{"title":"Study on Resource Scheduling Method of Predictive Maintenance for Equipment Based on Knowledge","authors":"X. Li, J. Wen, Rui Zhou, Yaoguang Hu","doi":"10.1109/ISKE.2015.13","DOIUrl":"https://doi.org/10.1109/ISKE.2015.13","url":null,"abstract":"At present, heavy industrial competition makes more manufacturing pay attention to the service based on their products. Therefore, product service system has caused the extensive value of the academic circles. Service resource scheduling is the key step in the product service delivery, which depends on the knowledge mined from history service data and product information in the use process, namely the different fault maintenance scheme, technicians' skill, equipment state information, fault prediction information, work plan, etc. Based on this, this paper puts forward a resource scheduling method for predictive maintenance services of equipment whose location change dynamically, aiming at eliminating potential failure, minimizing service cost and outage cost, considering the technicians' ability of different maintenance task, fault prediction information, equipment operation plan and other constraints. First, a mathematical model is set up to describe this problem. Then this paper adopts a hybrid algorithm to resolve that. Last, the result that the best time of servicing, route planning and the reasonable technician, shows this method can improve the service level and reduce total cost.","PeriodicalId":312629,"journal":{"name":"2015 10th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123234058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Game Theory with Probabilistic Prediction for Conflict Resolution in Air Traffic Management","authors":"Kaijun Xu, Heng Yin, Long Zhang, Yang Xu","doi":"10.1109/ISKE.2015.87","DOIUrl":"https://doi.org/10.1109/ISKE.2015.87","url":null,"abstract":"In the course of flight, conflict in the air between aircraft happens sometimes with air transportation increase. It is an urgent problem to solve flight conflict for air traffic management. In this paper, to increase overall air transport system efficiency and enhance safety, probabilistic prediction has been considered as an effective method to characterize the conflict resolution for realizing benefits. Firstly, it established a cooperative game model, player who has been assigned different statuses by a priority ranking mechanism proposed, will take others' preferences into consideration. Then, we use the probabilistic prediction model to describe the game conflict resolution. To the cooperative nature, player will choose its conflict-free strategy, ensure that the whole system could reach a socially coherent compromise, namely resolving the conflict meanwhile satisfying individual's preferences. Finally, theoretical analysis and numerical study are undertaken to show the effectiveness of the proposed scheme.","PeriodicalId":312629,"journal":{"name":"2015 10th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127542723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lasso Screening for Object Categories Recognition Using Multi-directional Context Features","authors":"Danfei Shen, Guitao Cao, Dan Meng","doi":"10.1109/ISKE.2015.74","DOIUrl":"https://doi.org/10.1109/ISKE.2015.74","url":null,"abstract":"Image representation using local features and sparse coding (SC) plays a very important role in image classification when the dataset is fairly large. Despite of its worldwide popularity, there are still some improving space in classification efficiency and computational investment in training and coding phrase of SC. In this paper, we put forward a novel object categories recognition method from two aspects. First, the contextual relevance between image patches are fully utilized by merging local feature of every sub-patch with its neighboring ones into strong context features to generate the multiple sparse representations, which are received by the SC and multi-scale max pooling SPM(Spatial Pyramid Matching), respectively. Second, while calculating the sparse coefficients of SC, we need to solve L1-regularized least square problem. Screening out the zero coefficients and discarding the corresponding inactive codewords before solving Lasso problem can remarkably speed up the optimization. The proposed method outperforms state-of-the-art performancein a large number of image categorization experiments on several benchmarks: the ground truth dataset (21 Land-Use database), the event dataset (UIUC-Sport dataset), and the object recognition dataset (Caltech101 dataset).","PeriodicalId":312629,"journal":{"name":"2015 10th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130466650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yiming Li, Baogang Wei, Hui Chen, Licheng Jiang, Zherong Li
{"title":"Cross-Domain Learning Based Traditional Chinese Medicine Medical Record Classification","authors":"Yiming Li, Baogang Wei, Hui Chen, Licheng Jiang, Zherong Li","doi":"10.1109/ISKE.2015.99","DOIUrl":"https://doi.org/10.1109/ISKE.2015.99","url":null,"abstract":"In Traditional Chinese Medicine(TCM) area, medical records are the objective record of a doctor's diagnosis and treatment and they are the basis of the TCM development. However, existing medical records of TCM are derived from books, medical cases, Web and most of them lack the categories information. In this paper, we propose a text classification method for the TCM medical record based on cross-domain topic model. First, we transform the physical books into the digital documents, then tokenize and filter the documents with domain lexicons to achieve the significative sequences of words which largely maintain the topics of original documents. Second, we use the cross domain topic model named Topic Relevance Weighting Model(TRWM) to generate the features. Finally, the generated features are leveraged for the medical records classification and compared with the baselines. The experimental results validate the effectiveness of our method.","PeriodicalId":312629,"journal":{"name":"2015 10th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134286359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Selective Hierarchical Ensemble Modeling Approach and Its Application in Leaching Process","authors":"Guanghao Hu, Fei Yang","doi":"10.1109/ISKE.2015.14","DOIUrl":"https://doi.org/10.1109/ISKE.2015.14","url":null,"abstract":"To improve the precision and generalization of ensemble model and leaching model, a novel selective hierarchical ensemble modeling approach is proposed for leaching rate prediction in this paper. Unlike previous selective ensemble model, the new selective ensemble model is a hierarchical model. The model considers not only the combination of sub-models, but also the generation of sub-models. First of all, a new multi-model ensemble hybrid model (MEHM) based on bagging algorithm is proposed. In this model, the sub-models are composed of data model and mechanism model. The data model generates training subsets by using the proposed based vector bootstrap sampling algorithm. Afterwards, a new selective multi-model ensemble hybrid model (NSMEHM) based on binary particle swarm optimization (PSO) algorithm is presented. In this model, the binary PSO optimization algorithm is used to find out a group of the MEHMs, which minimizes the error and maximizes the diversity. Experiment results indicate that the proposed NSMEHM has better prediction performance than the other models.","PeriodicalId":312629,"journal":{"name":"2015 10th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121221947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discovery of Field Functional Dependencies","authors":"Jizhou Sun, Jianzhong Li, Hong Gao, Xianmin Liu","doi":"10.1109/ISKE.2015.9","DOIUrl":"https://doi.org/10.1109/ISKE.2015.9","url":null,"abstract":"Integrity constrains in relational database were proposed for logical database designation. Recently, the data quality problem is getting more and more attentions, and integrity constrains are used for detecting and repairing inconsistent data. In the purpose of detecting inconsistent data more comprehensively, previous research has proposed more type of integrity constrains, including conditional functional dependencies, editing rules and fixing rules, etc. In this paper, a new type of constrain was proposed: field functional dependencies(FFDs). In case that a database is logically well designed, it becomes difficult to detect and repair inconsistent data according to normal functional dependencies, while FFDs can be a complementary to this case. To make well use of FFDs, this paper has concentrated on the problem of discovering FFDs, i.e., given a sample database instance, how to find out such kind of constrain rules between attributes. Usually the input data could be so large that it becomes expensive and inefficient for manually discovering of FFDs. According to the properties of FFDs, an efficient algorithm was designed to discover these rules. Finally, the efficiency of the discovering algorithm, and the coverage of FFDs when detecting data errors compared with previous works were experimentally evaluated.","PeriodicalId":312629,"journal":{"name":"2015 10th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114897844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automated Outlier Removal for Mobile Microbenchmarking Datasets","authors":"A. Rehn, Jason J. Holdsworth, Ickjai Lee","doi":"10.1109/ISKE.2015.55","DOIUrl":"https://doi.org/10.1109/ISKE.2015.55","url":null,"abstract":"Microbenchmarking is a useful tool for fine-grained performance analysis, and represents a potentially valuable tool in the development of mobile applications and systems. However, the fine-grained measurements of microbenchmarking are inherently susceptible to noise from the underlying operating system and hardware. This noise includes outliers that must be removed in order to produce meaningful results. Existing microbenchmarking implementations utilise only simple mechanisms for removing outliers. In this paper we propose a heuristic for the automated removal of outliers from mobile microbenchmarking datasets. We then simplify this heuristic for use on mobile devices. Empirical evaluation demonstrates that our outlier removal heuristics are effective across microbenchmarking datasets collected from a range of mobile devices. Our simplified heuristic operates in log-linear time, making it suitable for use on resource-constrained mobile devices. The ability to perform outlier removal on-device without the need for post-processing on desktop or server hardware enhances the utility of mobile microbenchmarking tools. Our results present interesting opportunities for further studies across a broader range of device platforms.","PeriodicalId":312629,"journal":{"name":"2015 10th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114911088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Question-Answering Based on Wikipedia Data Extraction","authors":"Xiangzhou Huang, Baogang Wei, Yin Zhang","doi":"10.1109/ISKE.2015.78","DOIUrl":"https://doi.org/10.1109/ISKE.2015.78","url":null,"abstract":"The question-answering (QA) system plays a vital role in artificial intelligence. The goal of automatic QA is to find out correct answers to the natural language questions raised by users from some specified datasets. Data on the Web is about everything and contains almost all the answers we needed. Wikipedia is a collaboratively edited, multilingual, free Internet encyclopedia which contains more than 30 million articles and can be considered to be a huge dataset for us to extract answers from. In this paper, we propose a method to integrate Wikipedia data extraction with automated question answering, which allows us to extract answers to questions from Wikipedia pages in real time. Experimental results show that the QA system based on our proposed method achieves good precision while answering questions.","PeriodicalId":312629,"journal":{"name":"2015 10th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125466966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Proposal to Represent the Linguistic Conditional Preference Networks","authors":"I. Truck, Wolfgang Schmid","doi":"10.1109/ISKE.2015.32","DOIUrl":"https://doi.org/10.1109/ISKE.2015.32","url":null,"abstract":"In this article, we focus on group decision making when preferences are expressed through the LCP-nets (Linguistic Conditional Preference networks). There is a need for complementing efforts and research on mixing LCP-nets together to be able to compute group preferences. First steps are the comparison between two LCP-nets and the aggregation of LCP-nets. In order to compare then aggregate two LCP-nets, we propose a matrix representation that takes into account the number of nodes, the directions and three kinds of arcs. With this simple modeling, computations become very easy and fast. In particular, we develop an adjunction operator called + that permit to aggregate two LCP-nets under certain conditions.","PeriodicalId":312629,"journal":{"name":"2015 10th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122807778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information System's Security Evaluation of Dynamic Behavior Based on Service Composition","authors":"DanChen Wang, Yang Xu, Peng Xu","doi":"10.1109/ISKE.2015.71","DOIUrl":"https://doi.org/10.1109/ISKE.2015.71","url":null,"abstract":"In the complex network environment, system service is dynamically adjusted according to the changes of user behavior and computing environment. Also, security strategy tends to be more dynamic based on the work flow, which will bring new challenges to the security evaluation of system operation. Therefore, this paper aims to regard the service composition business as research object, focusing on the analysis of security equipment's character that deployed by the system, abstracting the behavior of security service, classifying it to the business service, and systematically solving the security evaluation problems in business operation. Meanwhile, user behavior pattern is established on the cloud-model theory, and fully studied in the premise of ensuring the structural accuracy of work flow. Then, by analyzing the credibility of user behavior, the utility function is defined from the relation between threat and protection, and the security service efficiency identified by the change operation set of security service. Furthermore, a guaranteeing method is raised to the rational reconstruction by a security component, which produces an adequate redundant path of component service according to the existing executive record and logical structure, so as to reach the goal of ensuring the operation security of system business.","PeriodicalId":312629,"journal":{"name":"2015 10th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116603501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}