{"title":"Compatability study on broadcasting system interfering with LTE system","authors":"Xiaoyan Xu, Dexiang Meng, Yanming Chen, Jiwei He","doi":"10.1109/CCIS.2012.6664308","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664308","url":null,"abstract":"DTMB is the Chinese TV standard for mobile and fixed terminals used. TD-LTE is a homegrown 4G mobile-telecommunications technology and standard developed by China. This paper evaluates the interference from TV stations to TD-LTE system when the two systems coexist in the UHF band. This paper adopts the Monte-Carlo simulation methodology, and provides the simulation results and analysis.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129242797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Face detection based on improved AdaBoost algorithm in E-Learning","authors":"Wan-sen Wang, Huifang Niu","doi":"10.1109/CCIS.2012.6664311","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664311","url":null,"abstract":"This paper is based on the background of learners' expression recognition in emotion recognition interactive E-Learning. This paper aims at time-consuming of training samples and weights degradation two problems of traditional AdaBoost algorithm, proposes a decile eigenvalue AdaBoost algorithm and joins FPR (False Positive Rate) in this algorithm. The experiments use improved AdaBoost algorithm in E-Learning face detection achieved good effect, and the results provide good conditions for the follow-up E-Learning expression feature extraction.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125378262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Financial websites oriented heuristic anti-phishing research","authors":"Yang Liu, Miao Zhang","doi":"10.1109/CCIS.2012.6664247","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664247","url":null,"abstract":"With the rapid development of Internet technology, phishing techniques are increasingly diversified and the Concealment is growing, so to prevent phishing technology is still urgent and important. In this paper, a heuristic anti-phishing technology against this increasingly prominent security issues is proposed. It will perform six checks in two rounds based on the key elements of the page, including domain name URL, the password field, pictures, links, etc. The effect is obvious, especially for the financial website which has special picture element and teeming-information form.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123364776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An adaptive localization algorithm based on RSSI in wireless sensor networks","authors":"Haihui Zhang, Jiaming Zhang, Huarui Wu","doi":"10.1109/CCIS.2012.6664559","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664559","url":null,"abstract":"Wireless sensor networks (WSN) have been used in various application areas and will be more prosperous in the future. The technology of localization, by which the position of blind node can be acquired, is a significant factor and one of the supporting technologies in WSN. Most of the existing localization algorithms in sensor networks mainly depend on one simple model and can only be used in a given condition, which cannot be adapted to the complex environment and thus restrict their application. In this paper, a novel adaptive scheme, based on the relationship between the RSSI (Received Signal Strength Indication) values and the spread distance of RF signal, is presented by fusing the experience model and the theoretical model in traditional RSSI-Based localization methods for improving the adaptability to different environments and enhances the pointing accuracy in WSN. The key method of this scheme is that through dividing the entire testing set into several pieces and placing characteristic node in every zone, one of the two models will be dynamically selected after comparing the error between the real distance the RF signal traveled and the distance computed from each of the two models by the characteristic node to minimize the positioning error.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"291 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121328921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Estimation of earnings manipulation in U.S. listed companies based on weighted discriminative model","authors":"Xiaoli Nan, Xiao Sun, Tieshan Hou","doi":"10.1109/CCIS.2012.6664619","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664619","url":null,"abstract":"The paper profiles sample of earnings manipulation in U.S. listed companies, identifies their distinguishing characteristics, and estimates a model for detecting manipulation. Compared with whole sample firm, there are small amount of firm engaging in earnings management and data are uneven for analysis, Weighted Discriminative Model (support vector machine) have been selected to solve this problem. SFS and several feature selection methods have been adopted to select proper feature sets for Weighted Discriminative Model. After feature selection and training, the trained Weighted Discriminative Model is suitable for supporting users such as investor and auditor to detect earnings manipulation. It is also helpful to make correct decision on earning judgment when anglicizing listed company's financial report.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126571062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling the interactions between cloud service providers","authors":"D. Kyriazis","doi":"10.1109/CCIS.2012.6664246","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664246","url":null,"abstract":"Cloud computing is becoming a widely adopted underlying technology for the provision of different types of services. As a paradigm building on a set of combined technologies, it enables service provision through the commoditization of IT assets and on-demand usage patterns. Within the application domain, services move away from the monolithic approach into an Internet-scale composite one by exploiting data, atomic services and infrastructures. In this paper an approach is presented for identifying and modeling the interactions between service providers. The presented approach can be exploited during the selection process for composite services based on various metrics that define the corresponding end-to-end Quality of Service (QoS).","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122271395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of Ethernet topology discovery algorithm","authors":"Wei Xiao, Ruixing Wang, Xiaohong Huang","doi":"10.1109/CCIS.2012.6664279","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664279","url":null,"abstract":"Ethernet topology discovery refers to entities discovery in the actual physical network connection (corresponding to the second OSI layer devices). That is, the relation of switches and switches, switches and routers, switches and the hosts. The purpose of Topology Discovery in multi-VLAN Ethernet is to obtain and maintain the existence of network nodes and connections between them and on this basis to map out the entire network topology. This paper proposes an Ethernet data link layer topology discovery algorithm base on MAC Address Table. The algorithm can compute the relation of switches in target network.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116671208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved AODV protocol based on extension lifetime of the Ad Hoc networks","authors":"Jian Kuang, Xianqing Meng, Jiali Bian","doi":"10.1109/CCIS.2012.6664534","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664534","url":null,"abstract":"AODV routing protocol makes least hops as a principle when establishing routes. Nodes in Ad Hoc networks have limited energy. Node will exit the network and cannot provide service when its energy is depleted. In recent years, many works have been taken to save energy of ad hoc networks. This paper presents a method which can prolong network lifetime. In this paper, we take node load, remaining energy and moving speed into account to establish more stable routing and avoid excessive consumption of every node. This method can save energy and balance the energy consumption of each node. At the end of paper, we use ns-2 to test the performance of the improved protocol and the results of simulation show that the improved AODV routing protocol can prolong Ad Hoc network lifetime.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124907394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A method of recognizing the root of an improved dependency tree for the Chinese patent literature","authors":"Yun Zhu, Yaohong Jin","doi":"10.1109/CCIS.2012.6664638","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664638","url":null,"abstract":"Compared with ordinary text, patent text in Chinese often has more complex sentence structure and more ambiguity of multiple verbs, which brings more difficulties in patent machine translation. To deal with these problems, this paper presents an improved dependency tree and a method to recognize the root of this tree for Chinese-English patent machine translation. Based on the theory of Hierarchical Network of Concepts (the HNC theory), some semantic features are used in the recognition. Experiments show that the precision of the recognition is close to 85%.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121476044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation to coordinating degree of systematic battle forces based on DEA","authors":"Yanbiao Chen, Wen-yuan Sun, Yi Zhang","doi":"10.1109/CCIS.2012.6664594","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664594","url":null,"abstract":"Systematic battle troop (SBT) is a complex system composed of its systematic battle forces based on system theory. This paper discussed the systematic battle forces constitutions of the SBT and based on data envelopment analysis (DEA) method, proposed the Systematic battle forces coordinating degree models. Using the models, the one-way state coordinating degree and dynamic coordinating degree of the two sub modules were researched, and on the basis of this, the whole coordinating degree was calculated to evaluate the whole coordinating development results of the SBT among the operation processes. From this, the evaluation to the systematic battle forces of army tactics modules has been solved comparatively and also supplied the scientific method for quickly coordinating grouping of the SBT under the condition of operation.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121491656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}