{"title":"Implementation of String Recognition Algorithm Based on the Principle of Artificial Immunology","authors":"Junmin Ye, Junjie Wang, Wei Dong, Zhichang Qi","doi":"10.1109/ICYCS.2008.200","DOIUrl":"https://doi.org/10.1109/ICYCS.2008.200","url":null,"abstract":"Artificial immune system simulates the principle of lymphocytes in the natural immune system, detects abnormality in objects to be tested through the immune response mechanism. Based on the r-row-matching algorithm, we propose a two-stage r-row-matching algorithm. According to the concept of immunity, the immunity process and mechanism, we design self-set and detector-set by using a sliding window. On this basis, the self-set, the detector-set and other generating algorithm, as well as the algorithm of detector-set training are implemented. Finally, based on the data structure of sliding window, the string recognition algorithm is implemented. Experiments show that the algorithm can effectively carry out string identification.","PeriodicalId":370660,"journal":{"name":"2008 The 9th International Conference for Young Computer Scientists","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121244973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Approach to Mobile Positioning Tracking","authors":"Wensheng Tang, Wangqiu Kuang, Dingxing Zhang","doi":"10.1109/ICYCS.2008.437","DOIUrl":"https://doi.org/10.1109/ICYCS.2008.437","url":null,"abstract":"This paper presents a new approach to mobile position tracking in wireless sensor networks (WSN). The noise is modeled as the adversary of estimator that has the goal of maximizing the estimation error, and the estimator gain and adversary gain is derived to yields a saddle point so that the mobile position is estimated. The simulation results show that the new approach results in the more accurate estimation for the mobile position and velocity.","PeriodicalId":370660,"journal":{"name":"2008 The 9th International Conference for Young Computer Scientists","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127271899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fast Mutation Operator Applied in Detector Generating Strategy","authors":"Xingbao Liu, Zixing Cai, Chixin Xiao","doi":"10.1109/ICYCS.2008.399","DOIUrl":"https://doi.org/10.1109/ICYCS.2008.399","url":null,"abstract":"Inspired by the stimulated-responding mutation process of gene segment, a new mutation operator is proposed. The main characteristic is its mutation method, when one bit is mutated then the following contiguous bits are to be mutated according to the mutated, which make it owns better capability of local search. At the same time a new algorithm, named Contiguous somatic stimulated mutation algorithm (CSSMA), is given based on the novel mutation operator. Experiments showed, the CSSMA outperforms than some classical algorithms in term of the detective rate and time cost.","PeriodicalId":370660,"journal":{"name":"2008 The 9th International Conference for Young Computer Scientists","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127485665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multipath-Based Segment-by-Segment Routing Protocol in MANETs","authors":"Yuan Lu, Guojun Wang, W. Jia, Sancheng Peng","doi":"10.1109/ICYCS.2008.430","DOIUrl":"https://doi.org/10.1109/ICYCS.2008.430","url":null,"abstract":"We propose a multipath-based segment-by-segment routing protocol in mobile ad-hoc networks (M-SSR). In M-SSR, a path is divided into multiple segments, in each of which multiple node-disjoint paths are discovered and routing maintenance can be performed independently. The proposed protocol can decrease congestion, optimize bandwidth and improve the sharing rate of channel by using multiple paths to transmit data packets in parallel. It uses segment-by- segment scheme to decrease routing control overhead and improve the network scalability. Simulation studies show that the proposed protocol can balance the load of the network and can be adaptive to the change of the network topology effectively, and also improve the survivability, stability and success ratio for routing.","PeriodicalId":370660,"journal":{"name":"2008 The 9th International Conference for Young Computer Scientists","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124761731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Local Activity Theory to Rossler CNN Model","authors":"Yan Meng, L. Min, Yu Ji","doi":"10.1109/ICYCS.2008.405","DOIUrl":"https://doi.org/10.1109/ICYCS.2008.405","url":null,"abstract":"Coupled nonlinear dynamical systems (CNDpsilas) have been widely studied in the recent years. However the dynamical properties of the CNDpsilas are difficult to deal with. The local activity principle of the Cellular Nonlinear Network (CNN) introduced by Chua has provided a powerful tool for studying the emergence of complex patterns in a homogeneous lattice formed by coupled cells. Based on the Rossler equation introduced by Rossler, this paper establishes a two dimensional coupled Rossler CNN system. Using the analytical criteria for the local activity calculates the chaos edge of the Rossler CNN system. The numerical simulations show that the emergence may exist if the selected cell parameters are nearby the edge of chaos domain. The Rossler CNN can exhibit periodicity and chaos.","PeriodicalId":370660,"journal":{"name":"2008 The 9th International Conference for Young Computer Scientists","volume":"451 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125782726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Algorithm for Dynamic Optimal Path Selection with Constraint","authors":"Xiaogang Qi, Lifang Liu, Sanyang Liu","doi":"10.1109/ICYCS.2008.21","DOIUrl":"https://doi.org/10.1109/ICYCS.2008.21","url":null,"abstract":"Optimal path selection (OPS) with unique or multiple constraints is one of key issues in the dynamic networks, in which arc' weight metric is an interval number. Firstly, some existing solutions for this problem are analyzed, and some shortages and flaws are pointed out. Secondly, regularities of distribution of the summation of multiple independent random numbers with same and different distributions are analyzed and formulated by data simulating and fitting. Furthermore, an algorithm named DOPS_Const for the OPS with an additive arc weight is proposed based on the above analysis, and the randomness and subjectivity in path selection can be avoided according to the algorithm. Finally, the theoretical and statistical probabilities of the selected path satisfying the given constraint are compared, and our algorithm is feasible and valid to solve the OPS with constraint in the dynamic networks.","PeriodicalId":370660,"journal":{"name":"2008 The 9th International Conference for Young Computer Scientists","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123224600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Approach to Software Architecture Testing","authors":"L. Lun, Hui Xu","doi":"10.1109/ICYCS.2008.310","DOIUrl":"https://doi.org/10.1109/ICYCS.2008.310","url":null,"abstract":"Software architecture has emerged as an important sub-discipline of software engineering. This paper proposes a novel software architecture testing technology using pi calculus. pi calculus is of rigorous mathematical foundation and well-defined semantics. Petri net provides a graphical description technique that is easy to understand and carry on analysis. We make pi calculus combined with Petri net and propose mapping relationship based on them. Then we will introduce pi Behavior Graph using the mapping relationship and pi-ADL that takes its roots in previous works concerning the use of pi calculus as semantic foundation for architecture description languages. We propose seven testing coverage criteria from black-box and white-box perspectives and give its formal description in piBG respectively. At last, we build a prototype tool that implements the pi-ADL approach to the specification of software architecture and generates test paths. We use TRMCS as a typical architecture model to illustrate our testing technology.","PeriodicalId":370660,"journal":{"name":"2008 The 9th International Conference for Young Computer Scientists","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125525813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Effective Approach for Multi-Rectangle Detection","authors":"Yueping He, Ziqiang Li","doi":"10.1109/ICYCS.2008.482","DOIUrl":"https://doi.org/10.1109/ICYCS.2008.482","url":null,"abstract":"For multi-rectangle detection, this paper proposes a new approach using restricted group Hough transform (RGHT) and rectangle's properties. Every image pixel is grouped and used RGHT firstly. Then the Hough peaks are extracted and used to find possible rectangles. And the possible rectangles are affirmed true by mechanism of evidence collection at last. Numerical experiments demonstrate that this approach has better performance compared with other existing algorithms.","PeriodicalId":370660,"journal":{"name":"2008 The 9th International Conference for Young Computer Scientists","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115030356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Method of Financial Risk Management Based on Multifractal","authors":"Shuzhang Ma, Aiping Jiang","doi":"10.1109/ICYCS.2008.283","DOIUrl":"https://doi.org/10.1109/ICYCS.2008.283","url":null,"abstract":"The key point of financial risk management is whether the fluctuation characteristics of financial asset's price can be grasped and the turning point of market be forecasted or not. In this paper, the high-frequency Hang Seng index (HSI) in Hong Kong stock market was analyzed by multifractal. The correlation of the parameters of the multifractal spectra with the variation of stock index was studied statistically. We find that closing index fluctuations is related to a main parameter of multifractal spectrum of daily high frequency (per 5min) closing index of HSI Deltaf. A forecasting algorithm of stock index turning point based on Deltaf parameters of multifractal spectrum of the previous 3 day is proposed. According to the results of test, this algorithm's accuracy can reach up to 90.5%.","PeriodicalId":370660,"journal":{"name":"2008 The 9th International Conference for Young Computer Scientists","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116421526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Video Mosaic Block Detection Based on Template Matching and SVM","authors":"Xiaodong Huang, Huadong Ma, Haidong Yuan","doi":"10.1109/ICYCS.2008.69","DOIUrl":"https://doi.org/10.1109/ICYCS.2008.69","url":null,"abstract":"Mosaic block is easily occurred in the TV signals, which will cause the degraded video. In this paper, we propose an automatic degraded video detection approach based on support vector machine and template matching to detecting mosaic block in video. We develop a detection algorithm based on a cascade of processing steps as follows. First, we use DWT to remove the vertical high frequency of a frame and use the Canny edge algorithm to detect the frame. Second, we use the template matching to find the candidate mosaic block coordinate. Third, a SVM classifier is employed to distinguish mosaic block from the candidate ones. When the number of mosaic block is higher than a threshold, we can regard the frame as the frame with mosaic block. Experimental results show that the proposed algorithm has good performance.","PeriodicalId":370660,"journal":{"name":"2008 The 9th International Conference for Young Computer Scientists","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122407756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}