Pub Date : 2011-07-15DOI: 10.1109/ICSESS.2011.5982281
Weimin Ma, Wenwen Yue
Bullwhip effect increases instability of supply inventory management and leads to a high fluctuation in the demand of products. This article examines how information sharing reduces the bullwhip effect and then introduces the utility theory to design an incentive mechanism.
{"title":"Notice of RetractionA study of incentive mechanism to weaken bullwhip effect of supply chains","authors":"Weimin Ma, Wenwen Yue","doi":"10.1109/ICSESS.2011.5982281","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982281","url":null,"abstract":"Bullwhip effect increases instability of supply inventory management and leads to a high fluctuation in the demand of products. This article examines how information sharing reduces the bullwhip effect and then introduces the utility theory to design an incentive mechanism.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114160676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Network coding provides a powerful mechanism for improving performance of wireless networks. In this paper, we study the effects of MAC protocols on the performance of wireless network coding. To model the MAC protocols, we introduce the dummy topology graph (DTG) of a wireless network that can properly describe the broadcast property of wireless channels. Based on the DTG, we derive theoretical formulations for computing the end-to-end delay of flows using the theory of network calculus. Numerical results show that the fairness of the MAC protocols can help to improve the performance of wireless network coding.
{"title":"Effects of MAC protocols on the performance of wireless network coding","authors":"Huanzhong Li, Wei Yang, Quanyou Feng, Wenhua Dou, Lianyong Dong","doi":"10.1109/ICSESS.2011.5982371","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982371","url":null,"abstract":"Network coding provides a powerful mechanism for improving performance of wireless networks. In this paper, we study the effects of MAC protocols on the performance of wireless network coding. To model the MAC protocols, we introduce the dummy topology graph (DTG) of a wireless network that can properly describe the broadcast property of wireless channels. Based on the DTG, we derive theoretical formulations for computing the end-to-end delay of flows using the theory of network calculus. Numerical results show that the fairness of the MAC protocols can help to improve the performance of wireless network coding.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122307047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-07-15DOI: 10.1109/ICSESS.2011.5982477
Niu Dong-xiao, Ji Ling, Tian Jie
From the practical application of short-term load forecasting, this article introduced the radial basis function network and use nearest neighbor clustering algorithm to determine the width of radial basis function, select the cluster centers and weights. The predicted results show that the method is faster and has higher precision.
{"title":"Improved RBF network applied to short-term load forecasting","authors":"Niu Dong-xiao, Ji Ling, Tian Jie","doi":"10.1109/ICSESS.2011.5982477","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982477","url":null,"abstract":"From the practical application of short-term load forecasting, this article introduced the radial basis function network and use nearest neighbor clustering algorithm to determine the width of radial basis function, select the cluster centers and weights. The predicted results show that the method is faster and has higher precision.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122824346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-07-15DOI: 10.1109/ICSESS.2011.5982266
Hong-zuo Lin
The forms of Chinese classic poetry have been developed through thousands years of history and are still current in today's poetry society. A re-classification of the rhyming words, however, is necessary to keep the classic poetry up to date in the new settings of modern Chinese language. In order to maintain the continuation of the poetry forms, computing technology can be used to help the readers as well as poetry writers to check the compliance of poems in accordance to the forms and composite poems without the effort to learn the old grouping of rhyming words. This work will help revive Chinese classic poetry in modern society and promote its writability.
{"title":"The design of a Chinese classic poetry wizard","authors":"Hong-zuo Lin","doi":"10.1109/ICSESS.2011.5982266","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982266","url":null,"abstract":"The forms of Chinese classic poetry have been developed through thousands years of history and are still current in today's poetry society. A re-classification of the rhyming words, however, is necessary to keep the classic poetry up to date in the new settings of modern Chinese language. In order to maintain the continuation of the poetry forms, computing technology can be used to help the readers as well as poetry writers to check the compliance of poems in accordance to the forms and composite poems without the effort to learn the old grouping of rhyming words. This work will help revive Chinese classic poetry in modern society and promote its writability.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122970629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-07-15DOI: 10.1109/ICSESS.2011.5982283
Liu Na, L. Jianping, Cai Chaoshi
Bit-interleaved coded modulation with iterative decoding (BICM-ID) is a spectral efficient coding technique. The technique is therefore very attractive for next generation of wireless communication. It has been shown that when interleaver and error-control code are fixed, symbol mapping which defined by the signal constellation and the bit labeling has a critical influence on the error performance of BICM-ID. An improved mapping which combines two QPSK with different radius can achieve excellent performance under high SNR but has adverse property at low SNR. This paper presents an adaptive symbol mapping scheme which respectively employs Gray and the improved mapping at different SNR regions to improve the performance at low SNR. Simulation results confirm that the adaptive mapping scheme can not only gets excellent performance at high SNR, but also outperforms the performance under low SNR of the improved mapping and be similar with Gray.
{"title":"An adaptive symbol mapping on 8-ary constellation for BICM-ID","authors":"Liu Na, L. Jianping, Cai Chaoshi","doi":"10.1109/ICSESS.2011.5982283","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982283","url":null,"abstract":"Bit-interleaved coded modulation with iterative decoding (BICM-ID) is a spectral efficient coding technique. The technique is therefore very attractive for next generation of wireless communication. It has been shown that when interleaver and error-control code are fixed, symbol mapping which defined by the signal constellation and the bit labeling has a critical influence on the error performance of BICM-ID. An improved mapping which combines two QPSK with different radius can achieve excellent performance under high SNR but has adverse property at low SNR. This paper presents an adaptive symbol mapping scheme which respectively employs Gray and the improved mapping at different SNR regions to improve the performance at low SNR. Simulation results confirm that the adaptive mapping scheme can not only gets excellent performance at high SNR, but also outperforms the performance under low SNR of the improved mapping and be similar with Gray.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131238343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-07-15DOI: 10.1109/ICSESS.2011.5982378
Hongchang Zhang, Shujuan Jiang, Rong Jin
In order to improve the accuracy of the static program slicing which is used to locate the faults that cause an exception, we propose a new approach that uses the stack trace which is stored when an exception occurred. The proposed approach consists of three steps. First, it uses stack trace to infer the execution trace and figure out those methods and statements that have not been ever executed. Then, these methods which are not executed will be ignored when building the system dependence graph. Finally, the accurate slice will be got by adopting the improved program slicing algorithm. We perform an empirical study of our new approach by using four reported bugs of open-source project Ant. And the result shows that using our approach the slice is 8 percent less than using the general static program slicing algorithm on average.
{"title":"An improved static program slicing algorithm using stack trace","authors":"Hongchang Zhang, Shujuan Jiang, Rong Jin","doi":"10.1109/ICSESS.2011.5982378","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982378","url":null,"abstract":"In order to improve the accuracy of the static program slicing which is used to locate the faults that cause an exception, we propose a new approach that uses the stack trace which is stored when an exception occurred. The proposed approach consists of three steps. First, it uses stack trace to infer the execution trace and figure out those methods and statements that have not been ever executed. Then, these methods which are not executed will be ignored when building the system dependence graph. Finally, the accurate slice will be got by adopting the improved program slicing algorithm. We perform an empirical study of our new approach by using four reported bugs of open-source project Ant. And the result shows that using our approach the slice is 8 percent less than using the general static program slicing algorithm on average.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122899949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-07-15DOI: 10.1109/ICSESS.2011.5982257
Zhaojuan Yue, Yongmao Ren, Jun Li
The emergence of high speed long distance networks has promoted the development of various e-science applications. The traditional TCP protocol is not suitable for high bandwidth-delay product networks because of its conservative Additive Increase Multiplicative Decrease (AIMD) congestion control algorithm and slow start strategy. This paper mainly introduces four kinds of typical UDP-based high speed transport protocols (RUBDP, Tsunami, UDT, and PA-UDP). By experiments on the test bed with end-to-end transport mode, the influence of the file size, loss ratio and RTT to the performance of the four protocols is evaluated. And, the intra-protocol fairness and inter-protocol fairness while transferring multiple parallel flows are also evaluated. The results show: PA-UDP protocol has the best transport performance; UDT protocol is the most convenient, because it does not require the users to set the initial sending rate, buffer size and other parameters.
{"title":"Performance evaluation of UDP-based high-speed transport protocols","authors":"Zhaojuan Yue, Yongmao Ren, Jun Li","doi":"10.1109/ICSESS.2011.5982257","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982257","url":null,"abstract":"The emergence of high speed long distance networks has promoted the development of various e-science applications. The traditional TCP protocol is not suitable for high bandwidth-delay product networks because of its conservative Additive Increase Multiplicative Decrease (AIMD) congestion control algorithm and slow start strategy. This paper mainly introduces four kinds of typical UDP-based high speed transport protocols (RUBDP, Tsunami, UDT, and PA-UDP). By experiments on the test bed with end-to-end transport mode, the influence of the file size, loss ratio and RTT to the performance of the four protocols is evaluated. And, the intra-protocol fairness and inter-protocol fairness while transferring multiple parallel flows are also evaluated. The results show: PA-UDP protocol has the best transport performance; UDT protocol is the most convenient, because it does not require the users to set the initial sending rate, buffer size and other parameters.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122900163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-07-15DOI: 10.1109/ICSESS.2011.5982357
Baofeng Zhang, Kuigang Zhang, Junchao Zhu, Xinzhi Li
TMS320DM642(DM642) is a widely used digital media DSP chip. As with no Universal Asynchronous Receiver/Transmitter(UART) provided, it is difficult to communicate with other UART devices,especially in wireless video surveillance system.This paper uses on-chip multichannel buffered serial port(McBSP) and enhanced direct memory access(EDMA) to implement UART function based on DM642 and wireless communication module LC6311. The initialization of the McBSP and the data coding/decoding inprocess of transmitting/receiving are discussed in detail.This method can implement the communication between DM642 and LC6311 with easy program flow and no other devices. It enriches interface function of the DM642 and provides a new interface design for wireless video monitoring system.
{"title":"UART interface design based on DM642 video surveillance system and wireless network module","authors":"Baofeng Zhang, Kuigang Zhang, Junchao Zhu, Xinzhi Li","doi":"10.1109/ICSESS.2011.5982357","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982357","url":null,"abstract":"TMS320DM642(DM642) is a widely used digital media DSP chip. As with no Universal Asynchronous Receiver/Transmitter(UART) provided, it is difficult to communicate with other UART devices,especially in wireless video surveillance system.This paper uses on-chip multichannel buffered serial port(McBSP) and enhanced direct memory access(EDMA) to implement UART function based on DM642 and wireless communication module LC6311. The initialization of the McBSP and the data coding/decoding inprocess of transmitting/receiving are discussed in detail.This method can implement the communication between DM642 and LC6311 with easy program flow and no other devices. It enriches interface function of the DM642 and provides a new interface design for wireless video monitoring system.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124428666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-07-15DOI: 10.1109/ICSESS.2011.5982240
Quanhui Jia, Lieli Liu
Quality and safety of consumer products have drawn wide attention from scholars in related domain, this issue is based on the subject of the quality and safety of consumer goods, in accordance with characteristics of cases, and put forward a hierarchical support vector machine classification algorithm based on the relative separability of the feature space, to solve the low classification performance and high rate of misclassification of the existing algorithms. The weight of Binary Search Tree is the separability of samples, determining the order of categories by a selective set of training samples to construct SVM classifier and the final formation of a binary classification of the larger interval multi-valued SVM classifier tree. Simulation results show that the method has a faster test speed, relatively perfect good classification accuracy and generalization performance.
{"title":"BS-SVM multi-classification model in the application of consumer goods","authors":"Quanhui Jia, Lieli Liu","doi":"10.1109/ICSESS.2011.5982240","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982240","url":null,"abstract":"Quality and safety of consumer products have drawn wide attention from scholars in related domain, this issue is based on the subject of the quality and safety of consumer goods, in accordance with characteristics of cases, and put forward a hierarchical support vector machine classification algorithm based on the relative separability of the feature space, to solve the low classification performance and high rate of misclassification of the existing algorithms. The weight of Binary Search Tree is the separability of samples, determining the order of categories by a selective set of training samples to construct SVM classifier and the final formation of a binary classification of the larger interval multi-valued SVM classifier tree. Simulation results show that the method has a faster test speed, relatively perfect good classification accuracy and generalization performance.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129003764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-07-15DOI: 10.1109/ICSESS.2011.5982482
Feng Tian, Youwei Zhang, Dengwei Ma
The concealing of binary code is a key technology in the field of information security. Through in-depth study of this technology, it can not only provide theoretical support for detection of malicious code, but also play a role in promoting the development of network attack techniques. We combine the technology of equal transposition with the character concealing of binary code and achieve the target of character concealing by researching the technology of binary code's equal transposition. At the same time, we build a prototype system which plays perfectly in character concealing after a relevant test.
{"title":"Research on the technology of concealing the character of binary codes based on equal transposition","authors":"Feng Tian, Youwei Zhang, Dengwei Ma","doi":"10.1109/ICSESS.2011.5982482","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982482","url":null,"abstract":"The concealing of binary code is a key technology in the field of information security. Through in-depth study of this technology, it can not only provide theoretical support for detection of malicious code, but also play a role in promoting the development of network attack techniques. We combine the technology of equal transposition with the character concealing of binary code and achieve the target of character concealing by researching the technology of binary code's equal transposition. At the same time, we build a prototype system which plays perfectly in character concealing after a relevant test.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"288 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129126977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}