{"title":"Hybrid Behavior Ant Colony Algorithm for Vehicle Routing Problem","authors":"Miao Wang","doi":"10.1109/ICCIS.2012.168","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.168","url":null,"abstract":"Vehicle Routing Problem (VRP) is one of critical problems in modern logistics service. In order to overcome the shortcomings of the basic Ant Colony Optimization (ACO) algorithm, which has long searching time and easily jumps into local optimal solution, a hybrid behavior ACO algorithm is presented for solving the VRP problem. A series of rules of the ants' behaviors are defined. The simulation results show that the above approach is reasonable and efficient.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132025113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AJAX Crawling Scheme Based on Document Object Model","authors":"Xuesong Zhang, Honglei Wang","doi":"10.1109/ICCIS.2012.61","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.61","url":null,"abstract":"Many web applications adopt AJAX to enhance their user experience. But AJAX has a number of properties making it extremely difficult for traditional search engines to crawl. Google's AJAX crawling scheme suggests webmasters change their website architectures and add additional codes. It is so complicated that it be currently supported only by Google. The paper proposed an AJAX crawling scheme based on DOM and breadth-first AJAX crawling algorithm. It can build a State Transition Graph (STG) of an AJAX web application by tracking the changes of DOM tree triggered by some AJAX events, and then generate a static mirror site of the original AJAX web application.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132041119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimizing the Deployment of Maintenance Persons Based on Dynamic Programming Method","authors":"Hu Qiang, Liu Feng, Wu Wei, Wu Mingfei","doi":"10.1109/ICCIS.2012.199","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.199","url":null,"abstract":"This paper sets up a model for optimizing the deployment of equipment maintenance persons. With a case study, the model optimizes the deployment of three levels of equipment maintenance persons using dynamic programming method and provides an effective quantifiable measure for scientific distribution of equipment support deployment.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123314367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interactive Approach to Eliciting Users' Preference Using Comparisons","authors":"Jianfeng Zhang, Weihong Han, Yan Jia, Peng Zou","doi":"10.1109/ICCIS.2012.178","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.178","url":null,"abstract":"The complexity of today's networks and distributed systems makes the process of network monitoring difficult. The amount of data produced by many distributed security tools can be overwhelming. So it's very difficult and limited to get the most risky alert through manual process based on the huge network alerts with many attributes, such as asset, priority, reliability, risk, type et al. The common method used to rank the alerts is scoring function, the higher the score, the more risky of the alert. Our motivation is that many times user can not precisely specify the weights for the scoring function as their preference in order to produce the preferred order of results. In this paper, we propose a new interactive preference searching method to elicit user's preference. An extensive performance study using both synthetic and real datasets is reported to verify its effectiveness and efficiency.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121578604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Method of Fuzzy Comprehensive Evaluation for Fracturing Effect","authors":"L. Tiejun, Tang Zhihao, Guo Dali, Ke Xijun","doi":"10.1109/ICCIS.2012.28","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.28","url":null,"abstract":"This paper studied fuzzy comprehensive evaluation for fracturing in depth and pointed out the drawbacks of Max-product Composition. And then, based on Einstein operator, this paper established the model of fuzzy comprehensive evaluation for fracturing effect which can be used to analyze and optimize various parameters such as fracture length, conductivity, height, etc.. Finally, it is proved that this model is practical and effective in real applications.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125859488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Finite Element Analysis of Normal Contact Stiffness between Real Rough Surfaces Based on ANSYS","authors":"Wei Wang, Q. Tang, Xiaodong Xu, S. Gong","doi":"10.1109/ICCIS.2012.156","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.156","url":null,"abstract":"The data of real rough surface are captured by using the morphology measuring instrument LEXT OLS4000. Contraposing the scarcities that no rough surface produced with either statistical model or fractal model can represent the real surface and reflect the surface stress, the real rough surface model is built based on the idea of reverse engineering. ANSYS is employed in research on the normal contact between the real rough surfaces, which is predigested with the contact between a rigid plane and a rough surface. The study shows that hysteresis phenomenon presents itself between the normal loading curve and the normal unloading curve as a result of some asperities' plastic deformation, which also brings on residual press-stress benefits for material properties on the rough surface after unloading completely and the residual stress varies with the amount of load at the start of unloading. Normal contact stiffness increases first and then decreases along with the normal load, and is also affected by surface topography and the residual surface stress of the micro-body.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120957538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on Security Issue of Internet of Things Based on RFID","authors":"Shao Xi-wen","doi":"10.1109/ICCIS.2012.301","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.301","url":null,"abstract":"In recent years, the use of radio frequency identification technology (RFlD: Radio Frequency Identification) to establish the current system of things becomes one of the mainstream models. This paper analyzes the internet system structure of things based on RFID, elaborates on the limitations of RFID technology to the things security threats, and analyzes RFID-based things that should meet the security demand and the corresponding security policies.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116138095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and Design of Electric Power Private Cloud Data Storage Model","authors":"Li Su, Lin Li, Lu Zhang, Xiaoqian Nie","doi":"10.1109/ICCIS.2012.221","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.221","url":null,"abstract":"With the rapid development of cloud computing technology, the concept of cloud storage application appears. Faced with the unusually large amount of data in the electric power information system and the insufficient data redundancy because of storage space, searching data resources quickly and reducing storage costs become an inevitable need. In this article, the data storage technology based on cloud computing will be discussed. I will give the private cloud model of the power companies, research and design a five-story model of the data storage power private cloud and analysis the model's data security briefly to enhance data's flexibility and reliability.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116776939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Drilling Tool Failure Diagnosis Based on GA-SVM","authors":"Yang Min, Liang Bin","doi":"10.1109/ICCIS.2012.132","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.132","url":null,"abstract":"Drilling tool failure is a major reason for low drilling speed, thus early drilling tool failure diagnosis is very important. Based on the generalization and approximation of non-linear capability of support vector machine (SVM) and the powerful ability of global optimization of genetic algorithm (GA), this paper establishes combined GA-SVM model through optimizing SVM parameters by GA. Then the model is used to forecast drilling tool failure of actual engineering practice. The experiment results show that optimal parameters searched by GA do significantly improve the forecast performance, and validates the effectiveness of the proposed algorithm, which provides a new method to forecast drilling tool failure.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131373523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation and Analysis of a Streaming Media Congestion Control Algorithm Based on NS-2","authors":"Wei Mao, D. Qi, Congming Wu, Kangyi Zhang","doi":"10.1109/ICCIS.2012.282","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.282","url":null,"abstract":"NS(Simulator Network) is an object-oriented visual simulator based on large-scale discrete event. It simulates not only the transmission of network data and topology architecture, but also all kinds of IP network circumstance. This paper describes the architecture and characteristics of NS, and also gives the technique and the general process based on NS. The instance of a streaming media applications-based adaptive congestion control algorithm is implemented and simulation results are analyzed. The experimental result shows that when the network is congested, the delay, delay jitter and throughput will be corresponding changes in objective phenomenon.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127601847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}