{"title":"Web Information Extraction Algorithm Based on Ontology and DOM Tree","authors":"Li Liu, Junfang Shi, Xinrui Liu","doi":"10.1109/CISE.2010.5677052","DOIUrl":"https://doi.org/10.1109/CISE.2010.5677052","url":null,"abstract":"Due to the information on the Web being tremendous, dynamic and irregular, it is difficult to search and integrate information from the Web. This paper proposes a Web information extraction algorithm based on Ontology and DOM tree. The areas are accurately found out and the interested information is extracted exactly by information extraction rules generated by ontology. Furthermore this algorithm implements information extraction through traveling DOM tree. Finally, we implement information extraction system and test its performance on news site. Testing result shows that this algorithm doesn't rely on the page structure and it can increase the recall and precision of information extraction.","PeriodicalId":232832,"journal":{"name":"2010 International Conference on Computational Intelligence and Software Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114265052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Paydar, M. Kahani, Behshid Behkamal, Mahboobeh Dadkhah, Elaheh Sekhavaty
{"title":"Publishing Data of Ferdowsi University of Mashhad as Linked Data","authors":"S. Paydar, M. Kahani, Behshid Behkamal, Mahboobeh Dadkhah, Elaheh Sekhavaty","doi":"10.1109/CISE.2010.5676872","DOIUrl":"https://doi.org/10.1109/CISE.2010.5676872","url":null,"abstract":"In this paper, the process of publishing a subset of data of Ferdowsi University of Mashhad as Linked Data is discussed. A framework developed for this reason is presented. Different parts of the framework are discussed and the linking procedure is described. Analysis of the experimental results and a discussion of problems and challenges are also presented.","PeriodicalId":232832,"journal":{"name":"2010 International Conference on Computational Intelligence and Software Engineering","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125309009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on the Application of Agent in Information Grid","authors":"Jingchun Ma","doi":"10.1109/CISE.2010.5676796","DOIUrl":"https://doi.org/10.1109/CISE.2010.5676796","url":null,"abstract":"Information grid makes up for the lack of conventional information system in distributed information application, and provides a new mode of using the information resources for uses. As Agent is the branch of distributed artificial intelligence, the system which combined Agent with other distributed technologies also became important research topics currently. Based on detailed analysis to Agent technology and the architecture of information grid, the structure model of information grid resource management system based on Agent is proposed, it is different from general network management system, creatively uses Agent technology to solve the problem of grid resource management. The information grid resource management system based on Agent is fully accustomed to the characteristic of information grid environment, ensures the accuracy and efficiency of the information grid resource management, and has good extensibility. In addition, deal with the application area of the Agent technology in the information grid and other interested topics need to be noticed.","PeriodicalId":232832,"journal":{"name":"2010 International Conference on Computational Intelligence and Software Engineering","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125234703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Re-Authentication Design for PKMv2 of IEEE 802.16e Standard","authors":"Yang Fan, Cai Yi","doi":"10.1109/CISE.2010.5676913","DOIUrl":"https://doi.org/10.1109/CISE.2010.5676913","url":null,"abstract":"Re-Authentication is required after the initial authentication in IEEE 802.16e to guarantee the security of the keys. We analyze the key factors in the re-authentication under the 5 authentication modes. And aiming at the RSA + Authenticated_EAP mixed mode, the re-authentication mechanism is designed. A PAK/PMK_counter is added into the PAK and PMK buffer, which can adjust the keys' lifetime to increase the switch frequency of the authentication methods.","PeriodicalId":232832,"journal":{"name":"2010 International Conference on Computational Intelligence and Software Engineering","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128043711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parallel Algorithm Study of Overlapping Clouds of Points Method","authors":"Xinjian Ma, Junjie Tan, Mu Zhang, F. Wang","doi":"10.1109/CISE.2010.5677012","DOIUrl":"https://doi.org/10.1109/CISE.2010.5677012","url":null,"abstract":"In order to realize the parallel numerical simulation of three-dimensional complex flow field by overlapping clouds of points method, a parallel algorithm of overlapping clouds of points method is studied in this paper. Two different parallel divisional methods are designed according to the characteristics of overlapping clouds of point method. A simple case is given to validate the two methods. The speedup ratio and parallel efficiency are investigated. The simulation results show that the parallel algorithm can be applied to the calculation of three-dimensional flow field.","PeriodicalId":232832,"journal":{"name":"2010 International Conference on Computational Intelligence and Software Engineering","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122857396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and Application of Transparent Encrypting File System Based on Windows Kernel","authors":"Shaobo Li, Xiaohui Jia","doi":"10.1109/CISE.2010.5677091","DOIUrl":"https://doi.org/10.1109/CISE.2010.5677091","url":null,"abstract":"Abstract-By analyzing the basic principles of file encrypting system, the essay mainly research and implement the transparent encrypting file system which is based on the filter driver in the kernel driver layer. With the help of this system, not only a certain type of file can be encrypted, but the specified file or folder can also be encrypted easily and efficiently. The system applies shared memory, windows massage mechanism, I/O driver technology and the other technology to implement information synchronization and data communication between the user model and kernel made. Compared with other encrypting technologies, the file system filter driver which is based on the transparent file encrypting technology has overcome the shortcomings of several other technologies. Because it is much more closer to the kernel, it can effectively intercept any file operation. The experiment results show that the interception efficiency is higher than other file encrypting system. Besides , the system's performance is much more security and reliable.","PeriodicalId":232832,"journal":{"name":"2010 International Conference on Computational Intelligence and Software Engineering","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121763562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Developing the Basic Verification Action (BVA) Structure Towards Test Oracle Automation","authors":"D. Almog, Tsipi Heart","doi":"10.1109/CISE.2010.5676837","DOIUrl":"https://doi.org/10.1109/CISE.2010.5676837","url":null,"abstract":"This paper proposes the Basic Verification Action (BVA) structure to verify outcomes produced during and at the end of test cases execution. BVA items are determined, stored and maintained as external entities to the actual test cases, forming a metadata repository comprised of a combination of technical and business knowledge of the software application. When applied to the final outcomes of the test case, the verification items actually represent the test oracle. Although the proposed model may not address all types of test oracles, it is posited that there is a significant number of cases where it is applicable. In these cases, applying the proposed mechanism can lead to more efficient testing, eventually driving test oracle automation. Benefits and shortcomings of using BVAs are discussed.","PeriodicalId":232832,"journal":{"name":"2010 International Conference on Computational Intelligence and Software Engineering","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121858863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Design and Implementation of Plantation Structure Adaptive Simulation","authors":"Xian Jiang, Huaiqing Zhang","doi":"10.1109/CISE.2010.5677171","DOIUrl":"https://doi.org/10.1109/CISE.2010.5677171","url":null,"abstract":"In this paper, the overall stand information (stand age, stand area, trees number of trees, stand average DBH, tree average height, etc.), according to the law of stand structure using mathematical models (normal distribution, Weibull distribution, Г distribution, β distribution , etc.) stands in the simulation of the spatial location of each tree distribution and tree attributes (diameter at breast height, tree height, crown width, etc.), to achieve forest from the whole to the individual adaptive simulation method。","PeriodicalId":232832,"journal":{"name":"2010 International Conference on Computational Intelligence and Software Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132563676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Preprocessing Algorithm for the Rational Objective Function Problem with Fixed Scale Subset","authors":"Ying Yin, Tongquan Zhang","doi":"10.1109/CISE.2010.5676721","DOIUrl":"https://doi.org/10.1109/CISE.2010.5676721","url":null,"abstract":"Motivated by the results of rational objective functions on spanning tree, assignment and cycle cover problems, etc. We consider rational objective functions with fixed scale subset problems which includes spanning tree,assignment and cycle cover problems. We design a preprocessing algorithm for it,and prove that our algorithm improves the result of N.Megiddo and the result of M.Shigeno, Y. Saruwatari, T. Matsui on computing complexities, respectively.","PeriodicalId":232832,"journal":{"name":"2010 International Conference on Computational Intelligence and Software Engineering","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132909893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hybrid Evolution Algorithm for VLSI Floorplanning","authors":"Jiarui Chen, Jianli Chen","doi":"10.1109/CISE.2010.5676951","DOIUrl":"https://doi.org/10.1109/CISE.2010.5676951","url":null,"abstract":"The floorplanning is a critical phase in very large-scale integrated-circuit(VLSI) phsical design. It determines the topology of layout, and it aims to arrange a set of rectangular modules on a chip so as to optimize the chip area, wirelength, etc. This problem is known to be NP-hard, and has received much attention in recent years. B*-tree representation is adopted in this paper. Based on the concept of evolutionary algorithm and simulated annealing, a hybrid evolutionary algorithm(ESA) is proposed. It is effective to explore solution space and locate the optimalsolution.The effectivenessof our method is demonstrated on several cases of MCNC benchmarks.","PeriodicalId":232832,"journal":{"name":"2010 International Conference on Computational Intelligence and Software Engineering","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133350351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}