{"title":"An Inventory Decision Model with Variable Lead Time and Continuous Price Decrease","authors":"Chuanxu Wang","doi":"10.1109/ISIP.2008.31","DOIUrl":"https://doi.org/10.1109/ISIP.2008.31","url":null,"abstract":"This paper develops an inventory model with continuous product price decrease and variable lead time for minimizing the sum of the ordering cost, purchasing cost, holding cost, shortage cost and the lead time crashing cost, in which the number of equal length cycles, the order quantity and lead time are decision variables. An accurate approximate solution algorithm for the model is developed for finding the optimal values of decision variables. The effectiveness of the model is illustrated and the effects of changes in model parameters are analyzed with a numerical example.","PeriodicalId":103284,"journal":{"name":"2008 International Symposiums on Information Processing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128122360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study of Security Investment Optimizing Combination Based on PSACO","authors":"Jinyu Tian, Jianhong Ma","doi":"10.1109/ISIP.2008.119","DOIUrl":"https://doi.org/10.1109/ISIP.2008.119","url":null,"abstract":"Based on Markowitzpsila theory of asset portfolio, a multi-factor and optimal model for portfolio investment in the condition of considering friction factors in China security market is established. A hybrid methodology PSACO (particle swarm ant colony optimization) combining particle swarm optimization with ant colony optimization algorithm is applied to solve the model. Both particle swarm optimization (PSO) and ant colony optimization (ACO) are co-operative, population-based global search swarm intelligence meta-heuristics. PSO is inspired by social behavior of bird flocking or fish schooling, while ACO imitates foraging behavior of real life ants. In this study, we employ a pheromone-guided mechanism to improve the performance of PSO method. Additionally, the model is implemented on the demonstrated research of the index stock of index 30, the result could provide scientific foundation for security investment.","PeriodicalId":103284,"journal":{"name":"2008 International Symposiums on Information Processing","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132960072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Optimality of MAP Bit Detection of Coded M-PSK Signals","authors":"Jun Zhang, K. Shi, Hua Peng","doi":"10.1109/ISIP.2008.66","DOIUrl":"https://doi.org/10.1109/ISIP.2008.66","url":null,"abstract":"The optimality of the maximum a posteriori probability(MAP) bit detection for differentially encoded M-PSK signals over static non-ISI channels is emphasized, in which the demodulator computes loglikelihood ratio (LLR) of individual coded bits directly, but not via transforming those successive detected symbolspsila LLR into bitspsila LLR as the conventional methods. As a representative, the designs and analyses focus on the convolutionally encoded pi/4-DQPSK signal. In order to demonstrate the optimality comparatively, the other two types of soft demodulators derived under the MAP symbol detection criterion and the MAP sequence detection criterion are also addressed. Through simulations the noticeable performance of the MAP bit detection are illustrated, especially in low SNR scenarios.","PeriodicalId":103284,"journal":{"name":"2008 International Symposiums on Information Processing","volume":"266 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132112932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Gray Scale Watermarking Algorithm Based on LU Factorization","authors":"Shumei Wang, W. Zhao, Zhicheng Wang","doi":"10.1109/ISIP.2008.149","DOIUrl":"https://doi.org/10.1109/ISIP.2008.149","url":null,"abstract":"LU Factorization is a triangular decomposition approach of non-singular matrix, and the digital image can be seen as a matrix. Based on the characteristics of the LU Factorization, this paper presents a novel robust watermarking algorithm in wavelet domain of digital image. Firstly, the original image will be transformed into wavelet domain by DWT, and the level of which is decided by the volume of watermark information. Next to do is computing the variances of the last details, and select detail matrix information whose variance is the max one among details. Then it will be preprocessed, if the image matrix is singular matrix, it will be converted into a non-singular matrix by permutation matrix which can be as a key; Secondly, the preprocessed image is decomposed into two triangular matrices including the upper one and the lower one with 1's on the main diagonal, and which have good distribution; Finally, the scrambled meaningful watermark is embedded into the non-zero pixels of two triangular matrixes adaptively. The experimental results show that the algorithm is simple, with better robustness and security.","PeriodicalId":103284,"journal":{"name":"2008 International Symposiums on Information Processing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124096632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Learning from Positive and Unlabeled Examples: A Survey","authors":"Bangzuo Zhang, Wanli Zuo","doi":"10.1109/ISIP.2008.79","DOIUrl":"https://doi.org/10.1109/ISIP.2008.79","url":null,"abstract":"This paper surveys the existing method of learning from positive and unlabeled examples. We divide the existing methods into three families, and review the main algorithms, respectively. The first Family of methods takes a two-step strategy, extracting some reliable negative examples, and then applying the supervised or semi-supervised learning method. The second family of methods estimates statistical queries over positive and unlabeled examples. The third family of methods reduces this problem to the problem of learning with high one-sided noise by treating the unlabeled set as noisy negative examples. Finally, we conclude and issue future works.","PeriodicalId":103284,"journal":{"name":"2008 International Symposiums on Information Processing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127885218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Automatic Classification for Deep Web Query Interfaces","authors":"Peiguang Lin, Y. Du, Xiaohua Tan, Chao Lv","doi":"10.1109/ISIP.2008.140","DOIUrl":"https://doi.org/10.1109/ISIP.2008.140","url":null,"abstract":"In recent years, the Web is \"deepened\" rapidly and users have to browse quantities of Web sites to access Web databases in a specific domain. So, to build an unified query interface which integrates query interfaces of a domain to access various Web databases at the same time becomes a very important issue. In this paper, the schema characteristics of query interfaces and common attributes in a same domain are firstly analyzed, and it also gives a new representation of query interface, then the definition of \"Form term\" and \"Function term\" are proposed ,and a new similarity computing algorithm, literal and semantic based similarity computing (LSSC) is proposed, which is based on the two definitions. Secondly, a clustering algorithm for Deep Web query interfaces is given by combining LSSC and NQ algorithm: LSSC-NQ. Finally, experiments show that this algorithm can give accurate similarity computing, and cluster query interfaces efficiently, reliably and quickly.","PeriodicalId":103284,"journal":{"name":"2008 International Symposiums on Information Processing","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128914735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Non-market Value Assessment in E-Learning","authors":"Lei Yang, Xiaopeng Zhang","doi":"10.1109/ISIP.2008.14","DOIUrl":"https://doi.org/10.1109/ISIP.2008.14","url":null,"abstract":"The amount of capital investment made by Chinese government on e-learning is on the rise annually. The value generated from these investments has attracted the great attention in the entire society. However, e-learningpsilas output values often exist as a form of non-market values with uncertainty and there are few evaluation methods at present. It is important to find an effective and reasonable approach to e-learning value assessment. In this paper, the features of e-learning as a kind of public product are analyzed, and a general economic model of userspsila WTP (willingness to pay) is set up on the basis of alternation between traditional processes in education and e-learning then a brand new non-market value estimation method and its operational procedures are brought up . Finally, a case of WTP on e-recourse pools is given.","PeriodicalId":103284,"journal":{"name":"2008 International Symposiums on Information Processing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129322359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Trust-Based Access Control with Feedback","authors":"Xiaoning Ma, Zhiyong Feng, Chao Xu, Jiafang Wang","doi":"10.1109/ISIP.2008.120","DOIUrl":"https://doi.org/10.1109/ISIP.2008.120","url":null,"abstract":"Now, the research about access control is still active. Some researchers discuss access control from new point of view. Trust has natural connection with access control. It will promote development of access control to use trust. There is a kind of access control problem we call ldquogamblingrdquo access control. After provider of service affords service to requestor, probability that provider gets designed results is close to probability that provider gets undersigned results. Faced to request, provider has to gamble. The traditional access control could not resolve this kind of problem. On the contrary, trust-based access control is suitable for this problem. In this paper, based on social cognitive theory, we design a trust-based access control (TBAC) with feedback. Based on providerpsilas goals, TBAC looks on trust to requestor as standard to whether give requestor the corresponding warranty or not. Besides, we use environment, feedback, and forecast, to realize adaptability.","PeriodicalId":103284,"journal":{"name":"2008 International Symposiums on Information Processing","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117192097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dongming Li, Jing Zhang, Li Zhang, Yaju Liu, Bo Du
{"title":"An Automatic Voice Query System for Bank Based on Telephone Network","authors":"Dongming Li, Jing Zhang, Li Zhang, Yaju Liu, Bo Du","doi":"10.1109/ISIP.2008.97","DOIUrl":"https://doi.org/10.1109/ISIP.2008.97","url":null,"abstract":"Automatic voice query system for bank by phone was a hi-tech product based on computer technology, electronic communication technology and speech synthesis technology. The hardware design of this system adopted modularization design scheme, which centered on SCM AT89C51, and controlled the phone transceiver chip MT8870 and voice chip ISD4004, realizing voice query for bank account by phone remote control. This paper mainly analyzed and designed several circuits such as ringing detection circuit, on-hook and off-hook control circuit, amplified-filter circuit, receiving circuit, voice circuit and the connection circuit between PC and SCM; it finally gave the realization process of the systempsilas software.","PeriodicalId":103284,"journal":{"name":"2008 International Symposiums on Information Processing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114327874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on the Optimization Measures of Reducing Supply Chain Cooperation Risks","authors":"Haiyan Yan, Bo Xu, Chen Wang","doi":"10.1109/ISIP.2008.16","DOIUrl":"https://doi.org/10.1109/ISIP.2008.16","url":null,"abstract":"In todaypsilas dynamic business environment, the competition pattern is essentially the competition of one supply chain with another rather than single enterprise. Thus, collaborations in enterprises emerge as the times require. Along with the benefits brought by these kinds of collaborations, the risks arising in the cooperation process produce extra costs as well. Therefore, cost control is extending from the internal microscopic focus to the external interactive processes. The traditional cost control methods have limitations in coping with the new risks resulted from the supply chain. By taking into account the external risks level, this paper constitutes a cost control model based on supply chain operational risks which has improved the Activity-based costing and put forward a new perspective in supply chain cost optimization.","PeriodicalId":103284,"journal":{"name":"2008 International Symposiums on Information Processing","volume":"26 Pt 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114598902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}