首页 > 最新文献

2009 International Conference on Computational Intelligence and Software Engineering最新文献

英文 中文
Performance Analysis of Soft Handover Based on FFT in CDMA System 基于FFT的CDMA系统软切换性能分析
Zhi-qiang Zhu, Guang-yin Xu, Jianwei Lian, Junqiang Guo
Aiming at the multimedia services in the 3G and 4G CDMA mobile communication system, a soft handover model, in which an overlaid cellular architecture including one macrocell and seven microcells with video service, is given, and link equation of CDMA discrete system in frequency domain is established. Balancing the forward link and reverse link, adjusting the parameters such as the distance and direction between mobile station and base station, the relationship between the soft handover add threshold of marcocell system and the load factor of microcell system is analyzed quantitatively, and their corresponding performances are simulated in both time domain and frequecy domain. The results are shown: the variance of distance is more sensitive to the soft handover performance than the variance of direction does.
针对3G和4G CDMA移动通信系统中的多媒体业务,给出了具有视频业务的1个宏蜂窝和7个微蜂窝的覆盖蜂窝结构的软切换模型,建立了CDMA离散系统的频域链路方程。平衡正向链路和反向链路,调整移动站与基站之间的距离和方向等参数,定量分析了微蜂窝系统软切换添加阈值与微蜂窝系统负载因子的关系,并在时域和频域对其相应性能进行了仿真。结果表明:距离的变化比方向的变化对软切换性能更敏感。
{"title":"Performance Analysis of Soft Handover Based on FFT in CDMA System","authors":"Zhi-qiang Zhu, Guang-yin Xu, Jianwei Lian, Junqiang Guo","doi":"10.1109/CISE.2009.5362991","DOIUrl":"https://doi.org/10.1109/CISE.2009.5362991","url":null,"abstract":"Aiming at the multimedia services in the 3G and 4G CDMA mobile communication system, a soft handover model, in which an overlaid cellular architecture including one macrocell and seven microcells with video service, is given, and link equation of CDMA discrete system in frequency domain is established. Balancing the forward link and reverse link, adjusting the parameters such as the distance and direction between mobile station and base station, the relationship between the soft handover add threshold of marcocell system and the load factor of microcell system is analyzed quantitatively, and their corresponding performances are simulated in both time domain and frequecy domain. The results are shown: the variance of distance is more sensitive to the soft handover performance than the variance of direction does.","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123853422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on Modeling for Safety Evaluation System of Amusement Ride Based on Fuzzy Neural Network 基于模糊神经网络的游乐设施安全评价系统建模研究
Yong Shen, Yuan Xiao, J. Ye, J. Qian
According to the principles of fuzzy comprehensive evaluation and neural network, the calculation models of safety evaluation system of amusement ride were created. The requirements and functions of safe evaluating system of amusement ride based on fuzzy neural network were analyzed. The Use Case View was created with Unified Modeling Language. According to Model-View-Controller pattern, the classes were abstracted through analyzing system functions and workflows. The object sequence diagram was created according to fuzzy safety evaluation process, and the object sequence diagram of the optimizing process of weights with neural network was created. The system was developed with Visual C++6.0. The user interface of system is sample and easy to operate. Keywords-fuzzy evaluation; neural network; amusement ride; Unified Modeling Language
根据模糊综合评价和神经网络的原理,建立了游乐设施安全评价体系的计算模型。分析了基于模糊神经网络的游乐设施安全评价系统的要求和功能。用例视图是用统一建模语言创建的。根据模型-视图-控制器模式,通过对系统功能和工作流的分析,对类进行了抽象。根据模糊安全评价过程建立了目标序列图,利用神经网络建立了权重优化过程的目标序列图。该系统是用Visual c++ 6.0开发的。系统用户界面简洁,易于操作。Keywords-fuzzy评价;神经网络;的游乐设施;统一建模语言
{"title":"Research on Modeling for Safety Evaluation System of Amusement Ride Based on Fuzzy Neural Network","authors":"Yong Shen, Yuan Xiao, J. Ye, J. Qian","doi":"10.1109/CISE.2009.5365724","DOIUrl":"https://doi.org/10.1109/CISE.2009.5365724","url":null,"abstract":"According to the principles of fuzzy comprehensive evaluation and neural network, the calculation models of safety evaluation system of amusement ride were created. The requirements and functions of safe evaluating system of amusement ride based on fuzzy neural network were analyzed. The Use Case View was created with Unified Modeling Language. According to Model-View-Controller pattern, the classes were abstracted through analyzing system functions and workflows. The object sequence diagram was created according to fuzzy safety evaluation process, and the object sequence diagram of the optimizing process of weights with neural network was created. The system was developed with Visual C++6.0. The user interface of system is sample and easy to operate. Keywords-fuzzy evaluation; neural network; amusement ride; Unified Modeling Language","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123906617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Dynamic Trust Model Based on Recommendation Credibility in Grid Domain 基于网格域推荐可信度的动态信任模型
Wang Meng, Hongxia Xia, Huazhu Song
Grid is the next generation of Internet, and it has attracted the attentions of research communities recently. In practical applications, the nodes in the grid domain need to transact with other strange nodes to acquire the services provided by those nodes. Recently, trust has been recognized as an important factor for Grid security. And it is important for them to make a trust evaluation for those strange nodes before transactions, because some nodes are dishonest. Currently, the method to solve this problem is to establish an effective trust mechanism in grid domain based on reputation. However, there are still some disadvantages in existence in some cases, as the dynamicity of the grid environment, although it can be risk-averse to some extent. Like some malicious nodes contribute high trust value through numerous good interaction behaviors at first, and then change to attack. In view of those problems and disadvantages, this paper proposes a dynamic grid trust model based on recommendation credibility, called DyGridTrust (Dynamic Grid Trust Model). This model can distinguish honest and dishonest recommendation and adjust the weight of trust evaluation dynamically. In addition, this trust model is able to obtain the trust value more objectively, so as to enhance the security of the grid system. Finally, in this paper, those perspectives have been confirmed by simulations, which are developed by Matlab R2008a.
网格是下一代互联网,近年来引起了研究界的广泛关注。在实际应用中,网格域内的节点需要与其他陌生节点进行交易,以获取其他陌生节点提供的服务。近年来,信任已被认为是网格安全的一个重要因素。在交易前对这些陌生节点进行信任评估是很重要的,因为有些节点是不诚实的。目前解决这一问题的方法是在网格域建立基于信誉的有效信任机制。然而,在某些情况下仍然存在一些缺点,如网格环境的动态性,尽管它可以在一定程度上规避风险。如一些恶意节点最初通过大量良好的交互行为产生较高的信任值,然后转变为攻击。针对这些问题和不足,本文提出了一种基于推荐可信度的动态网格信任模型,称为DyGridTrust (dynamic grid trust model)。该模型能够区分诚信推荐和不诚信推荐,并动态调整信任评价权重。此外,该信任模型能够更客观地获得信任值,从而增强网格系统的安全性。最后,在本文中,通过Matlab R2008a开发的仿真验证了这些观点。
{"title":"A Dynamic Trust Model Based on Recommendation Credibility in Grid Domain","authors":"Wang Meng, Hongxia Xia, Huazhu Song","doi":"10.1109/CISE.2009.5363348","DOIUrl":"https://doi.org/10.1109/CISE.2009.5363348","url":null,"abstract":"Grid is the next generation of Internet, and it has attracted the attentions of research communities recently. In practical applications, the nodes in the grid domain need to transact with other strange nodes to acquire the services provided by those nodes. Recently, trust has been recognized as an important factor for Grid security. And it is important for them to make a trust evaluation for those strange nodes before transactions, because some nodes are dishonest. Currently, the method to solve this problem is to establish an effective trust mechanism in grid domain based on reputation. However, there are still some disadvantages in existence in some cases, as the dynamicity of the grid environment, although it can be risk-averse to some extent. Like some malicious nodes contribute high trust value through numerous good interaction behaviors at first, and then change to attack. In view of those problems and disadvantages, this paper proposes a dynamic grid trust model based on recommendation credibility, called DyGridTrust (Dynamic Grid Trust Model). This model can distinguish honest and dishonest recommendation and adjust the weight of trust evaluation dynamically. In addition, this trust model is able to obtain the trust value more objectively, so as to enhance the security of the grid system. Finally, in this paper, those perspectives have been confirmed by simulations, which are developed by Matlab R2008a.","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123932901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Application of MVP Architecture in Reengineering of Legacy Financial System MVP架构在遗留财务系统再造中的应用
Bo Wu, Xiaohu Yang
As the progress of information technology, some financial systems used for long time can no longer meet the requirement of customers in both user interface and business process, and need reengineering imminently. In order to save the human resource and financial effort, this article raises a reengineering approach by encapsulating the back-end data access code of legacy system and only refactoring the front-end user interface and business logic. In the reengineering work, this article uses MVP (Model-View-Presenter) Architecture. By extracting screen logic into Presenters, the display code in View is independent from logic code in Presenter. Also, the introduction of MVP Architecture greatly enhances the reusability and the testability of business logic code, and finally improves the efficiency of development and test work significantly.
随着信息技术的进步,一些长期使用的金融系统在用户界面和业务流程上已经不能满足客户的需求,迫切需要重新设计。为了节省人力资源和财务工作,本文提出了一种通过封装遗留系统的后端数据访问代码而只重构前端用户界面和业务逻辑的再工程方法。在再造工作中,本文使用MVP(模型-视图-演示者)体系结构。通过将屏幕逻辑提取到呈现器中,View中的显示代码独立于呈现器中的逻辑代码。同时,MVP架构的引入大大提高了业务逻辑代码的可重用性和可测试性,从而显著提高了开发和测试工作的效率。
{"title":"Application of MVP Architecture in Reengineering of Legacy Financial System","authors":"Bo Wu, Xiaohu Yang","doi":"10.1109/CISE.2009.5366503","DOIUrl":"https://doi.org/10.1109/CISE.2009.5366503","url":null,"abstract":"As the progress of information technology, some financial systems used for long time can no longer meet the requirement of customers in both user interface and business process, and need reengineering imminently. In order to save the human resource and financial effort, this article raises a reengineering approach by encapsulating the back-end data access code of legacy system and only refactoring the front-end user interface and business logic. In the reengineering work, this article uses MVP (Model-View-Presenter) Architecture. By extracting screen logic into Presenters, the display code in View is independent from logic code in Presenter. Also, the introduction of MVP Architecture greatly enhances the reusability and the testability of business logic code, and finally improves the efficiency of development and test work significantly.","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124175657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Density Function Estimation Based on SVM: An Application in Estimating Liquidity Risk in Stock Market 基于支持向量机的密度函数估计在股票市场流动性风险估计中的应用
Yiwen Yang, Chenxi Zhang
This paper presents a method to compute liquidity risk of stock market with model of VaR. Firstly, a measure for liquidity is defined, which reflects the volatility of return caused by unite ratio of the position to be liquidated to the tradable shares. Secondly, the density function of the measure for liquidity is estimated with support vector machine, with which the liquidity VaR of stocks is calculated. Finally, some stocks of Shanghai and Shenzhen stock markets are chosen, according to their tradable shares, to compute liquidity VaR. The results show that the liquidity VaR is bigger than the traditional VaR that is calculated without considering liquidity, which means the latter does underestimate the risk. Keywords-density function estimation; SVMg; liquidity risk; VaR
本文提出了一种用VaR模型计算股票市场流动性风险的方法。首先,定义了一个流动性度量,它反映了待平仓与流通股的统一比率所引起的收益波动。其次,利用支持向量机估计流动性测度的密度函数,计算股票的流动性VaR;最后,选取沪深两市的股票,根据其流通股来计算流动性VaR,结果表明,流动性VaR比传统的不考虑流动性的VaR要大,说明后者低估了风险。关键词:密度函数估计;SVMg;流动性风险;VaR
{"title":"Density Function Estimation Based on SVM: An Application in Estimating Liquidity Risk in Stock Market","authors":"Yiwen Yang, Chenxi Zhang","doi":"10.1109/CISE.2009.5362895","DOIUrl":"https://doi.org/10.1109/CISE.2009.5362895","url":null,"abstract":"This paper presents a method to compute liquidity risk of stock market with model of VaR. Firstly, a measure for liquidity is defined, which reflects the volatility of return caused by unite ratio of the position to be liquidated to the tradable shares. Secondly, the density function of the measure for liquidity is estimated with support vector machine, with which the liquidity VaR of stocks is calculated. Finally, some stocks of Shanghai and Shenzhen stock markets are chosen, according to their tradable shares, to compute liquidity VaR. The results show that the liquidity VaR is bigger than the traditional VaR that is calculated without considering liquidity, which means the latter does underestimate the risk. Keywords-density function estimation; SVMg; liquidity risk; VaR","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114117473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Noise Reduction Method of Web Pages Based on Image Features 基于图像特征的网页降噪方法
Haitao Yao, Zhiyi Yin, Fuxi Zhu, Changsheng Gong
Same layer webpage have similar presentation styles and noise blocks. The first step of data mining is to remove noise blocks from web pages. Different from traditional similarity measurement method based on DOM trees, a noise removal method based on image features is proposed in this paper. In this method, web pages are processed as images. And then, all of image features can be flexibly used as criteria to measure similarity of noise blocks. As a result, noise blocks and information blocks can be distinguished after measuring similarity, and the reduction of noise is realized. The results of experiment demonstrate that this method is accurate and reliable and it can support joint measurement of multiple image features. Keywordsnoise reduction; web data mining; image features
同一层网页有相似的显示样式和噪块。数据挖掘的第一步是从网页中去除噪声块。与传统的基于DOM树的相似度度量方法不同,本文提出了一种基于图像特征的去噪方法。在这种方法中,网页被当作图像处理。然后,可以灵活地使用所有图像特征作为度量噪声块相似度的准则。通过测量相似度,可以区分噪声块和信息块,实现降噪。实验结果表明,该方法准确可靠,能够支持多种图像特征的联合测量。Keywordsnoise减少;Web数据挖掘;图像特征
{"title":"The Noise Reduction Method of Web Pages Based on Image Features","authors":"Haitao Yao, Zhiyi Yin, Fuxi Zhu, Changsheng Gong","doi":"10.1109/CISE.2009.5366410","DOIUrl":"https://doi.org/10.1109/CISE.2009.5366410","url":null,"abstract":"Same layer webpage have similar presentation styles and noise blocks. The first step of data mining is to remove noise blocks from web pages. Different from traditional similarity measurement method based on DOM trees, a noise removal method based on image features is proposed in this paper. In this method, web pages are processed as images. And then, all of image features can be flexibly used as criteria to measure similarity of noise blocks. As a result, noise blocks and information blocks can be distinguished after measuring similarity, and the reduction of noise is realized. The results of experiment demonstrate that this method is accurate and reliable and it can support joint measurement of multiple image features. Keywordsnoise reduction; web data mining; image features","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121556654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Research on Time Synchronization of WIA-PA Industrial Wireless Networks WIA-PA工业无线网络时间同步研究
Nan He, Feng Liu
Firstly, the article introduces the WIA-PA wireless network which is under study at present and can be used for industrial control. Aiming to FTSP algorithm can be used correctly in this network, combined with the unique TDMA media access control method of this network, this article takes a way building the logic synchronization tree to improve the precision of multi-hop FTSP clock synchronization. Then it use Bayesian estimation to improve the accuracy of clock synchronization. The experiment results show that after the using of Bayesian estimation, the time synchronization precision of WIA-PA network improve clearly. Industrial wireless network technology is a new wireless communication technology emerging in this century for information exchange between devices ,and it will play an important role for improving product quality, lowering production costs, improving energy efficiency in the future.This special kind of wireless sensor networks is very suitable for used in harsh environments of industrial fields with anti-interference ability, low energy consumption, communication, real-time characteristics.Time synchronization is an important support technology of wireless sensor network's application.The alignment of sensor communication slot, sensor self-positioning, and coordinated operation among sensor nodes all need the clock of all nodes in wireless sensor network stay time synchronization(1).
本文首先介绍了目前正在研究的可用于工业控制的WIA-PA无线网络。为了使FTSP算法能够在该网络中正确使用,结合该网络独特的TDMA媒体访问控制方法,本文采用构建逻辑同步树的方法来提高多跳FTSP时钟同步的精度。然后利用贝叶斯估计提高时钟同步的精度。实验结果表明,采用贝叶斯估计后,WIA-PA网络的时间同步精度明显提高。工业无线网络技术是本世纪兴起的一种用于设备间信息交换的新型无线通信技术,未来将在提高产品质量、降低生产成本、提高能源效率等方面发挥重要作用。这种特殊的无线传感器网络具有抗干扰能力强、能耗低、通信实时等特点,非常适合在工业领域的恶劣环境中使用。时间同步是无线传感器网络应用的重要支撑技术。传感器通信槽的对齐、传感器的自定位以及传感器节点之间的协同工作都需要无线传感器网络中所有节点的时钟保持时间同步(1)。
{"title":"Research on Time Synchronization of WIA-PA Industrial Wireless Networks","authors":"Nan He, Feng Liu","doi":"10.1109/CISE.2009.5363213","DOIUrl":"https://doi.org/10.1109/CISE.2009.5363213","url":null,"abstract":"Firstly, the article introduces the WIA-PA wireless network which is under study at present and can be used for industrial control. Aiming to FTSP algorithm can be used correctly in this network, combined with the unique TDMA media access control method of this network, this article takes a way building the logic synchronization tree to improve the precision of multi-hop FTSP clock synchronization. Then it use Bayesian estimation to improve the accuracy of clock synchronization. The experiment results show that after the using of Bayesian estimation, the time synchronization precision of WIA-PA network improve clearly. Industrial wireless network technology is a new wireless communication technology emerging in this century for information exchange between devices ,and it will play an important role for improving product quality, lowering production costs, improving energy efficiency in the future.This special kind of wireless sensor networks is very suitable for used in harsh environments of industrial fields with anti-interference ability, low energy consumption, communication, real-time characteristics.Time synchronization is an important support technology of wireless sensor network's application.The alignment of sensor communication slot, sensor self-positioning, and coordinated operation among sensor nodes all need the clock of all nodes in wireless sensor network stay time synchronization(1).","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114798280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on Cell Phone Software Testing Strategy 手机软件测试策略研究
Guitao Cao, Jie Yang, Zhihai Tu, Yang Tang
With the enlargement of the application fields of embedded systems, the quality and development cycle of embedded software play crucial roles on the cost, the quality and the time coming up in the market of the product, so increasingly importance has been attached to the test of embedded software. After characteristics of embedded software test, test technology and the test tools are introduced, the testing strategy of the cell phone software is taken as an example to analyze the test process of the embedded software including test requirements, test strategies and plans, test design, test implementation and test results.
随着嵌入式系统应用领域的不断扩大,嵌入式软件的质量和开发周期对产品的成本、质量和上市时间起着至关重要的作用,因此嵌入式软件的测试越来越受到重视。在介绍了嵌入式软件测试的特点、测试技术和测试工具后,以手机软件的测试策略为例,分析了嵌入式软件的测试过程,包括测试需求、测试策略和计划、测试设计、测试实施和测试结果。
{"title":"Research on Cell Phone Software Testing Strategy","authors":"Guitao Cao, Jie Yang, Zhihai Tu, Yang Tang","doi":"10.1109/CISE.2009.5363007","DOIUrl":"https://doi.org/10.1109/CISE.2009.5363007","url":null,"abstract":"With the enlargement of the application fields of embedded systems, the quality and development cycle of embedded software play crucial roles on the cost, the quality and the time coming up in the market of the product, so increasingly importance has been attached to the test of embedded software. After characteristics of embedded software test, test technology and the test tools are introduced, the testing strategy of the cell phone software is taken as an example to analyze the test process of the embedded software including test requirements, test strategies and plans, test design, test implementation and test results.","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114820465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Driver Eyes Identification Based on Infrared Illuminator 基于红外照明器的驾驶员眼睛识别
Wei Di, Rong-ben Wang
Driver fatigue and decentralization of spirit at night is a major factor causing the night-time traffic accident. Eyes locations are the precondition to monitor driver's fatigue state with image processing technique. Based on Otsu threshold segmentation algorithm, with the help of horizontal projection and vertical projection in binary image, the paper locates the driver face region accurately, and establishes eyes location based on the region labeling algorithm. The paper using Laplace edge detection gets eyes contours points, and then fits these points by ellipse fitting. Experiments have proved good reliability and validity of the algorithms.
驾驶员疲劳和夜间精神涣散是造成夜间交通事故的主要因素。人眼定位是利用图像处理技术监测驾驶员疲劳状态的前提。基于Otsu阈值分割算法,借助二值图像中的水平投影和垂直投影,准确定位驾驶员面部区域,并基于区域标记算法建立人眼位置。本文利用拉普拉斯边缘检测方法得到眼睛轮廓点,然后对这些点进行椭圆拟合。实验证明了算法的可靠性和有效性。
{"title":"Driver Eyes Identification Based on Infrared Illuminator","authors":"Wei Di, Rong-ben Wang","doi":"10.1109/CISE.2009.5366673","DOIUrl":"https://doi.org/10.1109/CISE.2009.5366673","url":null,"abstract":"Driver fatigue and decentralization of spirit at night is a major factor causing the night-time traffic accident. Eyes locations are the precondition to monitor driver's fatigue state with image processing technique. Based on Otsu threshold segmentation algorithm, with the help of horizontal projection and vertical projection in binary image, the paper locates the driver face region accurately, and establishes eyes location based on the region labeling algorithm. The paper using Laplace edge detection gets eyes contours points, and then fits these points by ellipse fitting. Experiments have proved good reliability and validity of the algorithms.","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124372103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Solutions of nth Order Initial Value Problems Using Spline Technique 用样条法求解n阶初值问题
Xinze Lian, Changsheng Lin
In this paper, we present a method for solving a kind of arbitrary order linear initial value problems. Based on this method, an algorithm is proposed and fulfilled by numerical and symbolic computations with mechanization in Maple. Finally, some examples are given to illustrate the proposed method. From the results, they show that the proposed method is feasible and efficient. Keywords—splines; initial value problems; differential equa- tions; finite difference methods
本文给出了求解一类任意阶线性初值问题的一种方法。在此基础上提出了一种算法,并在Maple中机械化地进行了数值和符号计算。最后,给出了一些算例来说明所提出的方法。结果表明,该方法是有效可行的。Keywords-splines;初值问题;微分方程;有限差分法
{"title":"Solutions of nth Order Initial Value Problems Using Spline Technique","authors":"Xinze Lian, Changsheng Lin","doi":"10.1109/CISE.2009.5365181","DOIUrl":"https://doi.org/10.1109/CISE.2009.5365181","url":null,"abstract":"In this paper, we present a method for solving a kind of arbitrary order linear initial value problems. Based on this method, an algorithm is proposed and fulfilled by numerical and symbolic computations with mechanization in Maple. Finally, some examples are given to illustrate the proposed method. From the results, they show that the proposed method is feasible and efficient. Keywords—splines; initial value problems; differential equa- tions; finite difference methods","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124453859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2009 International Conference on Computational Intelligence and Software Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1