{"title":"A BCH Code with the Distance 11 for Sensornets","authors":"Gaochang Zhao, Xiaolin Yang","doi":"10.1109/CIS.2010.152","DOIUrl":"https://doi.org/10.1109/CIS.2010.152","url":null,"abstract":"Many application scenarios have been revealed with Sensornets. An Error Correcting Code (ECC) will be advantageous to communications in these applications. With the different expecting on efficiency, security, usability, etc, different codes have been constructed for various purposes. The methods based on algebra theory can work well for constructing simple and usability codes. The theory of algebraic geometry can help construct more complex codes with different properties. With the applications of these codes, it is convenient to arrive the purpose in digital communications.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123046066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Neural Network Method for Solving Linear Fractional Programming","authors":"Li Xiao","doi":"10.1109/CIS.2010.15","DOIUrl":"https://doi.org/10.1109/CIS.2010.15","url":null,"abstract":"This paper presents a neural network method for solving a class of linear fractional optimization problems with linear equality constraints. The proposed neural network model have the following two properties. First, it is demonstrated that the set of optima to the problems coincides with the set of equilibria of the neural network models which means the proposed model is complete. Second, it is also shown that the model globally converges to an exact optimal solution for any starting point from the feasible region.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132418320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Industrial Clusters Evolution Research Based on the SGA","authors":"Ya-juan Yang, Pingan Wang, Wenxue Niu","doi":"10.1109/CIS.2010.33","DOIUrl":"https://doi.org/10.1109/CIS.2010.33","url":null,"abstract":"From the evolution view point, the evolving rules of industry clusterings are investigated by multi-agent system modeling method and the genetic algorithms is employed as the learning algorithm of an agent. Firstly, industrial clusterings is formed as a conceptual model which is a virtual multi-agent system, Secondly, the basic genetic algorithm is established for identifying an agent's intelligent learning, Thirdly, simulation results are carried out based on Matlab2007b for the evolving of this multi-agent system, Finally, the research results feedbacks the industrial clusterings: analysis made for the evolution rules of the industry clusters being brought on the interactions of individual agent. The study in this paper shows that the evolution of industrial clusters comes from the complex interaction of agents so as to adapt the environment. Driver for the evolution of industrial clusters is the leading action of initiative enterprize. It is the case that the innovations of these enterprisers drives the whole industry going forward as well as the other members of industry clusterings.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130886330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Electromagnetism-Like Mechanism Algorithm for Constrained Optimization Problem","authors":"Yun Shang, Jing Chen, Qun Wang","doi":"10.1109/CIS.2010.42","DOIUrl":"https://doi.org/10.1109/CIS.2010.42","url":null,"abstract":"To move the sample points towards the optimality according to an attraction-repulsion mechanism, an improved heuristic is proposed. Firstly, the constrained optimization problem is transformed into an unconstrained optimization problem by external point method. Secondly, the formula of the particle charge is re-defined to decrease the amount of calculation and improve the efficiency. Then the formula of the total force vector is also improved in order to reduce the amount of computation and computer overflow. Finally, the improved EM Algorithm is proposed. The numerical results demonstrate that the proposed algorithm is efficient and robust.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129695574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Volume Rendering Algorithm of Data Field","authors":"Xiaofeng Feng, Xiong Shi, Jun Chen","doi":"10.1109/CIS.2010.62","DOIUrl":"https://doi.org/10.1109/CIS.2010.62","url":null,"abstract":"Through constructing an average opacity buffer with the same size of opacity buffer, the visibility of data cell could be estimated by the value of gravity center of this data cell in average opacity buffer. That could make the data cell which completely located in the average opacity buffer cut during the process of volume rendering in object space sequenced irregular data field and could dramatically reduce the data volume and accelerate the rendering process.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129985407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Scenario-Based Architecture for Reliability Design of Artificial Intelligent Software","authors":"Juguo Wang, Guoqi Li, Y. Pu","doi":"10.1109/CIS.2010.9","DOIUrl":"https://doi.org/10.1109/CIS.2010.9","url":null,"abstract":"Artificial Intelligent is well invested both in industry and academic fields. However, the software reliability design for the applications is a big challenge. In this paper, we present a scenario-based architecture for reliability design of artificial intelligent Software. Scenarios are divided into environmental scenarios and structured scenarios. Both of the two kinds of scenarios are considered in the framework. The quantitative reliability of the software based on the framework could be evaluated and predicted.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"324 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132977871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design Verification of BJUT Library Management System with PVS","authors":"Jingang Niu, Shenghui Su","doi":"10.1109/CIS.2010.142","DOIUrl":"https://doi.org/10.1109/CIS.2010.142","url":null,"abstract":"Formal methods are effective in improving the safety and reliability during the development of software. PVS (Prototype Verification System) provides an integrated environment for development and analysis of formal specifications. It consists of a higher order logical specification language integrated with support tools and a powerful theorem prover. In this paper, we specify and verify the design of the library management system of Beijing University of Technology (BJUT) using PVS. Firstly, we describe the requirements of the system and give its Entity Relationship (E-R) model, then design the formal specification of the E-R model and database operations based on the requirement analysis. Some properties essential to the correctness of the system are also given as axioms. Finally, we verify the design by proving some critical properties according to the specifications. In addition, some experiences and skills in using PVS are also described.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132533541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel GEP-Based Multiple-Layers Association Rule Mining Algorithm","authors":"Hong-guo Cai, Chang-an Yuan, Jin-Guang Luo, Jin-de Huang","doi":"10.1109/CIS.2010.22","DOIUrl":"https://doi.org/10.1109/CIS.2010.22","url":null,"abstract":"To mine popular accessed Web pages items and find out their association rule from the Web server Log database for junior users providing recommendation service. A novel GEP-based algorithm for mining multiple-layers association rules was presented. Firstly, takes generalizing technology as a way to value fitness function in GEP (Gene Expression Programming). Then, relying on the significant self-search function of GEP, the most optional species was evolved. The frequent items and association rules in the next deeper layers can be mined by using traditional support-confidence method in sub-database. The algorithm improves on the frame of traditional association rule mining and uses a new evolutionary algorithm for mining association rules. Finally, the validity and efficiency of the method are presented by the application in the paper.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130755481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IMP-Filters of R0-Algebras","authors":"Yong-lin Liu, Mei-ying Ren","doi":"10.1109/CIS.2010.158","DOIUrl":"https://doi.org/10.1109/CIS.2010.158","url":null,"abstract":"The notion of implication $MP$-filters (briefly, $IMP$-filters) in $R_0$-algebras is introduced. The characteristic properties and extension property of $IMP$-filters are obtained. The relations among $IMP$-filters, $PIMP$-filters and $NMP$-filters of $R_0$-algebras are established. Finally, the implicative $R_0$-algebra is completely described by its $IMP$-filters.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133784534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Kind of Handling Constraint Method for Optimization","authors":"Jiechang Wen, Xue-fei Yao","doi":"10.1109/CIS.2010.30","DOIUrl":"https://doi.org/10.1109/CIS.2010.30","url":null,"abstract":"This paper proposes a new kind of constraint handling method for optimization. In the proposed method, a transformation of constraint functions to be another objective function will be discussed in details. With this technique we can transform the constraint problem to be unconstraint multiobjective optimization and use the multi-objective optimization methods to find feasible solutions. The performance of the algorithm is tested on 13 benchmark functions in the literature. The results show that we can find very good solutions by this approach.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"8 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114131656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}