2012 Fourth International Conference on Computational and Information Sciences最新文献

筛选
英文 中文
Hybrid Behavior Ant Colony Algorithm for Vehicle Routing Problem 车辆路径问题的混合行为蚁群算法
2012 Fourth International Conference on Computational and Information Sciences Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.168
Miao Wang
{"title":"Hybrid Behavior Ant Colony Algorithm for Vehicle Routing Problem","authors":"Miao Wang","doi":"10.1109/ICCIS.2012.168","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.168","url":null,"abstract":"Vehicle Routing Problem (VRP) is one of critical problems in modern logistics service. In order to overcome the shortcomings of the basic Ant Colony Optimization (ACO) algorithm, which has long searching time and easily jumps into local optimal solution, a hybrid behavior ACO algorithm is presented for solving the VRP problem. A series of rules of the ants' behaviors are defined. The simulation results show that the above approach is reasonable and efficient.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132025113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
AJAX Crawling Scheme Based on Document Object Model 基于文档对象模型的AJAX抓取方案
Xuesong Zhang, Honglei Wang
{"title":"AJAX Crawling Scheme Based on Document Object Model","authors":"Xuesong Zhang, Honglei Wang","doi":"10.1109/ICCIS.2012.61","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.61","url":null,"abstract":"Many web applications adopt AJAX to enhance their user experience. But AJAX has a number of properties making it extremely difficult for traditional search engines to crawl. Google's AJAX crawling scheme suggests webmasters change their website architectures and add additional codes. It is so complicated that it be currently supported only by Google. The paper proposed an AJAX crawling scheme based on DOM and breadth-first AJAX crawling algorithm. It can build a State Transition Graph (STG) of an AJAX web application by tracking the changes of DOM tree triggered by some AJAX events, and then generate a static mirror site of the original AJAX web application.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132041119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Optimizing the Deployment of Maintenance Persons Based on Dynamic Programming Method 基于动态规划法的维修人员配置优化
2012 Fourth International Conference on Computational and Information Sciences Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.199
Hu Qiang, Liu Feng, Wu Wei, Wu Mingfei
{"title":"Optimizing the Deployment of Maintenance Persons Based on Dynamic Programming Method","authors":"Hu Qiang, Liu Feng, Wu Wei, Wu Mingfei","doi":"10.1109/ICCIS.2012.199","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.199","url":null,"abstract":"This paper sets up a model for optimizing the deployment of equipment maintenance persons. With a case study, the model optimizes the deployment of three levels of equipment maintenance persons using dynamic programming method and provides an effective quantifiable measure for scientific distribution of equipment support deployment.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123314367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interactive Approach to Eliciting Users' Preference Using Comparisons 使用比较的交互式方法来引出用户偏好
2012 Fourth International Conference on Computational and Information Sciences Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.178
Jianfeng Zhang, Weihong Han, Yan Jia, Peng Zou
{"title":"Interactive Approach to Eliciting Users' Preference Using Comparisons","authors":"Jianfeng Zhang, Weihong Han, Yan Jia, Peng Zou","doi":"10.1109/ICCIS.2012.178","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.178","url":null,"abstract":"The complexity of today's networks and distributed systems makes the process of network monitoring difficult. The amount of data produced by many distributed security tools can be overwhelming. So it's very difficult and limited to get the most risky alert through manual process based on the huge network alerts with many attributes, such as asset, priority, reliability, risk, type et al. The common method used to rank the alerts is scoring function, the higher the score, the more risky of the alert. Our motivation is that many times user can not precisely specify the weights for the scoring function as their preference in order to produce the preferred order of results. In this paper, we propose a new interactive preference searching method to elicit user's preference. An extensive performance study using both synthetic and real datasets is reported to verify its effectiveness and efficiency.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121578604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Method of Fuzzy Comprehensive Evaluation for Fracturing Effect 压裂效果模糊综合评价新方法
L. Tiejun, Tang Zhihao, Guo Dali, Ke Xijun
{"title":"A New Method of Fuzzy Comprehensive Evaluation for Fracturing Effect","authors":"L. Tiejun, Tang Zhihao, Guo Dali, Ke Xijun","doi":"10.1109/ICCIS.2012.28","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.28","url":null,"abstract":"This paper studied fuzzy comprehensive evaluation for fracturing in depth and pointed out the drawbacks of Max-product Composition. And then, based on Einstein operator, this paper established the model of fuzzy comprehensive evaluation for fracturing effect which can be used to analyze and optimize various parameters such as fracture length, conductivity, height, etc.. Finally, it is proved that this model is practical and effective in real applications.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125859488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Finite Element Analysis of Normal Contact Stiffness between Real Rough Surfaces Based on ANSYS 基于ANSYS的实际粗糙表面法向接触刚度有限元分析
2012 Fourth International Conference on Computational and Information Sciences Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.156
Wei Wang, Q. Tang, Xiaodong Xu, S. Gong
{"title":"Finite Element Analysis of Normal Contact Stiffness between Real Rough Surfaces Based on ANSYS","authors":"Wei Wang, Q. Tang, Xiaodong Xu, S. Gong","doi":"10.1109/ICCIS.2012.156","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.156","url":null,"abstract":"The data of real rough surface are captured by using the morphology measuring instrument LEXT OLS4000. Contraposing the scarcities that no rough surface produced with either statistical model or fractal model can represent the real surface and reflect the surface stress, the real rough surface model is built based on the idea of reverse engineering. ANSYS is employed in research on the normal contact between the real rough surfaces, which is predigested with the contact between a rigid plane and a rough surface. The study shows that hysteresis phenomenon presents itself between the normal loading curve and the normal unloading curve as a result of some asperities' plastic deformation, which also brings on residual press-stress benefits for material properties on the rough surface after unloading completely and the residual stress varies with the amount of load at the start of unloading. Normal contact stiffness increases first and then decreases along with the normal load, and is also affected by surface topography and the residual surface stress of the micro-body.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120957538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study on Security Issue of Internet of Things Based on RFID 基于RFID的物联网安全问题研究
2012 Fourth International Conference on Computational and Information Sciences Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.301
Shao Xi-wen
{"title":"Study on Security Issue of Internet of Things Based on RFID","authors":"Shao Xi-wen","doi":"10.1109/ICCIS.2012.301","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.301","url":null,"abstract":"In recent years, the use of radio frequency identification technology (RFlD: Radio Frequency Identification) to establish the current system of things becomes one of the mainstream models. This paper analyzes the internet system structure of things based on RFID, elaborates on the limitations of RFID technology to the things security threats, and analyzes RFID-based things that should meet the security demand and the corresponding security policies.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116138095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Research and Design of Electric Power Private Cloud Data Storage Model 电力私有云数据存储模型的研究与设计
2012 Fourth International Conference on Computational and Information Sciences Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.221
Li Su, Lin Li, Lu Zhang, Xiaoqian Nie
{"title":"Research and Design of Electric Power Private Cloud Data Storage Model","authors":"Li Su, Lin Li, Lu Zhang, Xiaoqian Nie","doi":"10.1109/ICCIS.2012.221","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.221","url":null,"abstract":"With the rapid development of cloud computing technology, the concept of cloud storage application appears. Faced with the unusually large amount of data in the electric power information system and the insufficient data redundancy because of storage space, searching data resources quickly and reducing storage costs become an inevitable need. In this article, the data storage technology based on cloud computing will be discussed. I will give the private cloud model of the power companies, research and design a five-story model of the data storage power private cloud and analysis the model's data security briefly to enhance data's flexibility and reliability.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116776939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Drilling Tool Failure Diagnosis Based on GA-SVM 基于GA-SVM的钻具故障诊断
2012 Fourth International Conference on Computational and Information Sciences Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.132
Yang Min, Liang Bin
{"title":"Drilling Tool Failure Diagnosis Based on GA-SVM","authors":"Yang Min, Liang Bin","doi":"10.1109/ICCIS.2012.132","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.132","url":null,"abstract":"Drilling tool failure is a major reason for low drilling speed, thus early drilling tool failure diagnosis is very important. Based on the generalization and approximation of non-linear capability of support vector machine (SVM) and the powerful ability of global optimization of genetic algorithm (GA), this paper establishes combined GA-SVM model through optimizing SVM parameters by GA. Then the model is used to forecast drilling tool failure of actual engineering practice. The experiment results show that optimal parameters searched by GA do significantly improve the forecast performance, and validates the effectiveness of the proposed algorithm, which provides a new method to forecast drilling tool failure.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131373523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Simulation and Analysis of a Streaming Media Congestion Control Algorithm Based on NS-2 基于NS-2的流媒体拥塞控制算法仿真与分析
2012 Fourth International Conference on Computational and Information Sciences Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.282
Wei Mao, D. Qi, Congming Wu, Kangyi Zhang
{"title":"Simulation and Analysis of a Streaming Media Congestion Control Algorithm Based on NS-2","authors":"Wei Mao, D. Qi, Congming Wu, Kangyi Zhang","doi":"10.1109/ICCIS.2012.282","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.282","url":null,"abstract":"NS(Simulator Network) is an object-oriented visual simulator based on large-scale discrete event. It simulates not only the transmission of network data and topology architecture, but also all kinds of IP network circumstance. This paper describes the architecture and characteristics of NS, and also gives the technique and the general process based on NS. The instance of a streaming media applications-based adaptive congestion control algorithm is implemented and simulation results are analyzed. The experimental result shows that when the network is congested, the delay, delay jitter and throughput will be corresponding changes in objective phenomenon.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127601847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信