Workshop on Intelligent Information Technology Application (IITA 2007)最新文献

筛选
英文 中文
Research of Spatial Logistics System Based on SOA 基于SOA的空间物流系统研究
Workshop on Intelligent Information Technology Application (IITA 2007) Pub Date : 2007-12-02 DOI: 10.1109/IITA.2007.36
Tianyi Xin, Yuchen Fu, Yan Wang, Xiaoke Zhou, Juan Ge
{"title":"Research of Spatial Logistics System Based on SOA","authors":"Tianyi Xin, Yuchen Fu, Yan Wang, Xiaoke Zhou, Juan Ge","doi":"10.1109/IITA.2007.36","DOIUrl":"https://doi.org/10.1109/IITA.2007.36","url":null,"abstract":"Web service has become an important issue that attracts the researchers from both computer science and communication fields. SOA (service-oriented architecture) based on Web service is no doubt a perfect software engineering thought. In order to overcome some defects in the existing spatial logistics system, A new design project of spatial logistics system based on SOA was proposed in this paper. Spatial Web service and system architecture were introduced in details. Finally, a SOA-based spatial logistics system prototype was implemented to justify our solution.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122442699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Motor Fault Diagnosis Method Based on Immune Mechanism 基于免疫机制的电机故障诊断方法
Workshop on Intelligent Information Technology Application (IITA 2007) Pub Date : 2007-12-02 DOI: 10.1109/IITA.2007.41
Fu-Jian Duan, Ming Lei, Jianwei Li, Yuling Tian
{"title":"A Motor Fault Diagnosis Method Based on Immune Mechanism","authors":"Fu-Jian Duan, Ming Lei, Jianwei Li, Yuling Tian","doi":"10.1109/IITA.2007.41","DOIUrl":"https://doi.org/10.1109/IITA.2007.41","url":null,"abstract":"In this paper, a framework of fault diagnosis system is proposed, which is based on negative selection algorithm and the immune network model. Firstly, train the detectors by immune tolerance, and then detect if faults appear. Diagnosis experiments show that the system in normal pattern and abnormal pattern can be reflected by the self set and the non-self set completely through clustering algorithm. So the accuracy of diagnosis is improved. In the course of diagnosis, multiple diagnosis is proposed to process the data. If the data can't be recognized exactly, the abnormity degree is presented, which is the evidence for experts to make decision.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125357295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research and Realization of Extraction Algorithm on Web Text Mining Web文本挖掘中提取算法的研究与实现
Workshop on Intelligent Information Technology Application (IITA 2007) Pub Date : 2007-12-02 DOI: 10.1109/IITA.2007.31
Shiqun Yin, Yuhui Qiu, Jike Ge, Xiaohong Lan
{"title":"Research and Realization of Extraction Algorithm on Web Text Mining","authors":"Shiqun Yin, Yuhui Qiu, Jike Ge, Xiaohong Lan","doi":"10.1109/IITA.2007.31","DOIUrl":"https://doi.org/10.1109/IITA.2007.31","url":null,"abstract":"Now people use the search engine - Google, Yahoo, Baidu etc. to lookup Web information mainly, but these search engines involve so wide range, with whose intelligence degree is pool. They are very difficult to mine data further. So, Web text mining aims to resolve this problem. This paper discusses an algorithm of how to follow the appointed Web site or Web page according to the user's request by using the technique of ASP (Active Serve Page), and research and realization how further obtains data of particular range in Internet by text extraction on Web mining. The method has more accuracy, better applicability and less manual interference. The information obtained are the majority of the documents in the field, it can be used to create knowledge database, and it can also be treated as a small scaled vertical search system.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115631489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A novel OVSF-TH-UWB communication system 一种新型的OVSF-TH-UWB通信系统
Workshop on Intelligent Information Technology Application (IITA 2007) Pub Date : 2007-12-02 DOI: 10.1109/IITA.2007.19
Zeng Fanzi, Liang Hualin, L. Renfa, Luo Juan, Wu Di
{"title":"A novel OVSF-TH-UWB communication system","authors":"Zeng Fanzi, Liang Hualin, L. Renfa, Luo Juan, Wu Di","doi":"10.1109/IITA.2007.19","DOIUrl":"https://doi.org/10.1109/IITA.2007.19","url":null,"abstract":"The current UWB communication systems, such as 2PPM-TH, DS-UWB and OFDM have some drawbacks and do not provide the variable rates service. Thus, the hybrid OVSF-TH-UWB is proposed to address the above problems, and a corresponding correlation mask is designed. Both performance analysis and simulation results prove that our OVSF- TH-UWB system can effectively reduce the multi- users-interference and Gaussian noise interference, and its performance is better than those of 2PPM-TH and DS- UWB system.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116119259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Fuzzy Intelligent Control of Coke oven Heating 焦炉加热模糊智能控制研究
Workshop on Intelligent Information Technology Application (IITA 2007) Pub Date : 2007-12-02 DOI: 10.1109/IITA.2007.28
Gongfa Li, Jianyi Kong, Guozhang Jiang, Jintang Yang, Hegen Xiong, Yu Hou
{"title":"Research on Fuzzy Intelligent Control of Coke oven Heating","authors":"Gongfa Li, Jianyi Kong, Guozhang Jiang, Jintang Yang, Hegen Xiong, Yu Hou","doi":"10.1109/IITA.2007.28","DOIUrl":"https://doi.org/10.1109/IITA.2007.28","url":null,"abstract":"The control principle of combining the intermittent heating control with the heating gas flow adjustment was adopted for coke oven heating control. Intelligent control strategy and an integrated model of coke oven heating were proposed, which combined two feedback control, one feedforward control and intelligent control. According to coking mechanism, heating supplied feedforward model was built, and carbonization index feedback model was proposed in the model to control coking management of coke oven. Flue temperature soft measurement model based on linear regression and neural network was built to supply temperature feedback control. According to artificial experience and actual condition in the plant, the fuzzy rules were generated. The proper amount of stopping heating time and heating gas flow were computed taking the operation condition of coke oven into account. Actual run results show that the strategy and model can solve the large inertia effectively and shorten adjustment time. So the system satisfies the actual production needs, and has great practical value.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116986864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Denial-of-Service Resistant Authentication Solution for Security Protocols 安全协议的抗拒绝服务认证解决方案
Workshop on Intelligent Information Technology Application (IITA 2007) Pub Date : 2007-12-02 DOI: 10.1109/IITA.2007.90
Yinqing Li, Jianhui Chen
{"title":"A Denial-of-Service Resistant Authentication Solution for Security Protocols","authors":"Yinqing Li, Jianhui Chen","doi":"10.1109/IITA.2007.90","DOIUrl":"https://doi.org/10.1109/IITA.2007.90","url":null,"abstract":"Nowadays, security protocols are under the threat of compute resource exhausting DoS attack and memory resource exhausting DoS attack. Based on the research of Cookie method and Client Puzzle way, a sponsor identity authenticating solution for resisting DoS attacks was presented, which can improve security protocol: by only add two or three messages based on original protocol can the solution enhances the original protocol's ability on resisting resource exhausting DoS attacks without changing its architecture. The frame and implementation of solution was presented, then, the solution analysis and experiment was conducted. The experimental result confirmed the validity of this solution, and showed that the solution can enhance the ability of security protocols on resisting resource exhausting DoS attack.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114377649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Computer Forensics Model Based On Danger Theory 基于危险理论的计算机取证模型
Workshop on Intelligent Information Technology Application (IITA 2007) Pub Date : 2007-12-02 DOI: 10.1109/IITA.2007.57
Lingxi Peng, Zhengde Li, Jinquan Zeng, Jian Zhang, Caiming Liu, ChunLin Liang
{"title":"A Computer Forensics Model Based On Danger Theory","authors":"Lingxi Peng, Zhengde Li, Jinquan Zeng, Jian Zhang, Caiming Liu, ChunLin Liang","doi":"10.1109/IITA.2007.57","DOIUrl":"https://doi.org/10.1109/IITA.2007.57","url":null,"abstract":"To effectively collect electronic evidences of computer crime, a novel danger theory based computer dynamic model (Demed) is proposed. With definitions of self, non-self and detector, the intrusion detection sub-model is given, which is composed of memory cell set, mature cells set, and immature cells set. Then, the danger theory based computer dynamic forensics sub-model is further given. Both the theory analysis and experimental results show that Demed provides an effective approach for computer dynamic forensics.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126523553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
QoS Management for High Altitude Platforms 高空平台的QoS管理
Workshop on Intelligent Information Technology Application (IITA 2007) Pub Date : 2007-12-02 DOI: 10.1109/IITA.2007.13
Guoliang Liu, Xin Huang, Xi Zhou
{"title":"QoS Management for High Altitude Platforms","authors":"Guoliang Liu, Xin Huang, Xi Zhou","doi":"10.1109/IITA.2007.13","DOIUrl":"https://doi.org/10.1109/IITA.2007.13","url":null,"abstract":"An emerging solution is offered by high altitude platforms (HAPs) operating in the stratosphere at altitudes of up to 22 km to provide communication facilities that can exploit the best features of both terrestrial and satellite schemes .HAPs includes many applications and heterogeneity networks, which need to different QoS , so how to realize the aim that guarantee the QoS is very important. This article focuses on QoS management for HAPs based on a hybrid network architecture. This network architecture and QoS management scheme are more generally applicable, and we anticipate they will form the basis for HAPs network independent of the physical medium.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129280356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Theory of Belief Degrees for Reasoning about Knowledge 知识推理的信念度理论
Workshop on Intelligent Information Technology Application (IITA 2007) Pub Date : 2007-12-02 DOI: 10.1109/IITA.2007.60
Li Jun, Lan Qian
{"title":"Theory of Belief Degrees for Reasoning about Knowledge","authors":"Li Jun, Lan Qian","doi":"10.1109/IITA.2007.60","DOIUrl":"https://doi.org/10.1109/IITA.2007.60","url":null,"abstract":"In many of the application areas for reasoning about knowledge, it is important to reason about the possibility of certain events as well as the knowledge of agents. This paper introduces the concept of belief degree of an agent i with respect to a fact. Moreover, based on the belief degree of agent i , the similarity degree between agent i 's graded knowledge and a pseudo metric on the set of agent i 's graded knowledge are established, which provide a possible framework for agent i to develop approximate reasoning by taking advantage of its graded knowledge.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132862187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the Supplier Selection of Supply Chain Based on the Improved ELECTRE-II Method 基于改进elecre - ii方法的供应链供应商选择研究
Workshop on Intelligent Information Technology Application (IITA 2007) Pub Date : 2007-12-02 DOI: 10.1109/IITA.2007.65
Peide Liu
{"title":"Research on the Supplier Selection of Supply Chain Based on the Improved ELECTRE-II Method","authors":"Peide Liu","doi":"10.1109/IITA.2007.65","DOIUrl":"https://doi.org/10.1109/IITA.2007.65","url":null,"abstract":"The supplier selection is the key factor of supply chain cooperation. This paper firstly constructs the indicator system of the cooperator selection of the supply chain, and confirms the corresponding objectivel weight of each indicator. Then the relative advantage matrix and the relative disadvantage matrix between the projects are calculated by the improved ELECTRE-II method, and the modified synthesized weighted matrix between the projects and the net advantage value of each project are calculated in the next step. And then rank the suppliers according to the net advantage value of each project. Finally, the paper illustrates the rationality of the indicators system and the efficiency of the evaluation method through the usage in a case.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131395770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信