{"title":"Design and Implementation of Power Enterprise Staff Performance Appraisal System Based on Flex and J2EE","authors":"Junhua Qu, Fangfang Dang, Yang Xu, F. Fan","doi":"10.1109/ICCIS.2012.120","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.120","url":null,"abstract":"With the development of market economy, staff performance appraisal has been an important part of human resource management. However, due to the influence of old economic system, staff performance appraisal is susceptible to external factors and lack of effectiveness and orientation. Through analysis of the power enterprise, this paper proposes a quantitative and hierarchical assessment index system. On the basis of it, the power enterprise staff performance appraisal system based on Flex and J2EE is implemented. After testing, this system can guide the human resource management effectively and promote the enterprises rapid development.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132423500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid Behavior Ant Colony Algorithm for Vehicle Routing Problem","authors":"Miao Wang","doi":"10.1109/ICCIS.2012.168","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.168","url":null,"abstract":"Vehicle Routing Problem (VRP) is one of critical problems in modern logistics service. In order to overcome the shortcomings of the basic Ant Colony Optimization (ACO) algorithm, which has long searching time and easily jumps into local optimal solution, a hybrid behavior ACO algorithm is presented for solving the VRP problem. A series of rules of the ants' behaviors are defined. The simulation results show that the above approach is reasonable and efficient.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132025113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AJAX Crawling Scheme Based on Document Object Model","authors":"Xuesong Zhang, Honglei Wang","doi":"10.1109/ICCIS.2012.61","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.61","url":null,"abstract":"Many web applications adopt AJAX to enhance their user experience. But AJAX has a number of properties making it extremely difficult for traditional search engines to crawl. Google's AJAX crawling scheme suggests webmasters change their website architectures and add additional codes. It is so complicated that it be currently supported only by Google. The paper proposed an AJAX crawling scheme based on DOM and breadth-first AJAX crawling algorithm. It can build a State Transition Graph (STG) of an AJAX web application by tracking the changes of DOM tree triggered by some AJAX events, and then generate a static mirror site of the original AJAX web application.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132041119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimizing the Deployment of Maintenance Persons Based on Dynamic Programming Method","authors":"Hu Qiang, Liu Feng, Wu Wei, Wu Mingfei","doi":"10.1109/ICCIS.2012.199","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.199","url":null,"abstract":"This paper sets up a model for optimizing the deployment of equipment maintenance persons. With a case study, the model optimizes the deployment of three levels of equipment maintenance persons using dynamic programming method and provides an effective quantifiable measure for scientific distribution of equipment support deployment.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123314367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interactive Approach to Eliciting Users' Preference Using Comparisons","authors":"Jianfeng Zhang, Weihong Han, Yan Jia, Peng Zou","doi":"10.1109/ICCIS.2012.178","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.178","url":null,"abstract":"The complexity of today's networks and distributed systems makes the process of network monitoring difficult. The amount of data produced by many distributed security tools can be overwhelming. So it's very difficult and limited to get the most risky alert through manual process based on the huge network alerts with many attributes, such as asset, priority, reliability, risk, type et al. The common method used to rank the alerts is scoring function, the higher the score, the more risky of the alert. Our motivation is that many times user can not precisely specify the weights for the scoring function as their preference in order to produce the preferred order of results. In this paper, we propose a new interactive preference searching method to elicit user's preference. An extensive performance study using both synthetic and real datasets is reported to verify its effectiveness and efficiency.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121578604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Method of Fuzzy Comprehensive Evaluation for Fracturing Effect","authors":"L. Tiejun, Tang Zhihao, Guo Dali, Ke Xijun","doi":"10.1109/ICCIS.2012.28","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.28","url":null,"abstract":"This paper studied fuzzy comprehensive evaluation for fracturing in depth and pointed out the drawbacks of Max-product Composition. And then, based on Einstein operator, this paper established the model of fuzzy comprehensive evaluation for fracturing effect which can be used to analyze and optimize various parameters such as fracture length, conductivity, height, etc.. Finally, it is proved that this model is practical and effective in real applications.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125859488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Finite Element Analysis of Normal Contact Stiffness between Real Rough Surfaces Based on ANSYS","authors":"Wei Wang, Q. Tang, Xiaodong Xu, S. Gong","doi":"10.1109/ICCIS.2012.156","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.156","url":null,"abstract":"The data of real rough surface are captured by using the morphology measuring instrument LEXT OLS4000. Contraposing the scarcities that no rough surface produced with either statistical model or fractal model can represent the real surface and reflect the surface stress, the real rough surface model is built based on the idea of reverse engineering. ANSYS is employed in research on the normal contact between the real rough surfaces, which is predigested with the contact between a rigid plane and a rough surface. The study shows that hysteresis phenomenon presents itself between the normal loading curve and the normal unloading curve as a result of some asperities' plastic deformation, which also brings on residual press-stress benefits for material properties on the rough surface after unloading completely and the residual stress varies with the amount of load at the start of unloading. Normal contact stiffness increases first and then decreases along with the normal load, and is also affected by surface topography and the residual surface stress of the micro-body.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120957538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on Security Issue of Internet of Things Based on RFID","authors":"Shao Xi-wen","doi":"10.1109/ICCIS.2012.301","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.301","url":null,"abstract":"In recent years, the use of radio frequency identification technology (RFlD: Radio Frequency Identification) to establish the current system of things becomes one of the mainstream models. This paper analyzes the internet system structure of things based on RFID, elaborates on the limitations of RFID technology to the things security threats, and analyzes RFID-based things that should meet the security demand and the corresponding security policies.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"241 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116138095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and Design of Electric Power Private Cloud Data Storage Model","authors":"Li Su, Lin Li, Lu Zhang, Xiaoqian Nie","doi":"10.1109/ICCIS.2012.221","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.221","url":null,"abstract":"With the rapid development of cloud computing technology, the concept of cloud storage application appears. Faced with the unusually large amount of data in the electric power information system and the insufficient data redundancy because of storage space, searching data resources quickly and reducing storage costs become an inevitable need. In this article, the data storage technology based on cloud computing will be discussed. I will give the private cloud model of the power companies, research and design a five-story model of the data storage power private cloud and analysis the model's data security briefly to enhance data's flexibility and reliability.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116776939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Drilling Tool Failure Diagnosis Based on GA-SVM","authors":"Yang Min, Liang Bin","doi":"10.1109/ICCIS.2012.132","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.132","url":null,"abstract":"Drilling tool failure is a major reason for low drilling speed, thus early drilling tool failure diagnosis is very important. Based on the generalization and approximation of non-linear capability of support vector machine (SVM) and the powerful ability of global optimization of genetic algorithm (GA), this paper establishes combined GA-SVM model through optimizing SVM parameters by GA. Then the model is used to forecast drilling tool failure of actual engineering practice. The experiment results show that optimal parameters searched by GA do significantly improve the forecast performance, and validates the effectiveness of the proposed algorithm, which provides a new method to forecast drilling tool failure.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131373523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}