2008 International Symposiums on Information Processing最新文献

筛选
英文 中文
An Inventory Decision Model with Variable Lead Time and Continuous Price Decrease 可变前置期和持续降价的库存决策模型
2008 International Symposiums on Information Processing Pub Date : 2008-05-23 DOI: 10.1109/ISIP.2008.31
Chuanxu Wang
{"title":"An Inventory Decision Model with Variable Lead Time and Continuous Price Decrease","authors":"Chuanxu Wang","doi":"10.1109/ISIP.2008.31","DOIUrl":"https://doi.org/10.1109/ISIP.2008.31","url":null,"abstract":"This paper develops an inventory model with continuous product price decrease and variable lead time for minimizing the sum of the ordering cost, purchasing cost, holding cost, shortage cost and the lead time crashing cost, in which the number of equal length cycles, the order quantity and lead time are decision variables. An accurate approximate solution algorithm for the model is developed for finding the optimal values of decision variables. The effectiveness of the model is illustrated and the effects of changes in model parameters are analyzed with a numerical example.","PeriodicalId":103284,"journal":{"name":"2008 International Symposiums on Information Processing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128122360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study of Security Investment Optimizing Combination Based on PSACO 基于PSACO的证券投资优化组合研究
2008 International Symposiums on Information Processing Pub Date : 2008-05-23 DOI: 10.1109/ISIP.2008.119
Jinyu Tian, Jianhong Ma
{"title":"Study of Security Investment Optimizing Combination Based on PSACO","authors":"Jinyu Tian, Jianhong Ma","doi":"10.1109/ISIP.2008.119","DOIUrl":"https://doi.org/10.1109/ISIP.2008.119","url":null,"abstract":"Based on Markowitzpsila theory of asset portfolio, a multi-factor and optimal model for portfolio investment in the condition of considering friction factors in China security market is established. A hybrid methodology PSACO (particle swarm ant colony optimization) combining particle swarm optimization with ant colony optimization algorithm is applied to solve the model. Both particle swarm optimization (PSO) and ant colony optimization (ACO) are co-operative, population-based global search swarm intelligence meta-heuristics. PSO is inspired by social behavior of bird flocking or fish schooling, while ACO imitates foraging behavior of real life ants. In this study, we employ a pheromone-guided mechanism to improve the performance of PSO method. Additionally, the model is implemented on the demonstrated research of the index stock of index 30, the result could provide scientific foundation for security investment.","PeriodicalId":103284,"journal":{"name":"2008 International Symposiums on Information Processing","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132960072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On the Optimality of MAP Bit Detection of Coded M-PSK Signals 编码M-PSK信号MAP位检测的最优性研究
2008 International Symposiums on Information Processing Pub Date : 2008-05-23 DOI: 10.1109/ISIP.2008.66
Jun Zhang, K. Shi, Hua Peng
{"title":"On the Optimality of MAP Bit Detection of Coded M-PSK Signals","authors":"Jun Zhang, K. Shi, Hua Peng","doi":"10.1109/ISIP.2008.66","DOIUrl":"https://doi.org/10.1109/ISIP.2008.66","url":null,"abstract":"The optimality of the maximum a posteriori probability(MAP) bit detection for differentially encoded M-PSK signals over static non-ISI channels is emphasized, in which the demodulator computes loglikelihood ratio (LLR) of individual coded bits directly, but not via transforming those successive detected symbolspsila LLR into bitspsila LLR as the conventional methods. As a representative, the designs and analyses focus on the convolutionally encoded pi/4-DQPSK signal. In order to demonstrate the optimality comparatively, the other two types of soft demodulators derived under the MAP symbol detection criterion and the MAP sequence detection criterion are also addressed. Through simulations the noticeable performance of the MAP bit detection are illustrated, especially in low SNR scenarios.","PeriodicalId":103284,"journal":{"name":"2008 International Symposiums on Information Processing","volume":"266 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132112932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Gray Scale Watermarking Algorithm Based on LU Factorization 基于LU分解的灰度水印算法
2008 International Symposiums on Information Processing Pub Date : 2008-05-23 DOI: 10.1109/ISIP.2008.149
Shumei Wang, W. Zhao, Zhicheng Wang
{"title":"A Gray Scale Watermarking Algorithm Based on LU Factorization","authors":"Shumei Wang, W. Zhao, Zhicheng Wang","doi":"10.1109/ISIP.2008.149","DOIUrl":"https://doi.org/10.1109/ISIP.2008.149","url":null,"abstract":"LU Factorization is a triangular decomposition approach of non-singular matrix, and the digital image can be seen as a matrix. Based on the characteristics of the LU Factorization, this paper presents a novel robust watermarking algorithm in wavelet domain of digital image. Firstly, the original image will be transformed into wavelet domain by DWT, and the level of which is decided by the volume of watermark information. Next to do is computing the variances of the last details, and select detail matrix information whose variance is the max one among details. Then it will be preprocessed, if the image matrix is singular matrix, it will be converted into a non-singular matrix by permutation matrix which can be as a key; Secondly, the preprocessed image is decomposed into two triangular matrices including the upper one and the lower one with 1's on the main diagonal, and which have good distribution; Finally, the scrambled meaningful watermark is embedded into the non-zero pixels of two triangular matrixes adaptively. The experimental results show that the algorithm is simple, with better robustness and security.","PeriodicalId":103284,"journal":{"name":"2008 International Symposiums on Information Processing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124096632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Learning from Positive and Unlabeled Examples: A Survey 从积极和未标记的例子中学习:一项调查
2008 International Symposiums on Information Processing Pub Date : 2008-05-23 DOI: 10.1109/ISIP.2008.79
Bangzuo Zhang, Wanli Zuo
{"title":"Learning from Positive and Unlabeled Examples: A Survey","authors":"Bangzuo Zhang, Wanli Zuo","doi":"10.1109/ISIP.2008.79","DOIUrl":"https://doi.org/10.1109/ISIP.2008.79","url":null,"abstract":"This paper surveys the existing method of learning from positive and unlabeled examples. We divide the existing methods into three families, and review the main algorithms, respectively. The first Family of methods takes a two-step strategy, extracting some reliable negative examples, and then applying the supervised or semi-supervised learning method. The second family of methods estimates statistical queries over positive and unlabeled examples. The third family of methods reduces this problem to the problem of learning with high one-sided noise by treating the unlabeled set as noisy negative examples. Finally, we conclude and issue future works.","PeriodicalId":103284,"journal":{"name":"2008 International Symposiums on Information Processing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127885218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 72
Research on Automatic Classification for Deep Web Query Interfaces 深度网络查询接口的自动分类研究
2008 International Symposiums on Information Processing Pub Date : 2008-05-23 DOI: 10.1109/ISIP.2008.140
Peiguang Lin, Y. Du, Xiaohua Tan, Chao Lv
{"title":"Research on Automatic Classification for Deep Web Query Interfaces","authors":"Peiguang Lin, Y. Du, Xiaohua Tan, Chao Lv","doi":"10.1109/ISIP.2008.140","DOIUrl":"https://doi.org/10.1109/ISIP.2008.140","url":null,"abstract":"In recent years, the Web is \"deepened\" rapidly and users have to browse quantities of Web sites to access Web databases in a specific domain. So, to build an unified query interface which integrates query interfaces of a domain to access various Web databases at the same time becomes a very important issue. In this paper, the schema characteristics of query interfaces and common attributes in a same domain are firstly analyzed, and it also gives a new representation of query interface, then the definition of \"Form term\" and \"Function term\" are proposed ,and a new similarity computing algorithm, literal and semantic based similarity computing (LSSC) is proposed, which is based on the two definitions. Secondly, a clustering algorithm for Deep Web query interfaces is given by combining LSSC and NQ algorithm: LSSC-NQ. Finally, experiments show that this algorithm can give accurate similarity computing, and cluster query interfaces efficiently, reliably and quickly.","PeriodicalId":103284,"journal":{"name":"2008 International Symposiums on Information Processing","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128914735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
The Non-market Value Assessment in E-Learning E-Learning中的非市场价值评估
2008 International Symposiums on Information Processing Pub Date : 2008-05-23 DOI: 10.1109/ISIP.2008.14
Lei Yang, Xiaopeng Zhang
{"title":"The Non-market Value Assessment in E-Learning","authors":"Lei Yang, Xiaopeng Zhang","doi":"10.1109/ISIP.2008.14","DOIUrl":"https://doi.org/10.1109/ISIP.2008.14","url":null,"abstract":"The amount of capital investment made by Chinese government on e-learning is on the rise annually. The value generated from these investments has attracted the great attention in the entire society. However, e-learningpsilas output values often exist as a form of non-market values with uncertainty and there are few evaluation methods at present. It is important to find an effective and reasonable approach to e-learning value assessment. In this paper, the features of e-learning as a kind of public product are analyzed, and a general economic model of userspsila WTP (willingness to pay) is set up on the basis of alternation between traditional processes in education and e-learning then a brand new non-market value estimation method and its operational procedures are brought up . Finally, a case of WTP on e-recourse pools is given.","PeriodicalId":103284,"journal":{"name":"2008 International Symposiums on Information Processing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129322359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Trust-Based Access Control with Feedback 基于信任的反馈访问控制
2008 International Symposiums on Information Processing Pub Date : 2008-05-23 DOI: 10.1109/ISIP.2008.120
Xiaoning Ma, Zhiyong Feng, Chao Xu, Jiafang Wang
{"title":"A Trust-Based Access Control with Feedback","authors":"Xiaoning Ma, Zhiyong Feng, Chao Xu, Jiafang Wang","doi":"10.1109/ISIP.2008.120","DOIUrl":"https://doi.org/10.1109/ISIP.2008.120","url":null,"abstract":"Now, the research about access control is still active. Some researchers discuss access control from new point of view. Trust has natural connection with access control. It will promote development of access control to use trust. There is a kind of access control problem we call ldquogamblingrdquo access control. After provider of service affords service to requestor, probability that provider gets designed results is close to probability that provider gets undersigned results. Faced to request, provider has to gamble. The traditional access control could not resolve this kind of problem. On the contrary, trust-based access control is suitable for this problem. In this paper, based on social cognitive theory, we design a trust-based access control (TBAC) with feedback. Based on providerpsilas goals, TBAC looks on trust to requestor as standard to whether give requestor the corresponding warranty or not. Besides, we use environment, feedback, and forecast, to realize adaptability.","PeriodicalId":103284,"journal":{"name":"2008 International Symposiums on Information Processing","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117192097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
An Automatic Voice Query System for Bank Based on Telephone Network 基于电话网络的银行语音自动查询系统
2008 International Symposiums on Information Processing Pub Date : 2008-05-23 DOI: 10.1109/ISIP.2008.97
Dongming Li, Jing Zhang, Li Zhang, Yaju Liu, Bo Du
{"title":"An Automatic Voice Query System for Bank Based on Telephone Network","authors":"Dongming Li, Jing Zhang, Li Zhang, Yaju Liu, Bo Du","doi":"10.1109/ISIP.2008.97","DOIUrl":"https://doi.org/10.1109/ISIP.2008.97","url":null,"abstract":"Automatic voice query system for bank by phone was a hi-tech product based on computer technology, electronic communication technology and speech synthesis technology. The hardware design of this system adopted modularization design scheme, which centered on SCM AT89C51, and controlled the phone transceiver chip MT8870 and voice chip ISD4004, realizing voice query for bank account by phone remote control. This paper mainly analyzed and designed several circuits such as ringing detection circuit, on-hook and off-hook control circuit, amplified-filter circuit, receiving circuit, voice circuit and the connection circuit between PC and SCM; it finally gave the realization process of the systempsilas software.","PeriodicalId":103284,"journal":{"name":"2008 International Symposiums on Information Processing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114327874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on the Optimization Measures of Reducing Supply Chain Cooperation Risks 降低供应链合作风险的优化措施研究
2008 International Symposiums on Information Processing Pub Date : 2008-05-23 DOI: 10.1109/ISIP.2008.16
Haiyan Yan, Bo Xu, Chen Wang
{"title":"Study on the Optimization Measures of Reducing Supply Chain Cooperation Risks","authors":"Haiyan Yan, Bo Xu, Chen Wang","doi":"10.1109/ISIP.2008.16","DOIUrl":"https://doi.org/10.1109/ISIP.2008.16","url":null,"abstract":"In todaypsilas dynamic business environment, the competition pattern is essentially the competition of one supply chain with another rather than single enterprise. Thus, collaborations in enterprises emerge as the times require. Along with the benefits brought by these kinds of collaborations, the risks arising in the cooperation process produce extra costs as well. Therefore, cost control is extending from the internal microscopic focus to the external interactive processes. The traditional cost control methods have limitations in coping with the new risks resulted from the supply chain. By taking into account the external risks level, this paper constitutes a cost control model based on supply chain operational risks which has improved the Activity-based costing and put forward a new perspective in supply chain cost optimization.","PeriodicalId":103284,"journal":{"name":"2008 International Symposiums on Information Processing","volume":"26 Pt 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114598902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信