[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/1726596guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
IFCSTA '09: Proceedings of the 2009 International Forum on Computer Science-Technology and Applications - Volume 02
2009 Proceeding
Publisher:
  • IEEE Computer Society
  • 1730 Massachusetts Ave., NW Washington, DC
  • United States
Conference:
December 25 - 27, 2009
ISBN:
978-0-7695-3930-0
Published:
25 December 2009

Reflects downloads up to 24 Dec 2024Bibliometrics
Abstract

No abstract available.

Article
Article
An Improved Support Vector Machine Based on Rough Set for Construction Cost Prediction

Evaluation of construction projects is an important task for management of construction projects. An accurate forecast is required to enable supporting the investment decision and to ensure the project’s feasible at the minimal cost. So controlling and ...

Article
Study on Location-Selection of B2C E-Commerce Logistics Distribution Center

Aiming at the higher and higher logistics’ distribution efficiency and the lower and lower overall transportation cost under E-commerce environment, this paper proposed a location-selection model of two-level logistics distribution mechanism. The firs-...

Article
The Realization of the CRC Arithmetic Which is Based on DSP

This paper puts forward the background of the CRC arithmetic by which it means how important the arithmetic can be in the field of the communication, tells us the principles of CRC arithmetic, introduces a kind of common ways about how to make the code ...

Article
Load Distribution of Thermal Power Plant Based on Adaptive Genetic Algorithm

Power plant is a huge industry to consume the resources. The annual coal consumption is more than half of the country’s consumption. It is very considerable to achieve a reasonable distribution of the load and the application of science and the ...

Article
Research on Database Storage of Large-Scale Terrestrial LIDAR Data

Generally speaking, a large number of point-cloud data will be generated in the process of collecting 3D structure information of large building using the 3D LIDAR technology. Based on analyzing raw files content and form 3D laser scanning point-cloud ...

Article
The Design and Implementation of Passwords Management System Based on Blowfish Cryptographic Algorithm

In modern society, especially on the Internet, you might have found you are having more and more usernames or IDs and passwords, which contains your private information. There are too many for you to remember and it is unsafe to write them down on you ...

Article
The Networking Technology within Smart Home System - ZigBee Technology

The establishment for internal communication network of Smart Home system includes a variety of ways such as wired, wireless and etc. Wireless network represents the development trend in home internal communication network. Among a series of network ...

Article
A Line Segments Approximation Algorithm of Grating Lines

A new fast line drawing algorithm that is different from the traditional Bresenham algorithm is presented in this paper. A line is treated as an aggregation of several line segments and the Y coordinate differences of candidate pixel points in every ...

Article
Research on Detection Technique of Multiple Moving Pedestrians in Sequence Image

This paper proposes one kind of multiple moving pedestrians' detection and recognition method in the driver assistance system which is based on the computer vision. Firstly, it uses the improved Consecutive Frames Subtraction to establish a background ...

Article
Application for Web Text Categorization Based on Support Vector Machine

This paper put forward a text categorization method based on Naive Bayes learning support vector machine. First adopt the text pre-processing. Then vector space model and linked list of technical are used to extract text features, reduce dimensions ...

Article
Secure Routing Protocol Base on Secure Path in Ad Hoc Wireless Networks

Ad hoc wireless networking is a new approach to wireless communication with potential applications in very unpredictable and dynamic environments. Many applications today, especially in military and emergency situations, are based upon ad hoc wireless ...

Article
A Novel Stream Cipher for Video Compressed by H.264

The characteristics of video data are very large amount and real time processing request, and H.264 is a high-complexity video compression standard, so a high speed arithmetic is needed for encrypting video data which is encoded by H.264 standard. But, ...

Article
Customization of Test Case Selection Based on Filtering Mechanism in JUnit

When building up software applications, huge amount of codes along with likewise multitude tests pile up. After slight changes occur to source codes, we would like to see if it goes right as we think running the relative tests. But the word “relative” ...

Article
Mining Safety Information Management System Based on B/S and C/S Mixed Code

According to the codes of Metallic and Nonmetallic Mine Safety Standardization, enterprise established the system of mining safety standardization. On the basis of this, mining safety information system based on b/s and c/s mined code was established. ...

Article
A Decision Support System Based on Support Vector Machine for Hard Landing of Civil Aircraft

Hard landing event affect the flight safety seriously. In this paper, a decision support system that classifiers the hard landing signals of the civil aircraft to two classes (normal and abnormal) is presented to support fault diagnosis. As our previous ...

Article
Improvement of Real-Time Performance of Linux 2.6 Kernel for Embedded Application

Embedded application is a hotspot at present and Linux gradually becomes the most important operating system for embedded applications. Aiming at the real-time problems of Linux and from five performance parameters of real-time operating system, this ...

Article
Motion Planning of Multi-joint Underactuated Manipulator Based on Trigonometric Function Input

Based on the characteristics of nonholonomic constraints and the principle of nonlinear control, this paper proposes a structural scheme of multi-joint underactuated manipulator and the method of chained form transformation. It also presents the design ...

Article
Registration for 3d Cadastre in China

In China, All land is owned by the State or by Collectives. Private person or entities have only land user, but not ownerships, and they have ownership to constructions on the land. The land usufruct registration and building ownership registration are ...

Article
A Stable and Unstable States Detection Method for Service Discovery

Service Discovery technologies were developed to fulfil the Pervasive Computing’s “disappearance”. In Pervasive Computing the courses of devices using Service Discovery Technologies have stable and unstable states, the existing Service Discovery ...

Article
Design and Implementation of Interactive 3D Scenes Based on Virtools

Virtools is a set of real-time 3D environment for Virtual Reality editing software. Virtools supports both scripting languages and SDK by providing a graphical development environment and more than 600 built-in Building Blocks. The article describes how ...

Article
Research of the Supplier Evaluation System in Electronic Government Procurement Based on Multiple Amended Weight Coefficient

Electronic government procurement has become a global inevitable trend of government procurement development. The supplier evaluation system in electronic government procurement can make the decision-makers take part in discussions and decision-making ...

Article
The Realization of Google Suggest in Mis System by Using Ajax

With the popularity of the Internet and the rapid development of information technology, web application has become an integral part of the information age. Ajax (Asynchronous JavaScript and XML) is a new interaction method between server and client ...

Article
An Enterprise Computing System Based on Software-Enrollment Strategy

This paper aims at the problem of software’s abuse in the computer system, and puts forward the “Software Registration” strategy in the context of enterprise networks and the computer systems within. Based on this strategy we have designed a computing ...

Article
Design and Full-Vehicle Tests of EPS Control System

In virtue of the development of power electronics technology, microcomputer control technology and motor control technology, Electric Power Steering (EPS) can markedly improve the automotive dynamic performance and static performance, enhance the driver’...

Index terms have been assigned to the content through auto-classification.
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations