{"title":"User sensing based on MIMO cognitive radio sensor networks","authors":"Wei Ma, M. Wu, D. Liu, M. Wang","doi":"10.1109/ICCSIT.2009.5234387","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234387","url":null,"abstract":"In this paper, we consider cooperative spectrum sensing in OFDM based on energy detection in MIMO cognitive radio sensor networks. Soft combination of the observed energy values from different cognitive radio users is investigated. Square-law-combining (SLC) is theoretically proved to be nearly optimal in low signal-to-noise ratio (SNR) region, an usual scenario in the context of MIMO cognitive radio sensor networks. In particularly, the OFDM based MIMO cognitive radio sensor networks detect the primary user OFDM signal, where CR receiver is equipped with multiple antennas based energy detector. We observed significant impromvement in primary user detection with SLC based energy detection at the MIMO cognitive radio sensor networks.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115025234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A multi-agent architecture for adaptive E-learning systems using a blackboard agent","authors":"Salah Hammami, H. Mathkour, Entesar A. Almosallam","doi":"10.1109/ICCSIT.2009.5234741","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234741","url":null,"abstract":"This paper describes a multi-agent architecture for adaptive E-learning system. The proposed architecture is composed of several multi-agent levels and intelligent blackboard as an agent. The blackboard agent provides an easy way for agents to communicate and facilitates the cooperation and coordination among them.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115475901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A method of dynamic V&V based on HILS for CTCS3","authors":"Hao Wu, Yindong Ji","doi":"10.1109/ICCSIT.2009.5234985","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234985","url":null,"abstract":"Chinese Train Control System Level 3 (in short, CTCS3) is extremely complicated, and must be reliable and safe. Therefore, its design and development need to be validated by simulation. Particularly, we need to guarantee the reliability of the hardware-in-the-loop simulation (in short, HILS) system via Verification and Validation (V&V) during the Modeling and Simulation (M&S) for each sub-system. First, we analyze the common problem of most current V&V methods that they do not verify the model in this HILS system dynamically and automatically. Then, we present a dynamic V&V method based on HILS, and sequentially discuss the structure of the verifier, the verification algorithm and the validation criterion. Finally, we show how this method is successfully applied in CTCS3 HILS system.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116046710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of portable GNSS baseband logger","authors":"Sheng Wang, Pei Chen, Chao Han","doi":"10.1109/ICCSIT.2009.5234778","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234778","url":null,"abstract":"The design and the implementation of a portable GNSS baseband logging system which can log raw GPS L1 baseband more than one hour or longer is presented. In addition, the design covers GPS (L1, L2)/GLONASS/Galileo/Compass frequency and the maximal sample frequency is about 50MHz.The system is based on Blackfin DSP and uses CompactFlash card for storage. The data is extracted by reading the CompactFlash card to store as a data file. The recorded data file is analyzed by using the FFT to acquire the GPS satellites signals and the position is calculated by using the open source GPS positioning software. The system is very portable because of the CF+DSP design and can also be used on missile and satellite. It provides a good research and development platform for the GNSS software receiver.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122394421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Part-of-speech tagger based on maximum entropy model","authors":"Heyan Huang, Xiao-fei Zhang","doi":"10.1109/ICCSIT.2009.5234787","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234787","url":null,"abstract":"The maximum entropy (ME) conditional models don't force to adhere to the independence assumption such as in Hidden Markov generative models, and thus the ME -based Part-of-Speech (POS) tagger can depend on arbitrary, non-independent features, which are benefit to the POS tagging, without accounting for the distribution of those dependencies. Since ME models are able to flexibly utilize a wide variety of features, the sparse problem of training data is efficiently solved. Experiments show that the POS tagging error rate is reduced by 54.25% in close test and 40.56% in open test over the Hidden-Markov-Model-based baseline, and synchronously an accuracy of 98.01% in close test and 95.56%in open test are obtained.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123015767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhikai Zhao, Jian-Sheng Qian, Jian Cheng, Nan-Nan Lu
{"title":"Frequent itemsets summarization based on neural network","authors":"Zhikai Zhao, Jian-Sheng Qian, Jian Cheng, Nan-Nan Lu","doi":"10.1109/ICCSIT.2009.5234899","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234899","url":null,"abstract":"In this paper, we propose a Neural Network and cluster based method K-ANN-FP to summarize the frequent itemsets to solve the interpretability obstacle of the large number of frequent itemsets. This method assume that the item exit in each frequent itemsets or not to contribute a Boolean matrix, then take the matrix and the corresponding frequency vectors to train the net. We use cluster to shorten the training time and keep the total restoration in a small threshold. We take the experiment on two UCI datasets; the result shows that the proposed method has fine effect both on the restoration error and the running time.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114265197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of CORDIC based RAKE receiver architecture","authors":"K. Chaitanya, P. Muralidhar, C. Rama Rao","doi":"10.1109/ICCSIT.2009.5234625","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234625","url":null,"abstract":"RAKE receiver is used in CDMA-based (Code Division Multiple Access) systems and can combine multipath components, which are time-delayed versions of the original signal transmission. Combining is done in order to improve the signal to noise ratio at the receiver. RAKE receiver attempts to collect the time-shifted versions of the original signal by providing a separate correlation receiver for each of the multipath signals. This can be done due to multipath components are practically uncorrelated from another when their relative propagation delay exceeds a chip period. This paper aims to present a system-on-chip (SoC) solution for RAKE receiver using a CORDIC hardware accelerator. The algorithm is implemented on Cyclone II FPGA device chipped on Altera DE2 board. The inbuilt NIOS II soft core processor of the FPGA device acts as the processor for processing applications. The CORDIC algorithm which computes the trigonometric functions is developed as a custom instruction for the NIOS II processor. This hardware accelerator has drastically improved the performance of the algorithm by about 70% when compared with the pure software implementation. This improvement in the performance is achieved at the cost of area. The performance of RAKE receiver is illustrated using bit error rate (BER) calculations. The RAKE receiver performance is examined and compared using maximal ratio and equal-gain combining techniques.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114288462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"3D dynamic monitoring of collapse area based on CMS-Surpac","authors":"Xiao-ming Liu, Zhouquan Luo, Qing-fa Chen, Xun-fang Zhang, Qingling Zhu","doi":"10.1109/ICCSIT.2009.5234777","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234777","url":null,"abstract":"Combine the actual situation of stope collapse area 56-7# of Dongguashan Copper Mine in china, three-dimensional dynamic monitoring the collapse area twice using Cavity Monitoring System (CMS), taking collapse area measured data as foundation, collapse area three-dimensional model created using Surpac and gain three-dimensional configuration and the actual boundary of the collapse area accurately. Then the bottom structure of stope, the designed stope and ore heap models are established according to the stope design data. Finally, the actual boundary, volume, roof exposure area, collapse range and ore remains of the collapse area are calculated accurately through Boolean operation among the models, a new visible calculation method of integrated information visible calculation for large-scale collapse area is realized effectively. The results show that the longer of the collapse area stay is, the greater of the scope, volume and roof exposure area is. So, it is essential to suspend the blasting around the collapse area and continue to reclaim ore remains. Then backfilling the collapse area and Make plans for reclaim ore body remains.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121854280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software architecture support for biofeedback based in-flight music systems","authors":"Hao Liu, Jun Hu, G.W.M. Rauterberg","doi":"10.1109/ICCSIT.2009.5234489","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234489","url":null,"abstract":"In this paper, we present a software architecture support for biofeedback in-flight music systems to promote stress free air travels. Once the passenger sits in a seat of a flight, his/her bio signals are acquired via non intrusive sensors embedded in the seat and then are modeled into stress states. If the passenger is in a stress state, the system recommends a personalized stress reduction music playlist to the passenger to transfer him/her from the current stress state to the target comfort state; if the passenger is not in a stress state, the system recommends a personalized non stress induction music playlist to keep him/her at the comfort state. If the passenger does not accept the recommendation, he/she can browse the in-flight music system and select preferred music himself/herself.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116842691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pornpon Thamrongrat, L. Preechaveerakul, W. Wettayaprasit
{"title":"A novel Voting Algorithm of multi-class SVM for web page classification","authors":"Pornpon Thamrongrat, L. Preechaveerakul, W. Wettayaprasit","doi":"10.1109/ICCSIT.2009.5234603","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234603","url":null,"abstract":"The increasing numbers of web pages on the cyber world result to the less effectiveness of document retrieval that matches the need of users. The classification of web pages is one of the solutions to solve this problem. This paper proposes VAMSVM_WPC model which is a novel voting algorithm for classifying the web pages, which uses a multi-class SVM method. First, feature is generated from text and title, and then reduces the number of features by two feature selection techniques. Use these two types of features to give input to multi-class SVM. Finally, on the output of SVM, a voting algorithm is used to determine the category of the web pages. Results on CMU benchmark dataset show that using text and title feature with 1vsAll_Voting Algorithm gives the highest F-measure value.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128503955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}