{"title":"Research intrusion detection based PSO-RBF classifier","authors":"Ruzhi Xu, R. An, Xiao-feng Geng","doi":"10.1109/ICSESS.2011.5982265","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982265","url":null,"abstract":"In order to improve the accuracy of classification problem in intrusion detection, a hybrid classifier which was composed by KPCA, RBFNN and PSO, has been proposed in this paper. In the hybrid classifier, KPCA was used to reduce the dimensions, RBF was the core classification, and then PSO was used to optimize the parameters for EBFNN. The hybrid classifier used KPCA to extract the core nonlinear characteristics of raw data, introducing PSO to seek parameters overcame the weakness of RBFNN such as easily limit to local minimum points, low recognition rate and poor generalization. Finally the paper has done simulation using the KDDCUP99 data set in the matlab environment. Finally, the effectiveness of hybrid classifier was proved by experiments. Compared with traditional methods, the hybrid classifier has significantly improved the accuracy of classification in intrusion detection.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"590 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116315923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Notice of RetractionFunctional innovation of Destination Marketing System","authors":"Wu Hong, L. Fei, G. Shuzhong","doi":"10.1109/ICSESS.2011.5982452","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982452","url":null,"abstract":"With the development of information and internet, traditional tourism is promoted through informationization, then Destination Marketing System (the abbreviation is DMS) appeared. DMS, different from general tourism electronic commerce (the abbreviation is e-commerce) websites, is comprehensive application of regional tourism e-commerce. From technical level, it enhances informationization and standardization of tourism destination. From tourism industry service level, information flow improves service quality of tourism industry due to all kinds of tour enterprises' participation in DMS. From marketing level, overall marketing level is advanced because of real-time docking of network marketing and traditional marketing. This paper analyzes functional innovation of DMS from three aspects, namely basic function, extended function and advanced function in order to show its importance in tourism marketing. In the next few years, we should promote DMS's construction according to the general framework of the golden tourism project in China. We should take full advantage of the best opportunity that Chinese tourism industry catch up with international tourism industry. We should promote development of traditional tourism through informationization.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116907266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Notice of RetractionIntegrated management and coordinative decision for purchasing and supply chain delivery time","authors":"Shen Wen, Yanfang Wu, Hanbin Xiao","doi":"10.1109/ICSESS.2011.5982446","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982446","url":null,"abstract":"Delivery time is an important variable in purchasing and supply chain management. In this paper, we discuss two issues: (1) Integrated management for delivery time, which suggests a synchronous, systemic and total managerial principle for delivery time management; (2) Coordinative decision-making for delivery time, which presents a conceptual framework model for delivery time decision-making. The results and conclusions have academic value and practical significatance, and of course, will build up a basis for our future research.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115428952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An adaptive threshold segmentation method based on BP neural network for paper defect detection","authors":"W. Xiaofang, L. Qinghua, Ling Jun","doi":"10.1109/ICSESS.2011.5982338","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982338","url":null,"abstract":"Threshold segmentation is the fastest method of defect detection in the modern defect inspection system based on computer vision. But in the real paper defect detection system, the segmentation thresholds usually change with the paper image luminance which is influenced by many factors. In order to resolve this problem, an adaptive threshold segmentation method based on BP neural network is proposed in this paper. For this method, BP neural network models are created and trained to obtain the segmentation thresholds according to the image luminance and the defects are segmented with these thresholds obtained by the network. This method is especially suitable for detecting three typical types of paper defects: dark spot, light spot and hole. The experiment results indicate that this method is efficient and can be applied to modern paper defect inspection system.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"842 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114339612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A MAP-based SAGE channel estimation and data detection joint algorithm for MIMO system","authors":"Jing Shen, Muqing Wu","doi":"10.1109/ICSESS.2011.5982260","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982260","url":null,"abstract":"In recent years, MIMO (Multiple-Input Multiple-Output) have attracted much attention in the study of the next generation wireless communication systems. In this paper, we propose a new channel estimation and data detection joint algorithm for MIMO system using MAP-based SAGE (Space-Alternating Generalized Expectation-maximization) algorithm. In the MAP-based SAGE algorithm we divide a sub-frame of MIMO system into some sub-blocks and use the MAP-based SAGE algorithm in each sub-block. At the head of each sub-frame, we insert a training symbol which is used to initial estimation at the beginning. In the iteration process, we apply channel estimation of the previous sub-block to initial estimation in the current sub-block by ML detection. In the current sub-block we update channel estimate and data detection by iteration until converge. In each iteration process, only part of the transmit antennas is updated. Simulation results show that the proposed algorithm can improve BER performance.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115187171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Notice of RetractionAnalysis on spatial econometric differences of R & D industry in China","authors":"Jianwei Zhang, Debin Du, Y. Chen","doi":"10.1109/ICSESS.2011.5982420","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982420","url":null,"abstract":"Using the turnover of technical contract to characterize the R&D industry, the study investigates the spatial evolution and their causes of the difference of the R&D industry in China during the year of 1997-2009 by GIS method. Three conclusions are found as follows: (1) Beijing, Shanghai, Guangdong and Liaoning have always been the most developed regions; the developed regions are continuously declining while the undeveloped regions are increasing; the polarization trend on space is more significant; (2) space factors has played a role in promoting the development of R&D industry to some extend but goes down gradually; (3) Regional innovation environment, government policies and openness have a positive effect to R&D industry: Government support and attention is the most important, then comes the openness, the third is S&T investment and economic development, infrastructure and education is less important to R&D industry.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114823261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Notice of RetractionA research on the charateristics of human-capital-intensive firms and physical-capital-intensive firms","authors":"Xiaoshan Cai, He Chen","doi":"10.1109/ICSESS.2011.5982319","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982319","url":null,"abstract":"The human-capital-intensive firms whose critical resource is human capital are changing the situation of the business, and have become an important new firm model. This paper analyzes the differences of characters between human-capital-intensive firms and physical-capital-intensive firms from four aspects: the critical resources of the firm, the control over employees, management issues and boundary problems.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126117864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementing the compiler of AADL behavior annex using ANTLR","authors":"Huilong Jiang, Xiao Wu, Yunwei Dong, Fan Zhang","doi":"10.1109/ICSESS.2011.5982287","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982287","url":null,"abstract":"Behavior Annex is the extension of AADL which enhances AADL's detailed description of system's behavior. It provides better support for modeling and analyzing system's non-functional properties, such as reliability and security. The analysis for the properties of AADL model is based on the model compilation. Hence, in order to facilitate the extraction of the AADL's behavior model during the model analysis, we design the compiler of behavior annex to transform behavior model into structured XML documents based on the characteristic of AADL components. This article uses the compiler generating tool ANTLR to implement the lexical and syntactic parser of behavior annex and designs the meta-model classes of behavior annex using EMF. We call the meta-model classes during the syntactic analysis to generate the class objects and complete the parser of AADL behavior model. Finally, the compiler uses the EMF's internal XMI specification to transform the model class objects into XML documents.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122018797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of BICM and BICM-ID","authors":"Xiao Ying, L. Jianping, Cai Chaoshi","doi":"10.1109/ICSESS.2011.5982282","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982282","url":null,"abstract":"Bit-interleaved coded modulation (BICM) is a remarkable scheme by maximizing the code diversity to achieve better reliability over Rayleigh fading channels. However, it causes property degradation in AWGN channels because of the decreasing of the free (squared) Euclidean distance. Thus, the bit-interleaving coded modulation with iterative decoding (BICM-ID) is proposed, which can get unexceptionable BER performances both in AWGN channels and in Rayleigh fading channels. This paper examines the different parameters that affect the performances of BICM and BICM-ID through a plenty of simulations. Specifically, the following parameters are considered: the code rates, the modulation modes, the mapping schemes, the iteration numbers and the decoding algorithms.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124881054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introducing a framework to use SOA in business intelligence for real-time environments","authors":"Jalileh Javanmard, Shahrouz Moaven, J. Habibi","doi":"10.1109/ICSESS.2011.5982263","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982263","url":null,"abstract":"Due to the expansion of information systems and facing with a mass of data and information, the existing business intelligence systems are not capable of meeting the requirements of real-time business environments. On the other hand, expansion of different application system environments has hardened integration and interoperability between them. Adoption of service-oriented architecture is one way to face with these big challenges. In the proposed framework, different kinds of features and tools have been used to achieve the best real-time architecture, give the best performance and manage as best as possible in a real-time environment. By using these capabilities and features, integration of applications and distributed services has been provided. In the suggested framework, not only meeting all the requirements in real-time business intelligence environments have been considered, but also it has been provided the possibility of evaluation of interaction between systems and applications and improvement of these interactions by coordination network methodology.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121971920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}