":"Flow-like textures with line-like structures images inpainting by improved tensor diffusion model","authors":"Cui Xuehong","doi":"10.1109/ICCSE.2010.5593835","DOIUrl":"https://doi.org/10.1109/ICCSE.2010.5593835","url":null,"abstract":"For inpainting of the flow-like textures with line-like structures images, we present an model based on tensor diffusion. The proposed model is to reconstruct a damaged original image by acting along the texture's direction and the vertical texture's direction which is determined by the texture's trend of the local image structure (This local image structure is measured by the so-called structure tensor). In order to guarantee better results, the intensity of the diffusion along the texture's direction should be much greater than that of the diffusion along the vertical texture's direction. The nonnegativity discretization method and optimized rotation invariance method is used to calculate the proposed model. It was shown in experiments that this model can get good results for inpainting the flow-like textures with line-like structures images that contain nicks or small broken areas.","PeriodicalId":377991,"journal":{"name":"2010 5th International Conference on Computer Science & Education","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116677882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimal hierarchical partition for k-Anonymity k-匿名的最优分层划分
Pub Date : 2010-09-30 DOI: 10.1109/ICCSE.2010.5593667
Qingming Tang, Yingjie Wu, Xiaodong Wang
K-Anonymity is a famous and widely used privacy principle for protecting private information. It requires that each tuple of a public released data table must be indistinguishable from at least other k − 1 tuples. Given a table, finding an optimal k-anonymous version is NP-hard in most previous recoding ”model”. Thus, designing an efficient algorithm to find high-quality k-anonymous version is still challenge, though k-anonymity is well-researched. In recent years, hierarchical partition is proposed and widely accepted. Viewing the given table as a multidimensional space, each hierarchical partition of the space is a multidimensional recoding under some special constraints. Previous works need huge computation to find optimal hierarchical partition, and efficient algorithms just find a reasonable hierarchical partition. In this paper, we show that optimal hierarchical partition for k-anonymity can be obtained within polynomial time when a fixed quasi-identifier is given. We then design a bottom-up algorithm using dynamic approach. Through theoretical analysis and experiments, we show that our algorithm finds better results than related works, and our algorithm runs significantly fast comparing with other optimal algorithms for hierarchical partition.
k -匿名(K-Anonymity)是一种著名且被广泛应用的隐私保护原则,用于保护个人信息。它要求公开发布的数据表的每个元组必须与至少其他k−1个元组不可区分。给定一个表,在大多数以前的编码“模型”中,找到一个最优的k-匿名版本是np困难的。因此,设计一个有效的算法来寻找高质量的k-匿名版本仍然是一个挑战,尽管k-匿名已经得到了很好的研究。近年来,分层划分被提出并被广泛接受。将给定的表视为一个多维空间,该空间的每个分层分区都是在某些特殊约束下的多维重新编码。以往的工作需要大量的计算才能找到最优的层次划分,而高效的算法只是找到一个合理的层次划分。本文证明了当给定一个固定的拟标识符时,k-匿名的最优层次划分可以在多项式时间内得到。然后,我们采用动态方法设计了一个自下而上的算法。通过理论分析和实验,我们的算法得到了比相关工作更好的结果,并且与其他分层划分的最优算法相比,我们的算法运行速度明显快。
{"title":"Optimal hierarchical partition for k-Anonymity","authors":"Qingming Tang, Yingjie Wu, Xiaodong Wang","doi":"10.1109/ICCSE.2010.5593667","DOIUrl":"https://doi.org/10.1109/ICCSE.2010.5593667","url":null,"abstract":"K-Anonymity is a famous and widely used privacy principle for protecting private information. It requires that each tuple of a public released data table must be indistinguishable from at least other k − 1 tuples. Given a table, finding an optimal k-anonymous version is NP-hard in most previous recoding ”model”. Thus, designing an efficient algorithm to find high-quality k-anonymous version is still challenge, though k-anonymity is well-researched. In recent years, hierarchical partition is proposed and widely accepted. Viewing the given table as a multidimensional space, each hierarchical partition of the space is a multidimensional recoding under some special constraints. Previous works need huge computation to find optimal hierarchical partition, and efficient algorithms just find a reasonable hierarchical partition. In this paper, we show that optimal hierarchical partition for k-anonymity can be obtained within polynomial time when a fixed quasi-identifier is given. We then design a bottom-up algorithm using dynamic approach. Through theoretical analysis and experiments, we show that our algorithm finds better results than related works, and our algorithm runs significantly fast comparing with other optimal algorithms for hierarchical partition.","PeriodicalId":377991,"journal":{"name":"2010 5th International Conference on Computer Science & Education","volume":"36 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120885524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of 3-dimensional CAD management system software for EPS EPS三维CAD管理系统软件的开发
Pub Date : 2010-09-30 DOI: 10.1109/ICCSE.2010.5593828
Zhao Yan, Li Yufei
Electronic Power Steering (EPS) has become the direction of the development of modern steering system for its excellent functions. The manufacturers and the researchers need pay attention not only to the improvement and innovation of the technology of the products but also to the control and management on course of designing, producing, dynamic capability research etc. So it's necessary to develop one kind of 3-dimensional Computer Aided Design (CAD) management system for electronic power steering. Using the mind of Concurrent Engineering and Modularization facing to the users, different functions of the system are contacted by the database of management information under this platform. Which make the exchange of different information turn to reality, fasting the speed of products developing. Visual FoxPro, which used Object-Oriented technology and the 3D CAD software, and Solid Works were used to design this system. A good interface and database were set up at the same time.
电子助力转向以其优异的性能成为现代转向系统发展的方向。制造商和研究人员不仅要注意产品技术的改进和创新,还要注意设计、生产、动态性能研究等过程的控制和管理。因此,有必要开发一种电子助力转向的三维计算机辅助设计(CAD)管理系统。该平台采用面向用户的并行工程和模块化思想,通过管理信息数据库连接系统的不同功能。这使得不同信息的交流成为现实,加快了产品发展的速度。本系统采用面向对象技术和三维CAD软件Visual FoxPro以及Solid Works进行设计。同时建立了良好的界面和数据库。
{"title":"Development of 3-dimensional CAD management system software for EPS","authors":"Zhao Yan, Li Yufei","doi":"10.1109/ICCSE.2010.5593828","DOIUrl":"https://doi.org/10.1109/ICCSE.2010.5593828","url":null,"abstract":"Electronic Power Steering (EPS) has become the direction of the development of modern steering system for its excellent functions. The manufacturers and the researchers need pay attention not only to the improvement and innovation of the technology of the products but also to the control and management on course of designing, producing, dynamic capability research etc. So it's necessary to develop one kind of 3-dimensional Computer Aided Design (CAD) management system for electronic power steering. Using the mind of Concurrent Engineering and Modularization facing to the users, different functions of the system are contacted by the database of management information under this platform. Which make the exchange of different information turn to reality, fasting the speed of products developing. Visual FoxPro, which used Object-Oriented technology and the 3D CAD software, and Solid Works were used to design this system. A good interface and database were set up at the same time.","PeriodicalId":377991,"journal":{"name":"2010 5th International Conference on Computer Science & Education","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121117769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fingerprint ID cards and the recognition system 指纹身份证及识别系统
Pub Date : 2010-09-30 DOI: 10.1109/ICCSE.2010.5593447
Wenzhou Liu, Changqing Cai, Zhuo Zhang
Applying IC-card technology, fingerprint recognition technology and the single chip microcomputer control technology, we verify the fingerprint recognition and design a kind of ID card based on IC card and its recognition system. This system includes: M04 fingerprint module, IC-card reader, microcomputer system, warning circuit, voltage stabilizing circuit and some other components. The fingerprint is stored into IC cart of the ID card via microcomputer system, and matched with the information of the holder when necessary. The identification result can be shown on the PC screen to protect the basic information of the holder. This system has the feature of reliable performance, easy to use, higher security, and greater practicability and so on.
应用IC卡技术、指纹识别技术和单片机控制技术,对指纹识别进行验证,设计了一种基于IC卡的身份证及其识别系统。该系统包括:M04指纹模块、ic卡读卡器、微机系统、报警电路、稳压电路等部分组成。指纹通过微机系统存储到身份证的IC卡中,必要时与持卡人的信息进行匹配。识别结果可显示在PC屏幕上,保护持卡人的基本信息。该系统具有性能可靠、使用方便、安全性高、实用性强等特点。
{"title":"Fingerprint ID cards and the recognition system","authors":"Wenzhou Liu, Changqing Cai, Zhuo Zhang","doi":"10.1109/ICCSE.2010.5593447","DOIUrl":"https://doi.org/10.1109/ICCSE.2010.5593447","url":null,"abstract":"Applying IC-card technology, fingerprint recognition technology and the single chip microcomputer control technology, we verify the fingerprint recognition and design a kind of ID card based on IC card and its recognition system. This system includes: M04 fingerprint module, IC-card reader, microcomputer system, warning circuit, voltage stabilizing circuit and some other components. The fingerprint is stored into IC cart of the ID card via microcomputer system, and matched with the information of the holder when necessary. The identification result can be shown on the PC screen to protect the basic information of the holder. This system has the feature of reliable performance, easy to use, higher security, and greater practicability and so on.","PeriodicalId":377991,"journal":{"name":"2010 5th International Conference on Computer Science & Education","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127160453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Mining positive and negative association rules 挖掘正面和负面关联规则
Pub Date : 2010-09-30 DOI: 10.1109/ICCSE.2010.5593755
B. Ramasubbareddy, Dr. A Govardhan, Dr. A. Ramamohanreddy
Association rule mining is one of the most popular data mining techniques to find associations among items in a set by mining necessary patterns in a large database. Typical association rules consider only items enumerated in transactions. Such rules are referred to as positive association rules. Negative association rules also consider the same items, but in addition consider negated items (i.e. absent from transactions). Negative association rules are useful in market-basket analysis to identify products that conflict with each other or products that complement each other. They are also very useful for constructing associative classifiers. In this paper, we propose an algorithm that mines positive and negative association rules without adding any additional measure and extra database scans.
关联规则挖掘是一种最流行的数据挖掘技术,通过挖掘大型数据库中的必要模式来发现集合中项目之间的关联。典型的关联规则只考虑事务中枚举的项。这样的规则被称为正关联规则。负面关联规则也会考虑相同的项目,但除此之外还会考虑被否定的项目(即交易中不存在的项目)。负关联规则在市场购物篮分析中很有用,可以识别相互冲突的产品或相互补充的产品。它们对于构造关联分类器也非常有用。在本文中,我们提出了一种挖掘正关联规则和负关联规则的算法,而不增加任何额外的度量和额外的数据库扫描。
{"title":"Mining positive and negative association rules","authors":"B. Ramasubbareddy, Dr. A Govardhan, Dr. A. Ramamohanreddy","doi":"10.1109/ICCSE.2010.5593755","DOIUrl":"https://doi.org/10.1109/ICCSE.2010.5593755","url":null,"abstract":"Association rule mining is one of the most popular data mining techniques to find associations among items in a set by mining necessary patterns in a large database. Typical association rules consider only items enumerated in transactions. Such rules are referred to as positive association rules. Negative association rules also consider the same items, but in addition consider negated items (i.e. absent from transactions). Negative association rules are useful in market-basket analysis to identify products that conflict with each other or products that complement each other. They are also very useful for constructing associative classifiers. In this paper, we propose an algorithm that mines positive and negative association rules without adding any additional measure and extra database scans.","PeriodicalId":377991,"journal":{"name":"2010 5th International Conference on Computer Science & Education","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125833835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Weighted Random sampling based hierarchical amnesic synopses for data streams 基于加权随机抽样的数据流分层遗忘概要
Pub Date : 2010-09-30 DOI: 10.1109/ICCSE.2010.5593801
Chen Hua-hui, Liao Kang-Li
Maintaining a synopsis structure dynamically from data stream is vital for a variety of streaming data applications, such as approximate query or data mining. In many cases, the significance of data item in streams decays with age: this item perhaps conveys critical information first, but, as time goes by, it gets less and less important until it eventually becomes useless. This characteristic is termed amnesic. Random Sampling is often used in construction of synopsis for streaming data. This paper proposed a Weighted Random Sampling based Hierarchical Amnesic Synopses which includes the amnesic characteristic of data stream in the generation of synopsis. The construction methods for weighted random sampling with and without replacement are discussed. We experimentally evaluate the proposed synopsis structure.
从数据流中动态维护摘要结构对于各种流数据应用程序(如近似查询或数据挖掘)至关重要。在许多情况下,数据流中的数据项的重要性随着时间的推移而衰减:该项可能首先传达关键信息,但随着时间的推移,它变得越来越不重要,直到最终变得无用。这种特征被称为健忘症。随机抽样常用于构建流数据的摘要。本文提出了一种基于加权随机抽样的分层遗忘概要,在生成概要时考虑了数据流的遗忘特性。讨论了带置换和不带置换加权随机抽样的构造方法。我们通过实验对所提出的概要结构进行了评价。
{"title":"Weighted Random sampling based hierarchical amnesic synopses for data streams","authors":"Chen Hua-hui, Liao Kang-Li","doi":"10.1109/ICCSE.2010.5593801","DOIUrl":"https://doi.org/10.1109/ICCSE.2010.5593801","url":null,"abstract":"Maintaining a synopsis structure dynamically from data stream is vital for a variety of streaming data applications, such as approximate query or data mining. In many cases, the significance of data item in streams decays with age: this item perhaps conveys critical information first, but, as time goes by, it gets less and less important until it eventually becomes useless. This characteristic is termed amnesic. Random Sampling is often used in construction of synopsis for streaming data. This paper proposed a Weighted Random Sampling based Hierarchical Amnesic Synopses which includes the amnesic characteristic of data stream in the generation of synopsis. The construction methods for weighted random sampling with and without replacement are discussed. We experimentally evaluate the proposed synopsis structure.","PeriodicalId":377991,"journal":{"name":"2010 5th International Conference on Computer Science & Education","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123505715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on a method of P2P traffic identification based on multi-dimension characteristics 基于多维特征的P2P流量识别方法研究
Pub Date : 2010-09-30 DOI: 10.1109/ICCSE.2010.5593400
Wang Chunzhi, Jiang Wei, Chen Hong, Wei Luo, H. Fang
With the increasingly development of P2P in recent years, the operational mechanism of P2P application has varied, it's very difficult to distinguish P2P traffic from normal traffic by using single traffic characteristics. The paper put forward a method of P2P traffic identification based on multi-dimension characteristics. Extracting multi-dimension characteristics of P2P application such as ratio of UDP/TCP protocol packet, packet changing ratio, average data transmitting size and ratio of up/down traffic, to indentify P2P traffic under off line status by using decision tree. Test result indicated that P2P traffic in network could be effectively identified by using this method, with an accuracy over 97 percent.
近年来随着P2P的日益发展,P2P应用的运行机制多种多样,用单一的流量特征来区分P2P流量和普通流量是非常困难的。提出了一种基于多维特征的P2P流量识别方法。提取P2P应用的UDP/TCP协议报文比率、报文变化率、平均数据传输大小和上下流量比率等多维特征,利用决策树对离线状态下的P2P流量进行识别。测试结果表明,该方法可以有效地识别网络中的P2P流量,准确率达到97%以上。
{"title":"Research on a method of P2P traffic identification based on multi-dimension characteristics","authors":"Wang Chunzhi, Jiang Wei, Chen Hong, Wei Luo, H. Fang","doi":"10.1109/ICCSE.2010.5593400","DOIUrl":"https://doi.org/10.1109/ICCSE.2010.5593400","url":null,"abstract":"With the increasingly development of P2P in recent years, the operational mechanism of P2P application has varied, it's very difficult to distinguish P2P traffic from normal traffic by using single traffic characteristics. The paper put forward a method of P2P traffic identification based on multi-dimension characteristics. Extracting multi-dimension characteristics of P2P application such as ratio of UDP/TCP protocol packet, packet changing ratio, average data transmitting size and ratio of up/down traffic, to indentify P2P traffic under off line status by using decision tree. Test result indicated that P2P traffic in network could be effectively identified by using this method, with an accuracy over 97 percent.","PeriodicalId":377991,"journal":{"name":"2010 5th International Conference on Computer Science & Education","volume":"2 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123758617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The research on index system optimization of graduation design based on Cronbach coefficient 基于Cronbach系数的毕业设计指标体系优化研究
Pub Date : 2010-09-30 DOI: 10.1109/ICCSE.2010.5593808
Hong Yan, L. Yibing
In order to evaluate the graduation designs more objective and fair, take the scores of students majored in the same field as samples, the index system is analyzed by the method of Cronbach reliability coefficient. According to the results, countermeasures are brought forward to optimize the system and increase the reliability and validity.
为了更加客观公正地评价毕业设计,以同一专业学生的成绩为样本,采用Cronbach信度系数法对指标体系进行分析。根据研究结果,提出了优化系统、提高系统可靠性和有效性的对策。
{"title":"The research on index system optimization of graduation design based on Cronbach coefficient","authors":"Hong Yan, L. Yibing","doi":"10.1109/ICCSE.2010.5593808","DOIUrl":"https://doi.org/10.1109/ICCSE.2010.5593808","url":null,"abstract":"In order to evaluate the graduation designs more objective and fair, take the scores of students majored in the same field as samples, the index system is analyzed by the method of Cronbach reliability coefficient. According to the results, countermeasures are brought forward to optimize the system and increase the reliability and validity.","PeriodicalId":377991,"journal":{"name":"2010 5th International Conference on Computer Science & Education","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125340491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Research on application of Netlink socket communication in linux IPSec support mechanism Netlink套接字通信在linux IPSec支持机制中的应用研究
Pub Date : 2010-09-30 DOI: 10.1109/ICCSE.2010.5593459
Zhou-jun Li, Tan Fang-yong, Gao Xiao-hui
As a comparatively new IPC, Netlink socket has its own predominance in the communication between user process and kernel space. This paper has analyzed the application of Netlink socket in the IPSec support mechanism, summarized the Netlink socket message supported by kernel IPSec module, implemented the IPSec configuration with Netlink sockets.
Netlink套接字作为一种较新的IPC,在用户进程与内核空间之间的通信中有其独特的优势。本文分析了Netlink套接字在IPSec支持机制中的应用,总结了内核IPSec模块支持的Netlink套接字消息,实现了使用Netlink套接字进行IPSec配置。
{"title":"Research on application of Netlink socket communication in linux IPSec support mechanism","authors":"Zhou-jun Li, Tan Fang-yong, Gao Xiao-hui","doi":"10.1109/ICCSE.2010.5593459","DOIUrl":"https://doi.org/10.1109/ICCSE.2010.5593459","url":null,"abstract":"As a comparatively new IPC, Netlink socket has its own predominance in the communication between user process and kernel space. This paper has analyzed the application of Netlink socket in the IPSec support mechanism, summarized the Netlink socket message supported by kernel IPSec module, implemented the IPSec configuration with Netlink sockets.","PeriodicalId":377991,"journal":{"name":"2010 5th International Conference on Computer Science & Education","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125380917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2010 5th International Conference on Computer Science & Education
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1