Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479434
Ping Wang, Bin Wang, Liang Li, Aihua Chen
This paper discusses the key technique of finite element modeling for complex precision forging part, which includes geometrical modeling, element type selecting, element meshing and remeshing, material model selecting, friction model definition and contact problem, In addition, the particular application of complex precision forging part in precision forming finite element modeling was shown combined with Hooke's Joint. Finally the main problems being studied subsequently of the finite element modeling for complex precision forging part were also presented.
{"title":"Research on finite element modeling technique of precision forming simulation for complex precision forging part","authors":"Ping Wang, Bin Wang, Liang Li, Aihua Chen","doi":"10.1109/ICNDS.2010.5479434","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479434","url":null,"abstract":"This paper discusses the key technique of finite element modeling for complex precision forging part, which includes geometrical modeling, element type selecting, element meshing and remeshing, material model selecting, friction model definition and contact problem, In addition, the particular application of complex precision forging part in precision forming finite element modeling was shown combined with Hooke's Joint. Finally the main problems being studied subsequently of the finite element modeling for complex precision forging part were also presented.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"36 8-12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122124880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479431
Yuge Zheng, Ying Wang
In this paper, the edge-friendly and the edges-balance index set are defined, the edges-balance index set of Cn × P2 (n ≡ 0,1(mod 4))and a structural method of graphs are researched.
{"title":"On the edge-balance index sets of Cn × P2","authors":"Yuge Zheng, Ying Wang","doi":"10.1109/ICNDS.2010.5479431","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479431","url":null,"abstract":"In this paper, the edge-friendly and the edges-balance index set are defined, the edges-balance index set of C<inf>n</inf> × P<inf>2</inf> (n ≡ 0,1(mod 4))and a structural method of graphs are researched.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128705318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents the design and implementation on a new architecture of broadband network system which suitable for asymmetric digital subscriber line (ADSL) application. The main design skill is based on the cell-based digital IC design process, and is implemented in 0.18 µm 1P6M CMOS process. The main function of this chip is to build a bridge between Ethernet and ATM which is used to substitute for RISC processor, leading to enhance the broadband network switching ability and stability. Furthermore, the clock management system is adopted to manage the packages. By this technique, a small size and low cost chip will be obtained.
{"title":"A new architecture of broadband network system suitable for asymmetric digital subscriber line application","authors":"Guo-Ming Sung, Yen-Tang Chang, Wen-Huei Chen, Hsiang-Yuan Hsieh","doi":"10.1109/ICNDS.2010.5479285","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479285","url":null,"abstract":"This paper presents the design and implementation on a new architecture of broadband network system which suitable for asymmetric digital subscriber line (ADSL) application. The main design skill is based on the cell-based digital IC design process, and is implemented in 0.18 µm 1P6M CMOS process. The main function of this chip is to build a bridge between Ethernet and ATM which is used to substitute for RISC processor, leading to enhance the broadband network switching ability and stability. Furthermore, the clock management system is adopted to manage the packages. By this technique, a small size and low cost chip will be obtained.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126754435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479153
Yongchang Ren, Tao Xing, Guanghui Cao, E. Xu, Xiaoji Chen
Trojan is a Trojan horse hiding technology, one of the key technologies, directly determine the viability of Trojan horses. This paper describes the current commonly used Trojan horse hiding technology, the traditional implementation method Trojan hidden lack of independence, according to concerted hidden thought, given the four threading model under Windows systems and their specific implementation method to explain the problems encountered in the implementation process and solution approach. In response to the four further threading model is just to restore the initial state of the shortcomings of the passive given extension model. Experiments show that the four threads together more independent thought hidden Trojan horse has a better prospect.
{"title":"Research and practice on the cooperative concealing technology of Trojan horses","authors":"Yongchang Ren, Tao Xing, Guanghui Cao, E. Xu, Xiaoji Chen","doi":"10.1109/ICNDS.2010.5479153","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479153","url":null,"abstract":"Trojan is a Trojan horse hiding technology, one of the key technologies, directly determine the viability of Trojan horses. This paper describes the current commonly used Trojan horse hiding technology, the traditional implementation method Trojan hidden lack of independence, according to concerted hidden thought, given the four threading model under Windows systems and their specific implementation method to explain the problems encountered in the implementation process and solution approach. In response to the four further threading model is just to restore the initial state of the shortcomings of the passive given extension model. Experiments show that the four threads together more independent thought hidden Trojan horse has a better prospect.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123155127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479438
Benzhao Yang
Information sharing is a new service mode originated from academic libraries in the United States in the 1990s. Having analyzed the causes of low level of technological innovation in universities from information sharing perspective, the paper suggests constructing a information sharing platform of technological innovation achievements on the basis of service science and knowledge sharing. Moreover, the author approaches a subject on building a new information sharing mode, which is market-oriented, research-based, product-linked and innovation-aimed. This mode is also expected to provide special knowledge products and services.
{"title":"Design concept on information sharing platform of technological innovation","authors":"Benzhao Yang","doi":"10.1109/ICNDS.2010.5479438","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479438","url":null,"abstract":"Information sharing is a new service mode originated from academic libraries in the United States in the 1990s. Having analyzed the causes of low level of technological innovation in universities from information sharing perspective, the paper suggests constructing a information sharing platform of technological innovation achievements on the basis of service science and knowledge sharing. Moreover, the author approaches a subject on building a new information sharing mode, which is market-oriented, research-based, product-linked and innovation-aimed. This mode is also expected to provide special knowledge products and services.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"568 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120876728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479297
Lei Fu, Li Shi, Ying Yang, Bengong Yu
The selection of project management (PM) software is a complex issue and has significant impacts to the efficiency of the automobile research & development (R&D) process. Given two alternatives based on critical path method (CPM) and critical chain project management (CCPM) respectively, decision-makers usually cause confusion. This paper analyzed the characteristic of automobile R&D project and developed an evaluation model based on the fuzzy analytic hierarchy process (FAHP) and fuzzy multiple criteria decision making (FMCDM) methods, which can help the managers in automobile industry to select more appropriate software in the course of product R&D. In particular, the FAHP method is used to obtain the weights of evaluation criteria, and the FMCDM method is used to determine the final rank of the software. The uncertainty and vagueness in evaluation procedure were presented as the fuzzy triangular numbers. The proposed method is applied to the case study of evaluating the performance of PM software based on CPM and CCPM respectively for a car manufacturer. The result of evaluation not only assisted managers in choosing suitable software but also outline the trend in development of CCPM software.
{"title":"The selection of project management software by FAHP and FMCDM in automobile R&D process","authors":"Lei Fu, Li Shi, Ying Yang, Bengong Yu","doi":"10.1109/ICNDS.2010.5479297","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479297","url":null,"abstract":"The selection of project management (PM) software is a complex issue and has significant impacts to the efficiency of the automobile research & development (R&D) process. Given two alternatives based on critical path method (CPM) and critical chain project management (CCPM) respectively, decision-makers usually cause confusion. This paper analyzed the characteristic of automobile R&D project and developed an evaluation model based on the fuzzy analytic hierarchy process (FAHP) and fuzzy multiple criteria decision making (FMCDM) methods, which can help the managers in automobile industry to select more appropriate software in the course of product R&D. In particular, the FAHP method is used to obtain the weights of evaluation criteria, and the FMCDM method is used to determine the final rank of the software. The uncertainty and vagueness in evaluation procedure were presented as the fuzzy triangular numbers. The proposed method is applied to the case study of evaluating the performance of PM software based on CPM and CCPM respectively for a car manufacturer. The result of evaluation not only assisted managers in choosing suitable software but also outline the trend in development of CCPM software.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116279372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479204
Zheng Yanlin, Ling Luyi, Zheng Fanglin
A technology-mediated learning space is not a technology-shielded island. Technologies may promise to facilitate human learning, but should never detach learning from social context. Computer-mediated communication (CMC) has created new opportunities for synchronous and asynchronous collaborative learning among geographically dispersed individuals. This study especially explores four social considerations in Computer-supported collaborative learning (CSCL), including roles, trust, nimbus, and interpersonal familiarity.
{"title":"Social context for Computer-supported Collaborative Learning","authors":"Zheng Yanlin, Ling Luyi, Zheng Fanglin","doi":"10.1109/ICNDS.2010.5479204","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479204","url":null,"abstract":"A technology-mediated learning space is not a technology-shielded island. Technologies may promise to facilitate human learning, but should never detach learning from social context. Computer-mediated communication (CMC) has created new opportunities for synchronous and asynchronous collaborative learning among geographically dispersed individuals. This study especially explores four social considerations in Computer-supported collaborative learning (CSCL), including roles, trust, nimbus, and interpersonal familiarity.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121556585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479445
Wen Shiyan
Teaching method is the means and ways to implement the task of teaching. The purpose of this study is to select the appropriate teaching methods for a newly developed school-based curriculum Introduction to Zhejiang Business Culture. A validated and reliable self-administered questionnaire developed by the investigators was used in the study. 70 students from Zhejiang Economic & Trade Polytechnic were chosen as samples randomly. It was emphasized that participation was voluntary, and respondent confidentiality was assured. Results shows majority of students believe that visits to businesses, real circumstance training, and group discussion may work well. Questionnaire results also indicated that the examination form should be flexible. In stead of the solely writing examination, the performance of students in the discussions and training should be given full consideration and appropriate rating. Flexible teaching methods can stimulate student's passion for learning, develop their independent problem-solving skills, and markedly increase the student's satisfaction to the curriculum.
{"title":"Teaching methods for a school-based curriculum","authors":"Wen Shiyan","doi":"10.1109/ICNDS.2010.5479445","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479445","url":null,"abstract":"Teaching method is the means and ways to implement the task of teaching. The purpose of this study is to select the appropriate teaching methods for a newly developed school-based curriculum Introduction to Zhejiang Business Culture. A validated and reliable self-administered questionnaire developed by the investigators was used in the study. 70 students from Zhejiang Economic & Trade Polytechnic were chosen as samples randomly. It was emphasized that participation was voluntary, and respondent confidentiality was assured. Results shows majority of students believe that visits to businesses, real circumstance training, and group discussion may work well. Questionnaire results also indicated that the examination form should be flexible. In stead of the solely writing examination, the performance of students in the discussions and training should be given full consideration and appropriate rating. Flexible teaching methods can stimulate student's passion for learning, develop their independent problem-solving skills, and markedly increase the student's satisfaction to the curriculum.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"315 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127702145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479306
Leijun Sun, Wei Chen, Qiuyuan Huang, Chao-Ying Ma
Being different from general continual-data stream BER tester, the receiver of burst-mode BER tester is required to extract clock and recover data accurately from the incoming datasteam characterized by phase variation within a dozen bits time before error bits detection is conducted, moreover, while error bits detecting, the receiver should filter the preamble and delimiter and execute error bits statistic only for Payload. In this paper a design method for Burst-mode BER Tester Based on FPGA is put forward. First of all, the whole structure of this design is introduced, and then the logic function modules implemented in the FPGA and system control program are presented in detail separately. The experimental results of applying this test equipment to 1.25G burst-mode optical receiver in GPON system illustrate that it has good performance and practical value.
{"title":"Design of high speed burst-mode BERT based on FPGA","authors":"Leijun Sun, Wei Chen, Qiuyuan Huang, Chao-Ying Ma","doi":"10.1109/ICNDS.2010.5479306","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479306","url":null,"abstract":"Being different from general continual-data stream BER tester, the receiver of burst-mode BER tester is required to extract clock and recover data accurately from the incoming datasteam characterized by phase variation within a dozen bits time before error bits detection is conducted, moreover, while error bits detecting, the receiver should filter the preamble and delimiter and execute error bits statistic only for Payload. In this paper a design method for Burst-mode BER Tester Based on FPGA is put forward. First of all, the whole structure of this design is introduced, and then the logic function modules implemented in the FPGA and system control program are presented in detail separately. The experimental results of applying this test equipment to 1.25G burst-mode optical receiver in GPON system illustrate that it has good performance and practical value.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125591741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479370
Lu Guang, Luo Guoming, Zeng Fan, Pan Jia
After evolution for decades, Large bandwidth-delay product became to an obvious character of internet. the content it transfers has changed profoundly too. This changes brought the developments of congestion control technology. In this article, the study on congestion control in internet were divided into congestion control based on measurement, improvement on AIMD mathematic models and congestion control based on control theory. The actuality and development of current congestion control studies were summarized in the three sorts. Finally the emphases and directions for further study were proposed.
{"title":"Study on congestion control in internet","authors":"Lu Guang, Luo Guoming, Zeng Fan, Pan Jia","doi":"10.1109/ICNDS.2010.5479370","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479370","url":null,"abstract":"After evolution for decades, Large bandwidth-delay product became to an obvious character of internet. the content it transfers has changed profoundly too. This changes brought the developments of congestion control technology. In this article, the study on congestion control in internet were divided into congestion control based on measurement, improvement on AIMD mathematic models and congestion control based on control theory. The actuality and development of current congestion control studies were summarized in the three sorts. Finally the emphases and directions for further study were proposed.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115904867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}