{"title":"Comparison of SC-FDMA and NC-OFDM schemes for cognitive radio networks","authors":"Haizhou Gao","doi":"10.1109/CINC.2010.5643725","DOIUrl":"https://doi.org/10.1109/CINC.2010.5643725","url":null,"abstract":"In order to implement cognitive radio (CR) in the future, the choice of a physical layer data transmission scheme is very important. In this paper, we compare two agile transmission schemes employed for CR networks: Single Carrier Frequency Division Multiple Access (SC-FDMA) and non-contiguous OFDM (NC-OFDM). First, a qualitative comparison is provided by analyzing the advantages and disadvantages of each scheme. Then the performances of both schemes are compared by simulation. The simulation results and corresponding analyses demonstrate that the performance of SC-FDMA is generally better than NC-OFDM in CR networks. Therefore, SC-FDMA can be a promising alternative to NC-OFDM for CR networks.","PeriodicalId":227004,"journal":{"name":"2010 Second International Conference on Computational Intelligence and Natural Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126509379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on Hardware-in-the-loop-simulation of Wind Power Based on dSPACE","authors":"H. Song, D. Tian","doi":"10.1109/CINC.2010.5643722","DOIUrl":"https://doi.org/10.1109/CINC.2010.5643722","url":null,"abstract":"This article introduces a set of wind power testing platform Based on dSPACE Hardware-in-the-loopsimulation, and the control principle about wind power is researched and analyzed based on this testing plat form. The validity of the testing platform have been testified by the results of off-line simulation and hardware-in-the-loopsimulation. The superiority of ControlDesk in the real-time simulation is prominent.","PeriodicalId":227004,"journal":{"name":"2010 Second International Conference on Computational Intelligence and Natural Computing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121384946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on curriculum resource management based on ontology","authors":"Juan Wang, Yunqing Li","doi":"10.1109/CINC.2010.5643836","DOIUrl":"https://doi.org/10.1109/CINC.2010.5643836","url":null,"abstract":"In order to solve the existing curriculum resource issues on the internet, such as lack of semantic, simple resource structure, the ineffective share of curriculum resources. Protégé tools are used to construct domain ontology of curriculum, and to put forward a curriculum resource management framework based on ontology. In this framework, the curriculum ontology is used to describe the curriculum resource, so as to make curriculum resources achieve the shared and mutually operation on the layer of semantic. Besides, with the help of the development tool “Jena”, ontology storage and query are supported, to ensure the quick finding of learning resources and to promote effective learning...","PeriodicalId":227004,"journal":{"name":"2010 Second International Conference on Computational Intelligence and Natural Computing","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124434681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The study of the rotor dynamic balance technology on the field for cooling fan of the engine","authors":"Li Jie","doi":"10.1109/CINC.2010.5643868","DOIUrl":"https://doi.org/10.1109/CINC.2010.5643868","url":null,"abstract":"The paper analyzes the rotor imbalance of cooling fan for the engine, and come to influence coefficient per unit quality. We can easy count the practice balancer cooling fan rotor. This method is very simple.","PeriodicalId":227004,"journal":{"name":"2010 Second International Conference on Computational Intelligence and Natural Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129121492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-objective particle swarm optimization for land use structure","authors":"H. Hai","doi":"10.1109/CINC.2010.5643853","DOIUrl":"https://doi.org/10.1109/CINC.2010.5643853","url":null,"abstract":"Based on the introduction of particle swarm optimization algorithm, this paper applies it to the land use structure optimization. The objective functions, variables and restraint functions are constructed for land use structure optimization. The corresponding software is also developed. And land use structure optimization for HeChuan District of ChongQing City is taken as the example for the case study. The satisfactory optimization result proves that application of the particle swarm optimization algorithm for land use structure is feasible and effective, which supplies a new idea and method.","PeriodicalId":227004,"journal":{"name":"2010 Second International Conference on Computational Intelligence and Natural Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130331894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generalized predictive control based on particle swarm optimization for linear/nonlinear process with constraints","authors":"Zenghui Wang, Yanxia Sun","doi":"10.1109/CINC.2010.5643834","DOIUrl":"https://doi.org/10.1109/CINC.2010.5643834","url":null,"abstract":"This paper presents an intelligent generalized predictive controller (GPC) based on particle swarm optimization (PSO) for linear or nonlinear process with constraints. We propose several constraints for the plants from the engineering point of view and the cost function is also simplified. No complicated mathematics is used which originated from the characteristics of PSO. This method is easy to be used to control the plants with linear or/and nonlinear constraints. Numerical simulations are used to show the performance of this control technique for linear and nonlinear processes, respectively. In the first simulation, the control signal is computed based on an adaptive linear model. In the second simulation, the proposed method is based on a fixed neural network model for a nonlinear plant. Both of them show that the proposed control scheme can guarantee a good control performance.","PeriodicalId":227004,"journal":{"name":"2010 Second International Conference on Computational Intelligence and Natural Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130790012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computer-mediated communication in education","authors":"Sun Lin, Huang Hui, W. Wenbo, Liu Hao","doi":"10.1007/978-3-642-28744-2_46","DOIUrl":"https://doi.org/10.1007/978-3-642-28744-2_46","url":null,"abstract":"","PeriodicalId":227004,"journal":{"name":"2010 Second International Conference on Computational Intelligence and Natural Computing","volume":"59 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130792746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The realization of DNS anomaly detection based on combination of two methods of similarity and entropy","authors":"Zhen-qi Wang, Miaojie Zhang","doi":"10.1109/CINC.2010.5643774","DOIUrl":"https://doi.org/10.1109/CINC.2010.5643774","url":null,"abstract":"The DNS server will often be attacked through various means, which will lead to our DNS server's low efficiency or even make the DNS server not to provide service of DNS analysis normally and correctly. DNS detection is just to detect whether these accusations happen or not in time. There are many methods for anomaly detection of DNS server, for example, the method based on similarity, the method based on entropy and so on. We will research the combination of the two methods and then realize it. This will improve the monitoring effeciency.","PeriodicalId":227004,"journal":{"name":"2010 Second International Conference on Computational Intelligence and Natural Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116925754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A petri net-based failure handling model for composition transactions","authors":"X. Mei, Yiyan Fan, Yonglin Wang, Xiao Fang","doi":"10.1109/CINC.2010.5643816","DOIUrl":"https://doi.org/10.1109/CINC.2010.5643816","url":null,"abstract":"Due to the existing failure and cancellation of business logic of Web services composition, service compensation is one of the most important issues in the research of Service- Oriented Computing (SOC). To ensure the weaker notion of atomicity through performing compensation, the execution semantics of this mechanism's compensation pattern are analyzed based on Petri net, a Petri-net-based formalization to construct Web composition process is proposed, interface dependency, compensation dependency and sequence that handlers were triggered in nesting scopes are discussed, the semantics of interface and excution of composition service is discussed based on Petri net.","PeriodicalId":227004,"journal":{"name":"2010 Second International Conference on Computational Intelligence and Natural Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131177246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The impact of technological M&As on innovative performance of listed companies","authors":"Chengyu Wen, Zhixin Liu","doi":"10.1109/CINC.2010.5643756","DOIUrl":"https://doi.org/10.1109/CINC.2010.5643756","url":null,"abstract":"This article selects the patent number as an innovation performance alternative variable to test the impact of technology mergers on the innovative performance in high-tech industries listed companies empirically by using the panel data negative binomial regression model. It shows that non-technical merger acquisition has no significant influence on the innovation achievements for a company; the absolute size of the acquired knowledge base makes a positive impact on the innovative performance of the acquiring firm; while the relative size of the acquired knowledge base has a negative effect on the innovative performance of the acquiring firm. These results provide the empirical basis of technology mergers & acquisitions for the listed company.","PeriodicalId":227004,"journal":{"name":"2010 Second International Conference on Computational Intelligence and Natural Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128370969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}