Aiming at the multimedia services in the 3G and 4G CDMA mobile communication system, a soft handover model, in which an overlaid cellular architecture including one macrocell and seven microcells with video service, is given, and link equation of CDMA discrete system in frequency domain is established. Balancing the forward link and reverse link, adjusting the parameters such as the distance and direction between mobile station and base station, the relationship between the soft handover add threshold of marcocell system and the load factor of microcell system is analyzed quantitatively, and their corresponding performances are simulated in both time domain and frequecy domain. The results are shown: the variance of distance is more sensitive to the soft handover performance than the variance of direction does.
{"title":"Performance Analysis of Soft Handover Based on FFT in CDMA System","authors":"Zhi-qiang Zhu, Guang-yin Xu, Jianwei Lian, Junqiang Guo","doi":"10.1109/CISE.2009.5362991","DOIUrl":"https://doi.org/10.1109/CISE.2009.5362991","url":null,"abstract":"Aiming at the multimedia services in the 3G and 4G CDMA mobile communication system, a soft handover model, in which an overlaid cellular architecture including one macrocell and seven microcells with video service, is given, and link equation of CDMA discrete system in frequency domain is established. Balancing the forward link and reverse link, adjusting the parameters such as the distance and direction between mobile station and base station, the relationship between the soft handover add threshold of marcocell system and the load factor of microcell system is analyzed quantitatively, and their corresponding performances are simulated in both time domain and frequecy domain. The results are shown: the variance of distance is more sensitive to the soft handover performance than the variance of direction does.","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123853422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-28DOI: 10.1109/CISE.2009.5365724
Yong Shen, Yuan Xiao, J. Ye, J. Qian
According to the principles of fuzzy comprehensive evaluation and neural network, the calculation models of safety evaluation system of amusement ride were created. The requirements and functions of safe evaluating system of amusement ride based on fuzzy neural network were analyzed. The Use Case View was created with Unified Modeling Language. According to Model-View-Controller pattern, the classes were abstracted through analyzing system functions and workflows. The object sequence diagram was created according to fuzzy safety evaluation process, and the object sequence diagram of the optimizing process of weights with neural network was created. The system was developed with Visual C++6.0. The user interface of system is sample and easy to operate. Keywords-fuzzy evaluation; neural network; amusement ride; Unified Modeling Language
根据模糊综合评价和神经网络的原理,建立了游乐设施安全评价体系的计算模型。分析了基于模糊神经网络的游乐设施安全评价系统的要求和功能。用例视图是用统一建模语言创建的。根据模型-视图-控制器模式,通过对系统功能和工作流的分析,对类进行了抽象。根据模糊安全评价过程建立了目标序列图,利用神经网络建立了权重优化过程的目标序列图。该系统是用Visual c++ 6.0开发的。系统用户界面简洁,易于操作。Keywords-fuzzy评价;神经网络;的游乐设施;统一建模语言
{"title":"Research on Modeling for Safety Evaluation System of Amusement Ride Based on Fuzzy Neural Network","authors":"Yong Shen, Yuan Xiao, J. Ye, J. Qian","doi":"10.1109/CISE.2009.5365724","DOIUrl":"https://doi.org/10.1109/CISE.2009.5365724","url":null,"abstract":"According to the principles of fuzzy comprehensive evaluation and neural network, the calculation models of safety evaluation system of amusement ride were created. The requirements and functions of safe evaluating system of amusement ride based on fuzzy neural network were analyzed. The Use Case View was created with Unified Modeling Language. According to Model-View-Controller pattern, the classes were abstracted through analyzing system functions and workflows. The object sequence diagram was created according to fuzzy safety evaluation process, and the object sequence diagram of the optimizing process of weights with neural network was created. The system was developed with Visual C++6.0. The user interface of system is sample and easy to operate. Keywords-fuzzy evaluation; neural network; amusement ride; Unified Modeling Language","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123906617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-28DOI: 10.1109/CISE.2009.5363348
Wang Meng, Hongxia Xia, Huazhu Song
Grid is the next generation of Internet, and it has attracted the attentions of research communities recently. In practical applications, the nodes in the grid domain need to transact with other strange nodes to acquire the services provided by those nodes. Recently, trust has been recognized as an important factor for Grid security. And it is important for them to make a trust evaluation for those strange nodes before transactions, because some nodes are dishonest. Currently, the method to solve this problem is to establish an effective trust mechanism in grid domain based on reputation. However, there are still some disadvantages in existence in some cases, as the dynamicity of the grid environment, although it can be risk-averse to some extent. Like some malicious nodes contribute high trust value through numerous good interaction behaviors at first, and then change to attack. In view of those problems and disadvantages, this paper proposes a dynamic grid trust model based on recommendation credibility, called DyGridTrust (Dynamic Grid Trust Model). This model can distinguish honest and dishonest recommendation and adjust the weight of trust evaluation dynamically. In addition, this trust model is able to obtain the trust value more objectively, so as to enhance the security of the grid system. Finally, in this paper, those perspectives have been confirmed by simulations, which are developed by Matlab R2008a.
{"title":"A Dynamic Trust Model Based on Recommendation Credibility in Grid Domain","authors":"Wang Meng, Hongxia Xia, Huazhu Song","doi":"10.1109/CISE.2009.5363348","DOIUrl":"https://doi.org/10.1109/CISE.2009.5363348","url":null,"abstract":"Grid is the next generation of Internet, and it has attracted the attentions of research communities recently. In practical applications, the nodes in the grid domain need to transact with other strange nodes to acquire the services provided by those nodes. Recently, trust has been recognized as an important factor for Grid security. And it is important for them to make a trust evaluation for those strange nodes before transactions, because some nodes are dishonest. Currently, the method to solve this problem is to establish an effective trust mechanism in grid domain based on reputation. However, there are still some disadvantages in existence in some cases, as the dynamicity of the grid environment, although it can be risk-averse to some extent. Like some malicious nodes contribute high trust value through numerous good interaction behaviors at first, and then change to attack. In view of those problems and disadvantages, this paper proposes a dynamic grid trust model based on recommendation credibility, called DyGridTrust (Dynamic Grid Trust Model). This model can distinguish honest and dishonest recommendation and adjust the weight of trust evaluation dynamically. In addition, this trust model is able to obtain the trust value more objectively, so as to enhance the security of the grid system. Finally, in this paper, those perspectives have been confirmed by simulations, which are developed by Matlab R2008a.","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123932901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-28DOI: 10.1109/CISE.2009.5366503
Bo Wu, Xiaohu Yang
As the progress of information technology, some financial systems used for long time can no longer meet the requirement of customers in both user interface and business process, and need reengineering imminently. In order to save the human resource and financial effort, this article raises a reengineering approach by encapsulating the back-end data access code of legacy system and only refactoring the front-end user interface and business logic. In the reengineering work, this article uses MVP (Model-View-Presenter) Architecture. By extracting screen logic into Presenters, the display code in View is independent from logic code in Presenter. Also, the introduction of MVP Architecture greatly enhances the reusability and the testability of business logic code, and finally improves the efficiency of development and test work significantly.
{"title":"Application of MVP Architecture in Reengineering of Legacy Financial System","authors":"Bo Wu, Xiaohu Yang","doi":"10.1109/CISE.2009.5366503","DOIUrl":"https://doi.org/10.1109/CISE.2009.5366503","url":null,"abstract":"As the progress of information technology, some financial systems used for long time can no longer meet the requirement of customers in both user interface and business process, and need reengineering imminently. In order to save the human resource and financial effort, this article raises a reengineering approach by encapsulating the back-end data access code of legacy system and only refactoring the front-end user interface and business logic. In the reengineering work, this article uses MVP (Model-View-Presenter) Architecture. By extracting screen logic into Presenters, the display code in View is independent from logic code in Presenter. Also, the introduction of MVP Architecture greatly enhances the reusability and the testability of business logic code, and finally improves the efficiency of development and test work significantly.","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124175657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-28DOI: 10.1109/CISE.2009.5362895
Yiwen Yang, Chenxi Zhang
This paper presents a method to compute liquidity risk of stock market with model of VaR. Firstly, a measure for liquidity is defined, which reflects the volatility of return caused by unite ratio of the position to be liquidated to the tradable shares. Secondly, the density function of the measure for liquidity is estimated with support vector machine, with which the liquidity VaR of stocks is calculated. Finally, some stocks of Shanghai and Shenzhen stock markets are chosen, according to their tradable shares, to compute liquidity VaR. The results show that the liquidity VaR is bigger than the traditional VaR that is calculated without considering liquidity, which means the latter does underestimate the risk. Keywords-density function estimation; SVMg; liquidity risk; VaR
{"title":"Density Function Estimation Based on SVM: An Application in Estimating Liquidity Risk in Stock Market","authors":"Yiwen Yang, Chenxi Zhang","doi":"10.1109/CISE.2009.5362895","DOIUrl":"https://doi.org/10.1109/CISE.2009.5362895","url":null,"abstract":"This paper presents a method to compute liquidity risk of stock market with model of VaR. Firstly, a measure for liquidity is defined, which reflects the volatility of return caused by unite ratio of the position to be liquidated to the tradable shares. Secondly, the density function of the measure for liquidity is estimated with support vector machine, with which the liquidity VaR of stocks is calculated. Finally, some stocks of Shanghai and Shenzhen stock markets are chosen, according to their tradable shares, to compute liquidity VaR. The results show that the liquidity VaR is bigger than the traditional VaR that is calculated without considering liquidity, which means the latter does underestimate the risk. Keywords-density function estimation; SVMg; liquidity risk; VaR","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114117473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-28DOI: 10.1109/CISE.2009.5366410
Haitao Yao, Zhiyi Yin, Fuxi Zhu, Changsheng Gong
Same layer webpage have similar presentation styles and noise blocks. The first step of data mining is to remove noise blocks from web pages. Different from traditional similarity measurement method based on DOM trees, a noise removal method based on image features is proposed in this paper. In this method, web pages are processed as images. And then, all of image features can be flexibly used as criteria to measure similarity of noise blocks. As a result, noise blocks and information blocks can be distinguished after measuring similarity, and the reduction of noise is realized. The results of experiment demonstrate that this method is accurate and reliable and it can support joint measurement of multiple image features. Keywordsnoise reduction; web data mining; image features
{"title":"The Noise Reduction Method of Web Pages Based on Image Features","authors":"Haitao Yao, Zhiyi Yin, Fuxi Zhu, Changsheng Gong","doi":"10.1109/CISE.2009.5366410","DOIUrl":"https://doi.org/10.1109/CISE.2009.5366410","url":null,"abstract":"Same layer webpage have similar presentation styles and noise blocks. The first step of data mining is to remove noise blocks from web pages. Different from traditional similarity measurement method based on DOM trees, a noise removal method based on image features is proposed in this paper. In this method, web pages are processed as images. And then, all of image features can be flexibly used as criteria to measure similarity of noise blocks. As a result, noise blocks and information blocks can be distinguished after measuring similarity, and the reduction of noise is realized. The results of experiment demonstrate that this method is accurate and reliable and it can support joint measurement of multiple image features. Keywordsnoise reduction; web data mining; image features","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121556654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-28DOI: 10.1109/CISE.2009.5363213
Nan He, Feng Liu
Firstly, the article introduces the WIA-PA wireless network which is under study at present and can be used for industrial control. Aiming to FTSP algorithm can be used correctly in this network, combined with the unique TDMA media access control method of this network, this article takes a way building the logic synchronization tree to improve the precision of multi-hop FTSP clock synchronization. Then it use Bayesian estimation to improve the accuracy of clock synchronization. The experiment results show that after the using of Bayesian estimation, the time synchronization precision of WIA-PA network improve clearly. Industrial wireless network technology is a new wireless communication technology emerging in this century for information exchange between devices ,and it will play an important role for improving product quality, lowering production costs, improving energy efficiency in the future.This special kind of wireless sensor networks is very suitable for used in harsh environments of industrial fields with anti-interference ability, low energy consumption, communication, real-time characteristics.Time synchronization is an important support technology of wireless sensor network's application.The alignment of sensor communication slot, sensor self-positioning, and coordinated operation among sensor nodes all need the clock of all nodes in wireless sensor network stay time synchronization(1).
{"title":"Research on Time Synchronization of WIA-PA Industrial Wireless Networks","authors":"Nan He, Feng Liu","doi":"10.1109/CISE.2009.5363213","DOIUrl":"https://doi.org/10.1109/CISE.2009.5363213","url":null,"abstract":"Firstly, the article introduces the WIA-PA wireless network which is under study at present and can be used for industrial control. Aiming to FTSP algorithm can be used correctly in this network, combined with the unique TDMA media access control method of this network, this article takes a way building the logic synchronization tree to improve the precision of multi-hop FTSP clock synchronization. Then it use Bayesian estimation to improve the accuracy of clock synchronization. The experiment results show that after the using of Bayesian estimation, the time synchronization precision of WIA-PA network improve clearly. Industrial wireless network technology is a new wireless communication technology emerging in this century for information exchange between devices ,and it will play an important role for improving product quality, lowering production costs, improving energy efficiency in the future.This special kind of wireless sensor networks is very suitable for used in harsh environments of industrial fields with anti-interference ability, low energy consumption, communication, real-time characteristics.Time synchronization is an important support technology of wireless sensor network's application.The alignment of sensor communication slot, sensor self-positioning, and coordinated operation among sensor nodes all need the clock of all nodes in wireless sensor network stay time synchronization(1).","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114798280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-28DOI: 10.1109/CISE.2009.5363007
Guitao Cao, Jie Yang, Zhihai Tu, Yang Tang
With the enlargement of the application fields of embedded systems, the quality and development cycle of embedded software play crucial roles on the cost, the quality and the time coming up in the market of the product, so increasingly importance has been attached to the test of embedded software. After characteristics of embedded software test, test technology and the test tools are introduced, the testing strategy of the cell phone software is taken as an example to analyze the test process of the embedded software including test requirements, test strategies and plans, test design, test implementation and test results.
{"title":"Research on Cell Phone Software Testing Strategy","authors":"Guitao Cao, Jie Yang, Zhihai Tu, Yang Tang","doi":"10.1109/CISE.2009.5363007","DOIUrl":"https://doi.org/10.1109/CISE.2009.5363007","url":null,"abstract":"With the enlargement of the application fields of embedded systems, the quality and development cycle of embedded software play crucial roles on the cost, the quality and the time coming up in the market of the product, so increasingly importance has been attached to the test of embedded software. After characteristics of embedded software test, test technology and the test tools are introduced, the testing strategy of the cell phone software is taken as an example to analyze the test process of the embedded software including test requirements, test strategies and plans, test design, test implementation and test results.","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114820465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-28DOI: 10.1109/CISE.2009.5366673
Wei Di, Rong-ben Wang
Driver fatigue and decentralization of spirit at night is a major factor causing the night-time traffic accident. Eyes locations are the precondition to monitor driver's fatigue state with image processing technique. Based on Otsu threshold segmentation algorithm, with the help of horizontal projection and vertical projection in binary image, the paper locates the driver face region accurately, and establishes eyes location based on the region labeling algorithm. The paper using Laplace edge detection gets eyes contours points, and then fits these points by ellipse fitting. Experiments have proved good reliability and validity of the algorithms.
{"title":"Driver Eyes Identification Based on Infrared Illuminator","authors":"Wei Di, Rong-ben Wang","doi":"10.1109/CISE.2009.5366673","DOIUrl":"https://doi.org/10.1109/CISE.2009.5366673","url":null,"abstract":"Driver fatigue and decentralization of spirit at night is a major factor causing the night-time traffic accident. Eyes locations are the precondition to monitor driver's fatigue state with image processing technique. Based on Otsu threshold segmentation algorithm, with the help of horizontal projection and vertical projection in binary image, the paper locates the driver face region accurately, and establishes eyes location based on the region labeling algorithm. The paper using Laplace edge detection gets eyes contours points, and then fits these points by ellipse fitting. Experiments have proved good reliability and validity of the algorithms.","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124372103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-28DOI: 10.1109/CISE.2009.5365181
Xinze Lian, Changsheng Lin
In this paper, we present a method for solving a kind of arbitrary order linear initial value problems. Based on this method, an algorithm is proposed and fulfilled by numerical and symbolic computations with mechanization in Maple. Finally, some examples are given to illustrate the proposed method. From the results, they show that the proposed method is feasible and efficient. Keywords—splines; initial value problems; differential equa- tions; finite difference methods
{"title":"Solutions of nth Order Initial Value Problems Using Spline Technique","authors":"Xinze Lian, Changsheng Lin","doi":"10.1109/CISE.2009.5365181","DOIUrl":"https://doi.org/10.1109/CISE.2009.5365181","url":null,"abstract":"In this paper, we present a method for solving a kind of arbitrary order linear initial value problems. Based on this method, an algorithm is proposed and fulfilled by numerical and symbolic computations with mechanization in Maple. Finally, some examples are given to illustrate the proposed method. From the results, they show that the proposed method is feasible and efficient. Keywords—splines; initial value problems; differential equa- tions; finite difference methods","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124453859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}