{"title":"Research on quality of service in wireless sensor networks","authors":"Fu Lin, Dengyi Zhang, Wenhai Li","doi":"10.1109/ICSESS.2011.5982316","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982316","url":null,"abstract":"As a complex network consisting of sensing, processing and communication, wireless sensor network is driven by various applications and highly requires new Quality of Service guarantees. The application target of WSN is to monitor events, and it pays more attention to the QoS of colony data packets. So, we present an improved QoS mechanism based on weighted mapping table. Because of the limited computational capabilities of WSN, the proposed mechanism import mapping table. The improved QoS mechanism finds the weight from mapping table according to the level of events, and dynamically adjusts the transmit probability of each event. The mechanism considers the different event delay requirements, and adjusts the bandwidth and event delay reasonably for each event. The simulation proves that the improved mechanism algorithm is simple and effective; it can meet the application requirement of wireless sensor network.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130476360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. M. Reddy, B. Nagarajasri, A. B. R. Kumar, M. Padmavathamma
{"title":"New variant MJ2-RSA cryptosystem","authors":"E. M. Reddy, B. Nagarajasri, A. B. R. Kumar, M. Padmavathamma","doi":"10.1109/ICSESS.2011.5982274","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982274","url":null,"abstract":"We propose a Thresh hold variant Multi Prime Public key Cryptosystem has an extension of RSA Cryptosystem using Jordon Totient function.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134112049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of registration phase for Genetic Sensor E-Manufacturing system","authors":"E. MadhuSudhan, G. Krishnaiah, A. Sulaiman","doi":"10.1109/ICSESS.2011.5982343","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982343","url":null,"abstract":"In this paper we present the significance of Information exchange among different departments of an E-Manufacturing system such as Head Office, Production, Multi Level Production and Sales & Service using our developed Genetic Sensor System.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128957449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An indirect method of capacitance measurement","authors":"Yong Huang","doi":"10.1109/ICSESS.2011.5982431","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982431","url":null,"abstract":"Use only multimeter to collect data with the help of Timing chime software, complete the experiment of researching transient process of RC circuit charging, and measure capacitance indirectly.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133572164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis on software processes and enhancement for RUP","authors":"Fan Guo, Bainan Xia, Fei Xue","doi":"10.1109/ICSESS.2011.5982312","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982312","url":null,"abstract":"This article focuses on the object-oriented software process. It compares three most popular software processes: RUP (Rational Unified Process), OPEN (Object-oriented Process, Environment and Notation), and OOSP (Object-oriented software process); then it carries out an Enhanced RUP based on the advantages of OPEN and OOSP. By setting up a simple model, it verifies the improvement brought about by ERUP in terms of Investment to Benefit Ratio (IBR).","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133578204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Notice of RetractionResearch trends of network design for closed-loop supply chain","authors":"G. Liu, J. Wu","doi":"10.1109/ICSESS.2011.5982447","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982447","url":null,"abstract":"During the last 15 years, the research on closed-loop supply chain (CLSC) has been attached importance from academic and business community. Recently increased attention has swatch to the network design, due to its determinant on the performance of the CLSC's operational management. This paper is organized into three main sections. In the first place, we reviewed the research history of the network design of CLSC. Secondly, the researches on the structure types, characteristics, the models and algorithms are described. Finally, conclusions are drawn for the research focuses and trends in the future.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117157603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Notice of RetractionSupply chain management in the global luxury industry","authors":"Zheng-yin Peng, Sun Jianfu","doi":"10.1109/ICSESS.2011.5982442","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982442","url":null,"abstract":"Traditional supply chain models were developed mainly for non-luxury companies and find very little correspondence in the field of luxury, which is considered here as a business super-area including heterogeneous enterprises, belonging to different sectors, which have in common customers characterized by the “need for luxury”. In the last few years, luxury companies have paid growing attention to the management of their supply chain at a global level. This paper aims to provide an overview of how manufacturing companies use global supply chains and how their behaviors changes over time.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116175483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhou Shao-jing, Shao Wen-li, Rong Hui, Chen Zhen-ting, Yang Yu
{"title":"Research of intelligent immune intrusion detection system about combating virus with “virus”","authors":"Zhou Shao-jing, Shao Wen-li, Rong Hui, Chen Zhen-ting, Yang Yu","doi":"10.1109/ICSESS.2011.5982444","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982444","url":null,"abstract":"To solve the limitation problems exist in the anti-virus software, firewall, intrusion detection system, intrusion defense system and vulnerability scanning system, the research of the active defense system is imperative. This paper cited the feasibility and necessity of combating virus with “virus”, makes use of the spontaneous, subtle, infectious destructive and unpredictable characteristics about the virus, implants “virus” and cloned variation “virus” into immune intrusion detection system based on e-learning, which can effectively improve immunity of the system. The research includes the work principle of immune implantation about the “virus” and cloned variation “virus”, e-learning mechanism of Sogou intelligent robot, algorithm on the Sogou intelligent robot, active defense method based on combating virus with “virus”.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117188120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decision support for business-related design of service level agreements","authors":"F. Schulz","doi":"10.1109/ICSESS.2011.5982248","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982248","url":null,"abstract":"When designing services, a service provider has to define the quality of service levels that will be offered to customers. These service level objectives (SLOs) form the basis for service level agreements (SLAs) between the provider and consumers of services. The design of SLAs is a complex task which needs to combine business considerations regarding revenues, costs and penalties, and technical considerations with respect to feasible service levels. This paper proposes an approach that simultaneously takes into account business parameters and technical constraints for supporting the creation of service level agreements. Based on a statistical model derived from empirical service quality data, the relationship between service level objectives and potential penalty payments is investigated with respect to the long-term profit of the service provider. Based on the results, a practical support for deciding SLO thresholds is provided. The methodology is demonstrated and evaluated with the availability metric.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"20 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120871315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of the node-based multi-objective Vehicle Scheduling Optimization","authors":"Feng-xing Zou, Jia-Hua Wei, Yang Kai","doi":"10.1109/ICSESS.2011.5982372","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982372","url":null,"abstract":"This paper presents an approach to solve the Vehicle Scheduling Problem(VSP). Taking into the actual connectivity of paths connected to the nodes, we establish a multi-objective mathematical model based on the path length and customer waiting time. A algorithm combining the A* algorithm for path searching with the Particle Swarm Optimization(PSO) for global exploration together, is applied to the multi-objective vehicle scheduling model. Some practical problems has been solved with good results by this approach.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129518593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}