2012 Fourth International Conference on Computational and Information Sciences最新文献

筛选
英文 中文
Steady-State Model and Its Application in Natural Gas during Transportation in Pipeline 天然气管道输送过程稳态模型及其应用
2012 Fourth International Conference on Computational and Information Sciences Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.291
Yan Hongdong, You Yun
{"title":"Steady-State Model and Its Application in Natural Gas during Transportation in Pipeline","authors":"Yan Hongdong, You Yun","doi":"10.1109/ICCIS.2012.291","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.291","url":null,"abstract":"This paper built the forecasting model that can predict the temperature, pressure and flow along natural gas pipeline according to pipe flow equations. Improved Euler method is used to solve these equations. The changes of gas velocity and temperature along pipeline are included to improve the accuracy and precision of the simulation. A MATLAB program has been developed to implement the algorithm. Comparisons between this program and the professional gas pipeline simulation software show that the proposed algorithm in this paper has higher accuracy.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132409637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Computational Rationality of Formal Analysis on Cryptographic Protocols 密码协议形式分析的计算合理性
2012 Fourth International Conference on Computational and Information Sciences Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.111
S. Liu, J. Ye
{"title":"Computational Rationality of Formal Analysis on Cryptographic Protocols","authors":"S. Liu, J. Ye","doi":"10.1109/ICCIS.2012.111","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.111","url":null,"abstract":"This paper describes and discusses the computational rationality of formal analysis on cryptographic protocols, which is based on the computational rationality theorem of formal encrypt on Abadi-Rowgaway. Analysis of group key distribution protocol shows that the theorem has strong analytical ability to the protocols alternative attacks. The paper presents formal methods on group key distribution protocols, and the formal definition of security in the computational method. Finally, it proves its rationality.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133693019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Study of the Impact of Limitation of the Amount of Vehicles in Beijing Based on Mathematic Modeling 基于数学模型的北京市机动车限行影响研究
Hao-min Zhang, Bo-ying Shi
{"title":"A Study of the Impact of Limitation of the Amount of Vehicles in Beijing Based on Mathematic Modeling","authors":"Hao-min Zhang, Bo-ying Shi","doi":"10.1109/ICCIS.2012.49","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.49","url":null,"abstract":"In order to study the limitation of the amount of vehicles in Beijing and especially the impact of \"Lottery\" policy for controlling the car growth in Beijing, a mathematic model was built to simulate the current car growth in Beijing and compare the growth model with the Logistic growth model to see if it is effective to control the rapid growth of vehicles in Beijing by using these limitations and the new car policy. As a result, the model shows that the limitation of cars in Beijing as well as the \"Lottery\" policy in Beijing is effective ways to help slow down the fast growth of cars in Beijing. Moreover, based on the model in this paper, five suggestions to improve transport problems were given.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130405984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rapdos: A RFID Authentication Protocol for Defending against DoS Rapdos:一种防御DoS的RFID认证协议
2012 Fourth International Conference on Computational and Information Sciences Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.215
Zhao Wang, Xuesong Zhang, Zhong Chen
{"title":"Rapdos: A RFID Authentication Protocol for Defending against DoS","authors":"Zhao Wang, Xuesong Zhang, Zhong Chen","doi":"10.1109/ICCIS.2012.215","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.215","url":null,"abstract":"Radio frequency identification (RFID) technology is a non-contact automatic identification technology. The basic principle of RFID is coupled with radio frequency signal and the spatial transmission characteristics. From object recognition to achieve automatic recognition, RFID has the advantages of being effective, diversity, high capacity, low cost, anti-pollution, penetrating and so on. However, current RFID authentication protocols cannot defend against DoS attack. This paper proposes Rapdos, a novel mutual authentication protocol, which is based on the use of symmetric encryption and dynamic update key to prevent the DoS attack. The experiment has validated that Rapdos has provided good security for RFID system, and can defeat location privacy attack, relay attack, eavesdropping attack, denial-of-service attack, and solve problems of RFID security privacy.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116887973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximate Merging of a Pair of DP Curves 一对DP曲线的近似合并
Huahui Cai, Yan Cheng
{"title":"Approximate Merging of a Pair of DP Curves","authors":"Huahui Cai, Yan Cheng","doi":"10.1109/ICCIS.2012.88","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.88","url":null,"abstract":"This paper deals with the approximate merging problem of two adjacent DP curves with different degrees by a single curve. We first transform the DP curves into the Bézier curves. Then, we merge Bézier curves. Finally, we transform the Bézier curve back into the DP curve. In the end of this paper, numerical examples are provided to demonstrate the validity and efficiency of our algorithms.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131189984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Web Viral Marketing Based Construction Strategy of Customer Trust Network 基于网络病毒式营销的客户信任网络构建策略
2012 Fourth International Conference on Computational and Information Sciences Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.363
Xiufeng Xia, Ying Li, Lihui Cong
{"title":"Web Viral Marketing Based Construction Strategy of Customer Trust Network","authors":"Xiufeng Xia, Ying Li, Lihui Cong","doi":"10.1109/ICCIS.2012.363","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.363","url":null,"abstract":"Trust relationship and assessment are two challenges of constructing large scale trust network for web viral marketing applications. Because different customers have different needs and expectations in different aspects of the service and due to the customer's self-property, trading amount, trading time, trading evaluation and trading risk perception factors, etc. The trust assessment among customers is hard to measure and difficult to give accurate quantification. In order to solve the problem, in this paper, a customer trust network model based on the above factors and combined with cognitive theories and methods of e-Business is implemented and three strategies, customer occupation based construction strategy, customer domain based construction strategy and customer occupation and domain based construction strategy, are used for constructing trust network. During the construction process, the method of trust computation in each strategy is introduced. The Experiment results show that the model and these strategies can reduce the complexity of trust relationship and with guaranteed trust value as a premise, improve the coverage rate of trust network.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131411806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Study on Mathmatical Model of Fluid Flow through Porous Medium about Multi-layer Fault Block Oil Reservoir Coupling with Benching-Horizontal Well 多层断块油藏与台水平井耦合渗流数学模型研究
2012 Fourth International Conference on Computational and Information Sciences Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.355
Pang Jin, Lei Guanglun, Zhang Liya, Tang Huijie
{"title":"The Study on Mathmatical Model of Fluid Flow through Porous Medium about Multi-layer Fault Block Oil Reservoir Coupling with Benching-Horizontal Well","authors":"Pang Jin, Lei Guanglun, Zhang Liya, Tang Huijie","doi":"10.1109/ICCIS.2012.355","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.355","url":null,"abstract":"The mechanism and rule of fluid flow through porous medium about multi-layer complex fault block oil reservoir's developing through benching-horizontal well is completed. On the basis of mathmatical model in transient period, this paper established a mathmatical model about benching-horizontal well which pass through multi-layer reservoirs unconnected reciprocally coupled with reservoir. We resoluted this model through Laplace transforming, Stehfest inverting and conjugate gradient method. Compared with the computational solution from saphir, this model is of high reliability. Through this model on a given fault block oil reservoir, we can compute the downhole-pressure and deliverability distribution in different producing periods. This model presented some theory basis for the study on reservoir engineer of multi-layer complex fault block oil reservoir's developing through benching-horizontal well.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128419460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Realization of the Graphic System of Power System Based on Browser/Server Model 基于浏览器/服务器模式的电力系统图形化系统的设计与实现
2012 Fourth International Conference on Computational and Information Sciences Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.123
Si-qing Sheng, Junsheng Li, Xin Wu, Lei Hou, L. Fan
{"title":"Design and Realization of the Graphic System of Power System Based on Browser/Server Model","authors":"Si-qing Sheng, Junsheng Li, Xin Wu, Lei Hou, L. Fan","doi":"10.1109/ICCIS.2012.123","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.123","url":null,"abstract":"As for the graphical modeling software of current domestic power system, it used mostly to be the stand-alone edition or based on C/S (client-server) mode. Compared with the B/S (browser/server) mode, there are some shortcomings in software installation, upgrade and maintenance. This paper aims at developing the graphical modeling software of power system, which is based on the B/S mode, making most use of the latest research result of on computer technology, web technology and Ajax technology. Then the software turns to be very suitable for power system's graphic modeling, meanwhile, it enable to greatly improve the designers' working efficiency, with and has some realistic and utilizing value.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134379827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dual-Core Architecture for Dynamic Binary Translation System: Tradeoff between Frequency and Bandwidth 动态二进制转换系统的双核架构:频率和带宽之间的权衡
2012 Fourth International Conference on Computational and Information Sciences Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.133
Xu Fan, Shen Li, W. Zhiying
{"title":"Dual-Core Architecture for Dynamic Binary Translation System: Tradeoff between Frequency and Bandwidth","authors":"Xu Fan, Shen Li, W. Zhiying","doi":"10.1109/ICCIS.2012.133","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.133","url":null,"abstract":"Traditional DBT system is hard to accelerate by introducing a customized processor core because the startup overhead is hard to eliminate. In this paper, we concentrate on how to choose a suitable layout of the DBT core in a dual-core system. We analyze the tradeoff between the frequency and the memory bandwidth of the DBT core through an analytical model, and simulated 4 different and usual layouts of dual-core DBT in experiments. Finally, the validation of our model is verified through experimental results: the dual-core DBT framework can sharply reduce the startup overhead and speedup the translation-execution process by about 12%. Moreover, we also found the relationship between the code expand rate and the communication overhead: the performance of a program with high code expand rate is not sensitive to the communication speed of the platform.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134500156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Storage and Solving of Large Sparse Matrix Linear Equations 大型稀疏矩阵线性方程的存储与求解
2012 Fourth International Conference on Computational and Information Sciences Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.293
Chao Liu, Junmin Ye, Yining Ma
{"title":"Storage and Solving of Large Sparse Matrix Linear Equations","authors":"Chao Liu, Junmin Ye, Yining Ma","doi":"10.1109/ICCIS.2012.293","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.293","url":null,"abstract":"Solving of large sparse matrix linear equations is always the research focus of scientific and engineering calculation field. With the sparsity and symmetry characteristics of coefficient matrix, Compressed Sparse Row (CSR) is adopted in the storage of large sparse matrix linear equations. Under the condition of CSR, Symmetrica Successive Over Relaxations-Preconditioned Conjugate Gradient method (SSOR-PCG) is employed in the solution of large sparse matrix linear equations.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133056207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信