Pub Date : 2009-12-28DOI: 10.1109/CISE.2009.5363710
Chunyan Han, Wenting Cai, Guangyi Wang
This paper presents a method for generating chaotic pseudo random (PR) sequence, which uses a novel threedimensional (3-D) chaotic system and can generate both digital chaotic PN sequences and continuous time chaotic noise signals. This technique is derived from the idea of combining DSP Builder tool with Matlab/Simulink and Quartus II software and is based on the direct discreteness and quantization of the 3-D continuous chaotic system and FPGA (field programmable gate array). This technique guarantees the generation of repeatable consistent sequences based only on the initial conditions. Furthermore, the resulting continuous time chaotic noise signals do not suffer from parameter mismatches of an analog circuit. The proposed PR sequence generator is subjected to five basic statistical tests using the well-known tests suites FIPS-140–1. The proposed PR sequence generator successfully passes all five basic statistical tests. Keywords-chaos; PR sequence; simulation; experiment
{"title":"Study on Simulation and Experiment of Chaotic PR Sequence","authors":"Chunyan Han, Wenting Cai, Guangyi Wang","doi":"10.1109/CISE.2009.5363710","DOIUrl":"https://doi.org/10.1109/CISE.2009.5363710","url":null,"abstract":"This paper presents a method for generating chaotic pseudo random (PR) sequence, which uses a novel threedimensional (3-D) chaotic system and can generate both digital chaotic PN sequences and continuous time chaotic noise signals. This technique is derived from the idea of combining DSP Builder tool with Matlab/Simulink and Quartus II software and is based on the direct discreteness and quantization of the 3-D continuous chaotic system and FPGA (field programmable gate array). This technique guarantees the generation of repeatable consistent sequences based only on the initial conditions. Furthermore, the resulting continuous time chaotic noise signals do not suffer from parameter mismatches of an analog circuit. The proposed PR sequence generator is subjected to five basic statistical tests using the well-known tests suites FIPS-140–1. The proposed PR sequence generator successfully passes all five basic statistical tests. Keywords-chaos; PR sequence; simulation; experiment","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122167309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the increasing complexity of embedded systems, Component-Based Software Development (CBSD) is regarded as a beneficial approach for embedded systems. For component technology, applications are built by assembling interacting components and interfaces are the means by which components interact. Embedded systems are usually safety-critical applications. There is a real need for clear and sound definition of operational semantics for the composition of components such that they may be used to direct the construction of the desired system and help to make analysis of behaviors and properties. This paper describes the composition semantics of component-based embedded software architecture in terms of the Communicating Sequential Language (CSP). Three types of interfaces: procedure call, data access and event are classified. And the composition semantics for each type is presented. The overall objective is to provide a soundly based notation for specifying and verifying embedded software architectures.
{"title":"Composition Semantics for Component-Based Embedded Software","authors":"Changde Li, Xingshe Zhou, Tengteng Zhang, Dong Yunwei","doi":"10.1109/CISE.2009.5367025","DOIUrl":"https://doi.org/10.1109/CISE.2009.5367025","url":null,"abstract":"With the increasing complexity of embedded systems, Component-Based Software Development (CBSD) is regarded as a beneficial approach for embedded systems. For component technology, applications are built by assembling interacting components and interfaces are the means by which components interact. Embedded systems are usually safety-critical applications. There is a real need for clear and sound definition of operational semantics for the composition of components such that they may be used to direct the construction of the desired system and help to make analysis of behaviors and properties. This paper describes the composition semantics of component-based embedded software architecture in terms of the Communicating Sequential Language (CSP). Three types of interfaces: procedure call, data access and event are classified. And the composition semantics for each type is presented. The overall objective is to provide a soundly based notation for specifying and verifying embedded software architectures.","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122199561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-28DOI: 10.1109/CISE.2009.5367123
Kai Lin, Tongyang Liu, H. Ge
For the sake of avoiding the data abundance and balancing the energy consumption in wireless sensor networks, a data fusion clustering hierarchy based on data fusion (CHDF) is proposed. The clustering module and multi-hop tree are designed for data transmission. The result of simulation experiment shows that the proposed CHDF can balance energy consumption and prolong the lifetime of network.
{"title":"A Clustering Hierarchy Based on Data Fusion in Wireless Sensor Networks","authors":"Kai Lin, Tongyang Liu, H. Ge","doi":"10.1109/CISE.2009.5367123","DOIUrl":"https://doi.org/10.1109/CISE.2009.5367123","url":null,"abstract":"For the sake of avoiding the data abundance and balancing the energy consumption in wireless sensor networks, a data fusion clustering hierarchy based on data fusion (CHDF) is proposed. The clustering module and multi-hop tree are designed for data transmission. The result of simulation experiment shows that the proposed CHDF can balance energy consumption and prolong the lifetime of network.","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129825997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-28DOI: 10.1109/CISE.2009.5365751
Jibin Yin, Hua Liu
Pressure and strokes are the much natural input modalities from pens. This study investigates the potentials of coupling pressure and strokes with pen-based interactions by discussing the possible strategies of using them. Pressure can be used as discrete or continuous manners, which are explored by two presented techniques: two-layer operation and Pressure Cursor. An experiment was conduct to determine the pressure spectrum that can be controlled easily. There are two ways to employ strokes to produce a scalar value, which plays a parameter control role in pen-based interactions. The two mechanisms of using strokes to produce a value are examined, which are further demonstrated by a series of applied scenarios.
{"title":"Pen User Interactions Based on Pressure-Driven and Stroke-Driven Modes","authors":"Jibin Yin, Hua Liu","doi":"10.1109/CISE.2009.5365751","DOIUrl":"https://doi.org/10.1109/CISE.2009.5365751","url":null,"abstract":"Pressure and strokes are the much natural input modalities from pens. This study investigates the potentials of coupling pressure and strokes with pen-based interactions by discussing the possible strategies of using them. Pressure can be used as discrete or continuous manners, which are explored by two presented techniques: two-layer operation and Pressure Cursor. An experiment was conduct to determine the pressure spectrum that can be controlled easily. There are two ways to employ strokes to produce a scalar value, which plays a parameter control role in pen-based interactions. The two mechanisms of using strokes to produce a value are examined, which are further demonstrated by a series of applied scenarios.","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129874803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-28DOI: 10.1109/CISE.2009.5363320
Jun-lin Xie, Ling Qin, S. Mei, Zhengwen Zhang
In this paper, numerical simulation of co-combustion of coal and natural gas was carried out aiming at a rotary kiln in wulongquan limestone mine of WISCO. Combining the models of turbulent gas flow, gas-solid flow, heat and mass transfer and combustion of pulverized coal and natural gas, the temperature field, the species concentration field and the concentration of nitrogen oxides were displayed. The optimization approach was proposed by changing the excess air coefficient. The predicted results indicated that the excess air coefficient had great influence on flame temperature, flame length and the generation of NOX, while the generation of NOX was mainly connected with the temperature and oxygen concentration. All in all, the influence of the excess air coefficients on the combustion in the rotary kiln will provide important theoretical references to the optimized combustion of the co-combustion of coal and natural gas in the kiln.
{"title":"Numerical Simulation of Coal and Natural Gas Co-Combustion in a Rotary Kiln with Different Excess Air Coefficient","authors":"Jun-lin Xie, Ling Qin, S. Mei, Zhengwen Zhang","doi":"10.1109/CISE.2009.5363320","DOIUrl":"https://doi.org/10.1109/CISE.2009.5363320","url":null,"abstract":"In this paper, numerical simulation of co-combustion of coal and natural gas was carried out aiming at a rotary kiln in wulongquan limestone mine of WISCO. Combining the models of turbulent gas flow, gas-solid flow, heat and mass transfer and combustion of pulverized coal and natural gas, the temperature field, the species concentration field and the concentration of nitrogen oxides were displayed. The optimization approach was proposed by changing the excess air coefficient. The predicted results indicated that the excess air coefficient had great influence on flame temperature, flame length and the generation of NOX, while the generation of NOX was mainly connected with the temperature and oxygen concentration. All in all, the influence of the excess air coefficients on the combustion in the rotary kiln will provide important theoretical references to the optimized combustion of the co-combustion of coal and natural gas in the kiln.","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129951040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-28DOI: 10.1109/CISE.2009.5362973
Jing-ling Huang, Wei Zhang
In software engineering, formal software specification has long been touted as a way to increase the quality and reliability of software. At the same time, component-based development (CBD) is an important emerging topic, which aims to compose systems from prebuilt software units or components. How to formally represent the software components supporting the development of real-time application systems is the focus of this paper. For the purpose, this paper presents a reflective semantic model for real-time software component (RSM4RSC) as a formal approach to specify the reflective design of software components with timing constraints. Keywords-software engineering; software component; formal specification; reflection
{"title":"A Formal Approach to Specify the Reflective Design of Software Components with Timing Constraints","authors":"Jing-ling Huang, Wei Zhang","doi":"10.1109/CISE.2009.5362973","DOIUrl":"https://doi.org/10.1109/CISE.2009.5362973","url":null,"abstract":"In software engineering, formal software specification has long been touted as a way to increase the quality and reliability of software. At the same time, component-based development (CBD) is an important emerging topic, which aims to compose systems from prebuilt software units or components. How to formally represent the software components supporting the development of real-time application systems is the focus of this paper. For the purpose, this paper presents a reflective semantic model for real-time software component (RSM4RSC) as a formal approach to specify the reflective design of software components with timing constraints. Keywords-software engineering; software component; formal specification; reflection","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128313311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-28DOI: 10.1109/CISE.2009.5364907
Shengjun Xue, Xiangfeng Tang
The dynamic characteristic is one significant feature of modern workflow. In the dynamic workflow environment, workflow process is uncertain and can't be decided at once. In the workflow modeling stage, it is difficult to determine the task executors. Or executors should be assigned to the workflow task dynamically. So this paper does some research on dynamic workflow based on delegation authorization mechanism. Firstly , by analyzing workflow, the structure of dynamic workflow is given ,the relationship between tasks and executors and the organization/user model are focused; Then, with studying on delegation of Authorization, formal descriptions on delegation relationship, delegation chain are provided, delegation condition, delegation constraint, delegation revocation are defined; At last, the two of delegation authorization mechanism and dynamic workflow are combined to solve the task users assignation problem, the delegation authorization structure in the dynamic workflow environment is presented, and the process of deciding task users and the algorithm of delegation authorization are shown.
{"title":"Research on Dynamic Workflow Based on Delegation Authorization Mechanism","authors":"Shengjun Xue, Xiangfeng Tang","doi":"10.1109/CISE.2009.5364907","DOIUrl":"https://doi.org/10.1109/CISE.2009.5364907","url":null,"abstract":"The dynamic characteristic is one significant feature of modern workflow. In the dynamic workflow environment, workflow process is uncertain and can't be decided at once. In the workflow modeling stage, it is difficult to determine the task executors. Or executors should be assigned to the workflow task dynamically. So this paper does some research on dynamic workflow based on delegation authorization mechanism. Firstly , by analyzing workflow, the structure of dynamic workflow is given ,the relationship between tasks and executors and the organization/user model are focused; Then, with studying on delegation of Authorization, formal descriptions on delegation relationship, delegation chain are provided, delegation condition, delegation constraint, delegation revocation are defined; At last, the two of delegation authorization mechanism and dynamic workflow are combined to solve the task users assignation problem, the delegation authorization structure in the dynamic workflow environment is presented, and the process of deciding task users and the algorithm of delegation authorization are shown.","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128457937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-28DOI: 10.1109/CISE.2009.5366753
Xueli Liu, Jing Ping
Considering no very important passengers’ egergency, the existing elevator group control strategies all have their own disadvatages. In order to meet the VIP’s needs first, a new elevator group control strategy along with the conception of averge hall call waiting economy consumption (AHCWEC) are proposed. At the same time, an elevator system model based on passengers classifying is designed. After optimizing the elevator control algorithm and constructing the Synthetical Evaluation membership function, a simulating experiment is carried out. The experiment results show that the common passengers’ waiting time increase not too much, while the VIPs’ waiting time is cut down dramatically which proved the strategy’s validity and rationality. Keywordshall call waiting time; dispatching method; elevator group control; classification;
{"title":"A Strategy of Elevator Group Control Based on Passengers Classifying","authors":"Xueli Liu, Jing Ping","doi":"10.1109/CISE.2009.5366753","DOIUrl":"https://doi.org/10.1109/CISE.2009.5366753","url":null,"abstract":"Considering no very important passengers’ egergency, the existing elevator group control strategies all have their own disadvatages. In order to meet the VIP’s needs first, a new elevator group control strategy along with the conception of averge hall call waiting economy consumption (AHCWEC) are proposed. At the same time, an elevator system model based on passengers classifying is designed. After optimizing the elevator control algorithm and constructing the Synthetical Evaluation membership function, a simulating experiment is carried out. The experiment results show that the common passengers’ waiting time increase not too much, while the VIPs’ waiting time is cut down dramatically which proved the strategy’s validity and rationality. Keywordshall call waiting time; dispatching method; elevator group control; classification;","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128240094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-28DOI: 10.1109/CISE.2009.5362932
Tianbing Xu, Jie Chang, Zhikun Zhao, Ru-zhi Xu
An agent-based peer-to-peer style distributed component repository is proposed in this paper, which benefits from the experience of other research in the field of component repository, in order to solve the existing problems. The infrastructure of the agent-based peer-to-peer style distributed component repository is presented and a prototype system is implemented based on this architecture. This component repository can achieve the goal of information share of software component resources.
{"title":"An Agent-Based Peer-to-Peer Style Distributed Component Repository","authors":"Tianbing Xu, Jie Chang, Zhikun Zhao, Ru-zhi Xu","doi":"10.1109/CISE.2009.5362932","DOIUrl":"https://doi.org/10.1109/CISE.2009.5362932","url":null,"abstract":"An agent-based peer-to-peer style distributed component repository is proposed in this paper, which benefits from the experience of other research in the field of component repository, in order to solve the existing problems. The infrastructure of the agent-based peer-to-peer style distributed component repository is presented and a prototype system is implemented based on this architecture. This component repository can achieve the goal of information share of software component resources.","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129059439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-28DOI: 10.1109/CISE.2009.5366041
Huixing Sheng, Wei Zhang, Weiping Kong
This paper proposes a method for adaptive bit loading under the CSI gotten by the channel estimation based on the comb-pilot frequency insertion. The sub-carriers are divided into a few groups and the CSI based on the channel estimations are got by comb-pilot frequency to track the time-varying channel. It implements the bit loading algorithm. Sub-channel allocation and bit loading are separated under the MA optimization criterion to decrease the computation. The simulation results show that this algorithm can save more transmission power than the equal bit allocation algorithm of static sub-channel allocation methods. Keywords-Comb-pilot frequency; Channel Estimation; Subcarriers; Power Allocation
{"title":"Algorithm Analysis of Sub-Channel and Power Allocation for OFDM Systems Based on Comb-Pilot Frequency","authors":"Huixing Sheng, Wei Zhang, Weiping Kong","doi":"10.1109/CISE.2009.5366041","DOIUrl":"https://doi.org/10.1109/CISE.2009.5366041","url":null,"abstract":"This paper proposes a method for adaptive bit loading under the CSI gotten by the channel estimation based on the comb-pilot frequency insertion. The sub-carriers are divided into a few groups and the CSI based on the channel estimations are got by comb-pilot frequency to track the time-varying channel. It implements the bit loading algorithm. Sub-channel allocation and bit loading are separated under the MA optimization criterion to decrease the computation. The simulation results show that this algorithm can save more transmission power than the equal bit allocation algorithm of static sub-channel allocation methods. Keywords-Comb-pilot frequency; Channel Estimation; Subcarriers; Power Allocation","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129147976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}