2009 International Conference on Computational Intelligence and Software Engineering最新文献

筛选
英文 中文
Quantization Algorithm for Color Image Coding Based on Multi-Dimensional Vector Matrix DCT Orthogonal Transformation 基于多维向量矩阵DCT正交变换的彩色图像编码量化算法
Linlin Deng, Ping Fu, A. Sang, Silin Mang
{"title":"Quantization Algorithm for Color Image Coding Based on Multi-Dimensional Vector Matrix DCT Orthogonal Transformation","authors":"Linlin Deng, Ping Fu, A. Sang, Silin Mang","doi":"10.1109/CISE.2009.5363332","DOIUrl":"https://doi.org/10.1109/CISE.2009.5363332","url":null,"abstract":"The quantization process is a choice for signal after pretreatment. On the premise of guarantee of image quality, we can throw away information which has little effect on visual effect. Because quantization process is origin of information loss based on DCT coding and decoding, the quantizer is good or bad which has effect on coding efficiency and the quality of reconstructed image directly. This paper presents a 3D quantization algorithm for color image coding based on multi-dimensional vector matrix DCT orthogonal transform. Different quantization tables can be determined according to different frequency characteristics of each 8×8×3 3D RGB sub-block by this method. The method proved effective according to experiment. Keywordsmulti-dimensional vector matrix; color image coding; quantization","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"475 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133960036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
RBF Control Research Based on Fuzzy Neural Model 基于模糊神经模型的RBF控制研究
Changlu Zheng, Jian Fan, M. Fei, Zhinian Gao
{"title":"RBF Control Research Based on Fuzzy Neural Model","authors":"Changlu Zheng, Jian Fan, M. Fei, Zhinian Gao","doi":"10.1109/CISE.2009.5363752","DOIUrl":"https://doi.org/10.1109/CISE.2009.5363752","url":null,"abstract":"RBF controller based on fuzzy neural network model is given in this paper, which applies field data to model the control object, and then uses the model to adjust the parameters of gauss basis function in RBF controller, such as the central value, the width, and the weights from hidden layer to output layer. In addition, the controller is applied to control the bed temperature of CFB boilers. By comparison with the traditional PID controllers, the simulation result shows that the given controller has shorter response time and better tracking performance.","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133999247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Countermeasures Research on Credit Problem in C2C E-Business C2C电子商务中信用问题的对策研究
Qiumei Hu
{"title":"Countermeasures Research on Credit Problem in C2C E-Business","authors":"Qiumei Hu","doi":"10.1109/CISE.2009.5362855","DOIUrl":"https://doi.org/10.1109/CISE.2009.5362855","url":null,"abstract":"Credit problem in transactions bottlenecks the further development of C2C E-business. This Paper makes a detailed analysis of the credit problem in C2C E-business, and points out that the solution to the bottleneck of C2C E-business in China should focus on groping for an effective solution scheme, besides passive monitoring, improvement of legal mechanism, and efforts of financial institution, commercial and industrial institution and other official and semi-official organizations. And the Paper through analysis gets a solution scheme i.e. to build a uniform credit management platform for solving the development","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131493864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software Design Pattern Behavior in Shared Memory Multiprocessor Systems 共享内存多处理器系统中的软件设计模式行为
T. Ovatman, F. Buzluca
{"title":"Software Design Pattern Behavior in Shared Memory Multiprocessor Systems","authors":"T. Ovatman, F. Buzluca","doi":"10.1109/CISE.2009.5365871","DOIUrl":"https://doi.org/10.1109/CISE.2009.5365871","url":null,"abstract":"With the emergence of multicore processors, parallel software is beginning to be used in the domain of application development in addition to high performance computing. In this work three software design patterns are chosen from each pattern category as subjects, representing reusable elements of object oriented software design. Behavior of these patterns in a shared memory parallel environment is investigated regarding different aspects of parallelization including parallelizability, scalability and workload distribution.","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131616997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Social Group Collaborative Learning and Knowledge Sharing Environment 社会群体协作学习与知识共享环境
Rong Wang, Jie Deng, Fei Men
{"title":"Social Group Collaborative Learning and Knowledge Sharing Environment","authors":"Rong Wang, Jie Deng, Fei Men","doi":"10.1109/CISE.2009.5363047","DOIUrl":"https://doi.org/10.1109/CISE.2009.5363047","url":null,"abstract":"In consideration of new trends in cognition science, learning, technology and human life, we have put forward the concept of social group collaborative learning (SGCL) in our previous work. This paper first presents the architecture of SGCL system which is divided into user layer, system layer and storage layer. The user layer helps individuals construct their cognitions. The system layer aggregates individual cognitions into group cognition and discover relations among the knowledge, users and the resources. The storage layer stores necessary information. Then this paper describes how the system supports cognition constructing, modeling and aggregating. There are four elements in SGCL system, which are learners, knowledge, resources and relations between two of the pervious elements. At last, this paper analyzes the network made of the four elements and explains how the system discovers knowledge group, resources group and learners group so as to help learners to construct their cognition maps. Keywords-collaborative learning; cognitive aggregation; knowledge sharing; social software","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131648480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimal Pricing Strategy of Hotel for Cooperative Travel Agency 合作旅行社酒店最优定价策略研究
Liuyi Ling, Xiaolong Guo, L. Liang
{"title":"Optimal Pricing Strategy of Hotel for Cooperative Travel Agency","authors":"Liuyi Ling, Xiaolong Guo, L. Liang","doi":"10.1109/CISE.2009.5362585","DOIUrl":"https://doi.org/10.1109/CISE.2009.5362585","url":null,"abstract":"In practice, in order to improve its revenue, hotel cooperates with travel agency, website, government, corporation, etc., and provides them with low room rate. This paper does research on the pricing problem of hotel for long-term cooperative travel agency. Through building pricing model, this paper proves that cooperation is beneficial to hotel and travel agency, derives the optimal pricing strategy of hotel, and analyzes the effects on the room rate for travel agency and hotel revenue, of hotel capacity, standard room rate, daily variable cost, the number of individual customers, and that of customers from travel agency. Eventually, it suggests some managerial implications.","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"27 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131790547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An Equivalence Relation on Extended Finite State Machines 扩展有限状态机上的等价关系
Xiang-Yun Wang, Xi-rong Ma
{"title":"An Equivalence Relation on Extended Finite State Machines","authors":"Xiang-Yun Wang, Xi-rong Ma","doi":"10.1109/CISE.2009.5364312","DOIUrl":"https://doi.org/10.1109/CISE.2009.5364312","url":null,"abstract":"The extended finite state machine (EFSM) is an extension of the finite state machine, which creates input and output parameters, context variables, operations and predicates. It is applied widely in the fields of software engineering since there are many tools that support software development activities based on the EFSM models. However, the theoretical foundation of EFSM is not yet well-developed. This paper is a preliminary investigation of EFSM model. Firstly, this paper defines an equivalence relation on a class of EFSMs, namely restricted EFSMs. Secondly, the partial order relation and synchronous product on restricted EFSMs are approached. Finally, an algorithm is derived to decide the equivalence relation. The results of this paper are promising to be applied in software fields. Keywordsextended finite state machine(EFSM); equivalence relation; restricted EFSM; algorithm","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131849953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Threshold Estimation Based on Perona-Malik Model 基于Perona-Malik模型的阈值估计
Hui Shao, Hailin Zou
{"title":"Threshold Estimation Based on Perona-Malik Model","authors":"Hui Shao, Hailin Zou","doi":"10.1109/CISE.2009.5366025","DOIUrl":"https://doi.org/10.1109/CISE.2009.5366025","url":null,"abstract":"The selectivity of diffusion mechanism and parameters is the key in the field of image nonlinear diffusion filtering based on Perona-Malik model. The threshold estimation of the diffusion function depends mainly on the experience in the existing methods. In this paper, the relationship between the image features, the noise variance and the threshold are analyzed, and a new threshold estimation method is proposed, the test results show it is effective. Keywords-nonlinear diffusion; PM threshold estimation","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132965925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Path Planning of Mobile Robot Based on Voronoi Diagram by Approximation Structuring and Zonal Ant Colony Algorithm 基于逼近结构和分区蚁群算法的Voronoi图移动机器人路径规划
Rui-Jie Wen, Hang-yu Wang, Jun Xie
{"title":"Path Planning of Mobile Robot Based on Voronoi Diagram by Approximation Structuring and Zonal Ant Colony Algorithm","authors":"Rui-Jie Wen, Hang-yu Wang, Jun Xie","doi":"10.1109/CISE.2009.5365942","DOIUrl":"https://doi.org/10.1109/CISE.2009.5365942","url":null,"abstract":"Path planning plays an important role in the area of mobile robot, which includes two important contents: environment modeling and path searching. The method of Voronoi diagram for general figures by approximation structuring is utilized and the origin and terminal are linked into diagram to construct the non-collision road map. Zonal Ant Colony Algorithm is applied to search the shortest path between origin and terminal. Simulation results demonstrate that the method is simple and effective.","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127631775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Gravity-Base Objects' Weight Clustering Algorithm 一种基于重力的物体权重聚类算法
Xiang Wei
{"title":"A Gravity-Base Objects' Weight Clustering Algorithm","authors":"Xiang Wei","doi":"10.1109/CISE.2009.5364783","DOIUrl":"https://doi.org/10.1109/CISE.2009.5364783","url":null,"abstract":"Although many clustering algorithms have been proposed so far, seldom was focused on weight of objects. They totally or partially ignore the fact that not all data objects are equally important with respect to the clustering purpose, and that data objects which are close and dense should have more influence to sub-cluster centroid. we think that the similarity or dissimilarity of two objects is not depend on all attributes with special need, some attributes should be use to measure the dissimilarity, others attributes should impact the centroid in other way. A new weighted clustering algorithm call GBWCA is proposed to deal with different objects weight. To evaluate the proposed algorithm, we use some real and artificial dataset to compare with other algorithm, we present performance comparisons of GBWCA versus k-means and show that GBWCA is consistently superior. Keywordsclustering; gravity; object’s weight;k-means","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125197357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信