By Topic

Computational Intelligence and Software Engineering, 2009. CiSE 2009. International Conference on

Date 11-13 Dec. 2009

Filter Results

Displaying Results 1 - 25 of 1294
  • [Title page]

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (179 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (40 KB)
    Freely Available from IEEE
  • Welcome

    Publication Year: 2009, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • Committees

    Publication Year: 2009, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (309 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2009, Page(s): 5
    Request permission for commercial reuse | PDF file iconPDF (300 KB)
    Freely Available from IEEE
  • 1D and CFD Co-Simulation Approach Basing on General Purpose Simulation Software

    Publication Year: 2009, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (393 KB) | HTML iconHTML

    In this paper, we propose a novel approach for ID and CFD co-simulation basing on general purpose simulation software. The shared memory inter-process communication method is selected and the implementing procedure is given. For code reuse the functions are compiled and linked into a static linking library. The approach has been successfully applied to a problem of underwater torpedo launching sys... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    3D City Building Hierarchical Models Representation and Data Organization

    Publication Year: 2009, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (463 KB) | HTML iconHTML

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3D Model Simplification Algorithm Based on Meaningful Segmentation

    Publication Year: 2009, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (435 KB) | HTML iconHTML

    In this paper, we propose a 3D mesh simplification algorithm based on meaningful segmentation and progressive mesh. This method can successfully preserves appearance and closeness of the original mesh during the simplification process. The experiment results support the conclusion obviously. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3D Reconstruction and Visualization for Wing Structure of High-Aspect-Ratio Aircraft

    Publication Year: 2009, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (341 KB) | HTML iconHTML

    The simulation model referred to the paper is wing structure based on high-aspect-ratio near-space aircraft, the multipoint discrete curvature information of wing structure can be detected based on space-division multiplex technique and wavelength division multiplex technique of FBG sense network; In order to apperceive the vibration shape of wing accurately, the interpolation arithmetic of curvat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3D Visualization of Stratum with Faults Based on VTK

    Publication Year: 2009, Page(s):1 - 3
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (547 KB) | HTML iconHTML

    3D stratum can become one useful auxiliary geological tool. Based on this tool, geologist can analyze stratum more accurately and scientific. VTK is an object-oriented visualization class library. 3D stratum is interpolated with Kriging method. Faults are common geological phenomenon. In order to visualize stratum, with Faults, one new interpolation method is proposed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3D-Modeling and Simulation of Mechanics Properties Analysis for 3D-Braided Composites CNGV

    Publication Year: 2009, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB) | HTML iconHTML

    Through analysis of buckling and stress for a composite cylindrical shell, such technique targets as critical load, strength and stress distribution of 3D-braided composite cylindrical shells are calculated numerically. These results indicate that the effect of buckling to the 3D-braided composite CNGV is indubitable. Based on the 4-step 3-D circular braiding procedure and the theoretical analysis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A 3D Virtual World Teaching and Learning Platform for Computer Science Courses in Second Life

    Publication Year: 2009, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB) | HTML iconHTML

    Key factors contributing to the high attrition rate for computer science students include loss of interest in material and lack of practice. In order to better engage students and improve retention rate, we have developed a novel teaching and learning platform in the Second Life to immerse and engage students in the same way that today's best video games grab and keep players' attention. Our goal ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Behavior Based Modeling Process and Verification

    Publication Year: 2009, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (261 KB) | HTML iconHTML

    The correctness of software behaviors determines whether the software underdevelopment could meet the goal of stockholders and developers. Developing requirements models effectively for large scale and complex systems and describing their behaviors precisely are both obstacles in requirements engineering (RE) domain. Based on our research on software behaviors, we put forward a formal language-beh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Bilateral Teleoperation System for Planetary Rovers

    Publication Year: 2009, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB) | HTML iconHTML

    In this paper, a bilateral teleoperation system (BTS) is proposed for planetary rover remote control and operation. This is a continuation of the work presented in on computer-simulated virtual environment, that can be used as a predictive display module in the BTS. In the proposed system, a haptic device is used by the human operators to control planetary rovers as driving a car. Dynamic model of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Bit-Encoding Approach for Frequent Sequence Mining

    Publication Year: 2009, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    Sequential pattern mining is an important data mining problem with broad applications. And the classic algorithm for this problem is PrefixSpan, which is a projection-based, sequential pattern-growth approach. But it must scan projected database once in order to find a local frequent item, it may cost much time when the database is large. In this paper, we propose an encoding-based, sequential pat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Business Component Model for Domain-Specific Software

    Publication Year: 2009, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    It is of practical significance and great value to find a component model for integrating software. Through the induction from a class of oil-drilling engineering applications, we proposed a modeling technique for domain-specific software based on business component component. In this paper, a goal-tree based domain-specific model for oil-drilling engineering is suggested. It offers the benefits o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Case Study about the Information Technology Application in Fundamental-Computing Curricula in BCBUU

    Publication Year: 2009, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    Information technology consists of modern computer technology, network technology, communication technology, multimedia technology, database technology and artificial intelligence technology. They are widely used in the teaching process. As an example, the application of information technology in fundamental-computing curricula in BCBUU is studied. The features and functions of Lingbo multimedia n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Case Study on Tailoring Software Process for Characteristics Based on RUP

    Publication Year: 2009, Page(s):1 - 5
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    Nowadays, "resources overloading" is common when using standard processes, such as RUP (rational unified process) , to develop software. In order to improve its applicability and effectiveness, tailoring software process is very necessary. This paper presents how to tailor software process based on RUP appropriately for software characteristics. It has two parts to make the process be adaptable to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Circular Buffer Mode Design Based on BU-61580

    Publication Year: 2009, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (259 KB) | HTML iconHTML

    Most of BU-61580 storage mode that used formerly transmitted and received data with single message mode. In this paper, we use the circular buffer mode to implement data receiving based on the single message mode, thus greatly improve the efficiency of data transmission. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Cluster-Based Data Gathering Protocol in Heterogeneous Wireless Sensor Networks

    Publication Year: 2009, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (358 KB) | HTML iconHTML

    The most important issue in designing a data gathering algorithm is how to save energy of sensor nodes while meeting the requirement of application such as sensing are coverage. On the other hand, in the real applications, it is unrealistic to guarantee all sensors have the same energy because they have different energy consumption. In this paper, A cluster based data gathering protocol for hetero... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Clustering Hierarchy Based on Data Fusion in Wireless Sensor Networks

    Publication Year: 2009, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    For the sake of avoiding the data abundance and balancing the energy consumption in wireless sensor networks, a data fusion clustering hierarchy based on data fusion (CHDF) is proposed. The clustering module and multi-hop tree are designed for data transmission. The result of simulation experiment shows that the proposed CHDF can balance energy consumption and prolong the lifetime of network. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A CMOS Elliptic Switched-Current Filter Using Bilinear Implementation

    Publication Year: 2009, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (255 KB) | HTML iconHTML

    A CMOS elliptic switched-current (SI) ladder filter, employing bilinear SI integrator, has been proposed. The filter is based on the bilinear S-*Z transformation ,which results in a simple circuit realization using switched-current. Cutoff frequency of the filter is 1 MHz and with bilinear implementation, we achieve 1 db passband ripple and stopband attenuation greater than 30 db. A 5th-order SI f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Collaborative Filtering Recommendation Based on User Profile Weight and Time Weight

    Publication Year: 2009, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (255 KB) | HTML iconHTML

    Collaborative Filtering (CF) has proven to be the most widely used recommendation technology. However, the conventional CF ignores the impacts of user similarity caused by user profile, and it also can't reflect the changes of user's interests. To solve this problem, two weights are proposed: the user profile weight and the time weight. Also, the two weights are combined together and applied to a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Combinatorial Search Method Based on Harmony Search Algorithm and Particle Swarm Optimization in Slope Stability Analysis

    Publication Year: 2009, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB) | HTML iconHTML

    The parameters used in harmony search algorithm and particle swarm optimization are found to be of importance to the results, however, there are no theoretical bases or formulae to determine the values of the parameters. A combinatorial method is proposed which combing the harmony search procedure and the particle swarm optimization for the determination of critical slip surfaces of soil slopes. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Comparison Study of Missing Value Processing Methods in Time Series Data Mining

    Publication Year: 2009, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (206 KB) | HTML iconHTML

    There are many methods for dealing with missing value on time series mining. The regression model is better than other methods when the variables of the data are correlative. This paper uses the method of mean interpolation and one variable linear regression, multivariate linear regression and iterative regression method of regression interpolation to deal with missing value of hydrological time s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.