2011 IEEE 2nd International Conference on Software Engineering and Service Science最新文献

筛选
英文 中文
Research on optimization of vehicle routing based on Hopfield neural network 基于Hopfield神经网络的车辆路径优化研究
2011 IEEE 2nd International Conference on Software Engineering and Service Science Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982278
Meng Wei, Yu Bin
{"title":"Research on optimization of vehicle routing based on Hopfield neural network","authors":"Meng Wei, Yu Bin","doi":"10.1109/ICSESS.2011.5982278","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982278","url":null,"abstract":"The optimization of vehicle routing is essentially a constraint-based shortest path problem, which can be resolved by Hopfield-based neural network. This paper proposes a vehicle routing optimization algorithm based on Hopfield, which can offer a solution for logistics distribution routing quickly under the circumstance of the given distribution position and cargo amount. Experimental results have shown that the algorithm has advantages in fast convergence and accurate computation, etc.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129324148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The research of routing algorithms based on NS2 in mobile ad hoc networks 移动自组网中基于NS2的路由算法研究
2011 IEEE 2nd International Conference on Software Engineering and Service Science Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982468
Guanghui Li, Jianmin Chen
{"title":"The research of routing algorithms based on NS2 in mobile ad hoc networks","authors":"Guanghui Li, Jianmin Chen","doi":"10.1109/ICSESS.2011.5982468","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982468","url":null,"abstract":"In this paper, firstly we introduce the routing protocols of mobile Ad hoc network. We then introduce the basic principle of DSDV and AODV routing protocols, including the types of protocol frames, the process of establishing routing path of protocols and maintenance operations. We also describe the changes of the AODV protocol by AODVUU. Then, we simulate the configurations of mobile nodes and scene generating by the network simulator NS2. Lastly, we compare and analyze the performances of DSDV, AODV and AODVUU protocols from packet delivery rate to end-to-end average delay, together with the interpretation for it. These works can be good references to the research of Ad hoc routing protocols.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130015971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Notice of RetractionA research on the the efficiency of partnership 撤销通知合伙企业效率研究
2011 IEEE 2nd International Conference on Software Engineering and Service Science Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982321
Chuangwei Lin, He Chen
{"title":"Notice of RetractionA research on the the efficiency of partnership","authors":"Chuangwei Lin, He Chen","doi":"10.1109/ICSESS.2011.5982321","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982321","url":null,"abstract":"As an ancient governance model, partnership becomes a unique scene in human-capital-intensive industries, breaking the monopoly position of corporate system in the governance models of enterprises. This paper reviews the disputes over the effectiveness of partnership. Some scholars propose that, from the perspective of information economics, team production and unobservable input in corporate system lead to the existence of non-efficiency behaviors-free rider problem. Other scholars speak in defense of the efficiency of partnership. When the professional team production is not easy to supervise, partnership is an effective governance model. As long as the partners bear unlimited liability, partnership can achieve approximate efficiency by a simple pooling strategy. Even if the partners bear limited liability, as long as co-supervision exists, efficiency of partnership is still achievable. Finally, a brief conclusion will be put forward.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131087233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modified real-value negative selection algorithm and its application on fault diagnosis 改进的实值负选择算法及其在故障诊断中的应用
2011 IEEE 2nd International Conference on Software Engineering and Service Science Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982293
Y. Li, G. Chang, C. J. Zhang, S. Liang
{"title":"Modified real-value negative selection algorithm and its application on fault diagnosis","authors":"Y. Li, G. Chang, C. J. Zhang, S. Liang","doi":"10.1109/ICSESS.2011.5982293","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982293","url":null,"abstract":"Analyze the drawbacks of common real-value negative selection algorithm applied on fault diagnosis, and the modified real-value negative selection algorithm is presented based on the corresponding innovations. Firstly, the fault detector set is partitioned into remember-detector set covering known-fault space and random-detector set covering unknown-fault space. Secondly, taking all known states including normal state as self set in training period, get the random-detector set through negative selection and distribution optimization. Lastly, in order to avoid ‘Fail to Alarm’ event caused by the Hole, the two-time-matching method is presented in detecting period which takes the normal state as self set. A resistance circuit fault diagnosis experiment shows that compared with the common real-value negative selection algorithm, the modified real-value negative algorithm can effectively avoid ‘Fail to Alarm’ event, and has higher diagnostic accuracy.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130771339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cryptanalysis and improvement of a concurrent signature scheme based on identity 基于身份的并发签名方案的密码分析与改进
2011 IEEE 2nd International Conference on Software Engineering and Service Science Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982351
Zhongjun Zhang, Shuo Xu
{"title":"Cryptanalysis and improvement of a concurrent signature scheme based on identity","authors":"Zhongjun Zhang, Shuo Xu","doi":"10.1109/ICSESS.2011.5982351","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982351","url":null,"abstract":"Concurrent signatures were introduced as an alternative approach to solving the problem of fair exchange of signatures by Chen et al.[1], in which two entities can produce two signatures that are not binding, until the keystone is released by one of the parties. Recently, Huang et al.[10] proposed a more ambiguity and stronger fairness concurrent signature scheme based on identity. However, we will show that their scheme did not satisfy the strong unforgeability properties, and was vulnerable to forgery attack. Then, we propose an improved scheme to prevent such attack.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132992400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Risk factors analysis of IT outsourcing from the distance-based perspective 基于距离的IT外包风险因素分析
2011 IEEE 2nd International Conference on Software Engineering and Service Science Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982326
Mao Yajing, Fang Deying
{"title":"Risk factors analysis of IT outsourcing from the distance-based perspective","authors":"Mao Yajing, Fang Deying","doi":"10.1109/ICSESS.2011.5982326","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982326","url":null,"abstract":"IT outsourcing as a strategic decision has become an effective way that more and more enterprises reduce costs and create their own core competencies with outside help. Distance-based IT service outsourcing cooperation model, risks of IT outsourcing is produced by the inherent reasons of “distance”. Based on the perspective of distance, this paper discussed the impact of the information distance factors, space distance factors and the knowledge distance factors on the IT outsourcing, and established the “information - space - knowledge” model of three-dimensional distance factors. Finally, through the study of some case, this paper specified the basic ideas and methods of the analysis of IT outsourcing risk based on this three-dimensional model.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130290137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Application of lifting wavelet transform in oil theft signal detection 提升小波变换在盗油信号检测中的应用
2011 IEEE 2nd International Conference on Software Engineering and Service Science Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982285
Ying-chun Li, Jun-Hong Wang, Xingjian Fu
{"title":"Application of lifting wavelet transform in oil theft signal detection","authors":"Ying-chun Li, Jun-Hong Wang, Xingjian Fu","doi":"10.1109/ICSESS.2011.5982285","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982285","url":null,"abstract":"In oil pipeline, when a theft alarm signal is generated, the strong vibration signal will be brought in stress wave. Then singularity will be introduced, which contains rich information about oil theft signal. When the detecting distance increases to a certain extent, the singularity is drowned in noise. At the same time, oil theft signal distributes mainly in low frequency band. Firstly, the system to collect stress wave signal of oil theft was briefly introduced, and on-the-spot data collection steps were given. Secondly, oil theft signal is analyzed in wavelet domain and time domain. In wavelet domain, features of energy distribution in different bands are extracted. In time domain, the stress wave signal is denoised by hard threshold method, and then the characteristics of the singularity are abstracted. The research provides a new method to monitor oil stolen events in real-time. And it is easily realized on hardware and has very good practical value.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128810322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design patterns in software development 软件开发中的设计模式
2011 IEEE 2nd International Conference on Software Engineering and Service Science Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982228
Huaxin Mu, Shuai Jiang
{"title":"Design patterns in software development","authors":"Huaxin Mu, Shuai Jiang","doi":"10.1109/ICSESS.2011.5982228","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982228","url":null,"abstract":"Design pattern describes a repeatedly presenting issue during software designing, as well the solution to it. Applying design pattern enables developers to reuse it to solve a specified designing issue. Design patterns help designers communicate architectural knowledge, help people learn a new design paradigm, and help new developers avoid traps and pitfalls that have traditionally been learned only by costly experiences. In this paper, we briefly introduce the concept of software design pattern and give a research on some design patterns, including Observer Pattern, Decorator Pattern, Factory Method Pattern and Abstract Factory Pattern.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125590075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Online map matching by indexing approximate road segments 在线地图匹配通过索引近似路段
2011 IEEE 2nd International Conference on Software Engineering and Service Science Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982313
Jingyu Han, Xiong Fu, Linfeng Liu, Dawei Jiang
{"title":"Online map matching by indexing approximate road segments","authors":"Jingyu Han, Xiong Fu, Linfeng Liu, Dawei Jiang","doi":"10.1109/ICSESS.2011.5982313","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982313","url":null,"abstract":"Given a typical real-world application, a large number of tracking points come at a high rate in a stream fashion and efficient online map matching is a pressing concern. In this paper, two map matching schemes are proposed, which make aggressive use of available main memory to achieve efficient matching. First, road network is partitioned into approximate segments, namely line or arc segments, by minimum description length (MDL) principle. Second, approximate segments are indexed into an optimized packed R tree, insuring that the minimal coverage and overlap are achieved. Based on this, we propose two online map matching schemes, namely Top Matching (TM) and kNN Refinement Matching (KRM), coupled with corresponding buffering strategies. Theory and experiment show that the times of accessing roads is significantly reduced to approximately a fraction of 3 to 6, demonstrating superior performance in terms of running time and matching quality.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"187 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123389980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
AOSD and its application in development of safety-critical systems AOSD及其在安全关键系统开发中的应用
2011 IEEE 2nd International Conference on Software Engineering and Service Science Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982377
Zhenling Zhang, Yangli Jia, G. Liu
{"title":"AOSD and its application in development of safety-critical systems","authors":"Zhenling Zhang, Yangli Jia, G. Liu","doi":"10.1109/ICSESS.2011.5982377","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982377","url":null,"abstract":"Based on the discussion of the limitation of object-oriented software development method in dealing with the crosscutting concerns in safety-critical complex system, the aspect-oriented software development method and its' superiority are introduced. A process model of AOSD is given. The application of AOSD in the development of a safety-critical system is discussed and an example is given.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"321 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116121551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信