2008 ISECS International Colloquium on Computing, Communication, Control, and Management最新文献

筛选
英文 中文
Research on the Shipbuilding Logistics System under Modern Shipbuilding 现代造船条件下的造船物流体系研究
Weihong Yue, Chengfang Wang, Qingying Zhang
{"title":"Research on the Shipbuilding Logistics System under Modern Shipbuilding","authors":"Weihong Yue, Chengfang Wang, Qingying Zhang","doi":"10.1109/CCCM.2008.88","DOIUrl":"https://doi.org/10.1109/CCCM.2008.88","url":null,"abstract":"In the 21st century, economy globalization is inevitable and international trade by ocean shipping is increasing greatly, so there is a fastigium in the ship market for shipbuilding industry. In China, there were 14.52 million shipping tons of ships finished in 2006 and China has been the three most important shipbuilding countries for 12 years, but its shipbuilding technology and management mode are undeveloped and restrict the competitive power of Chinese enterprises. Considering the real status of Chinese enterprises and technique characters of modern shipbuilding, the shipbuilding logistics mode is put forward and analyzed. And then the shipbuilding logistics management system based on MRP-II and JIT is built up, which has three kinds of plans and controls, i.e. MPS (master production schedule), MRP (material requirements planning) and shop-floor production schedule. This shipbuilding logistics management system is important and applicable for Chinese enterprises to build up the logistics mode fitting modern shipbuilding so as to improve the technology and management level and increase the competitive power.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115053916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Construct MES Ontology with OWL 利用OWL构建MES本体
Wen Long
{"title":"Construct MES Ontology with OWL","authors":"Wen Long","doi":"10.1109/CCCM.2008.280","DOIUrl":"https://doi.org/10.1109/CCCM.2008.280","url":null,"abstract":"Manufacturing Execution System (MES) links plan management and workshop control in an enterprise, which is an integrative management and control system of workshop production oriented to manufacturing process. MES ontology is a formal specification of conceptualization in MES domain, which plays an important role in the process of development and application of MES. In this paper the MES model of multiple views is firstly put forward. Secondly, a study is carried out on the ontology engineering and OWL. Thirdly, according to the MES model of multiple views, MES ontology model derived from the MES model of multiple views is achieved. Finally, MES ontology is described with OWL.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122675546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Adaptive Spam Filtering Based on Fingerprint Vectors 基于指纹向量的自适应垃圾邮件过滤
Weihong Liu, Weidong Fang
{"title":"Adaptive Spam Filtering Based on Fingerprint Vectors","authors":"Weihong Liu, Weidong Fang","doi":"10.1109/CCCM.2008.275","DOIUrl":"https://doi.org/10.1109/CCCM.2008.275","url":null,"abstract":"Spam has become one of the severest problems for today's network systems. In this paper, we present an adaptive spam filtering mechanism based on message fingerprinting. In our mechanism, each message is represented by a fingerprint vector, and two messages with a short distance in their fingerprint vectors are viewed as variants of each other. We present methods for fast matching a query message against a list of known spam messages, and methods for adaptive updating of the fingerprint vectors of known spam messages. Experiments on real spam data demonstrate the effectiveness of the proposed method.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122654499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Research on the Application of Immune Network Theory in Risk Assessment 免疫网络理论在风险评估中的应用研究
Cai Shuqin, Wang Ge, Cai Hong
{"title":"Research on the Application of Immune Network Theory in Risk Assessment","authors":"Cai Shuqin, Wang Ge, Cai Hong","doi":"10.1109/CCCM.2008.324","DOIUrl":"https://doi.org/10.1109/CCCM.2008.324","url":null,"abstract":"As new field of computer intelligence research, artificial immune system inspired by biological immune system, provides a strong paradigm for information processing and problem solving. Artificial immune network theory is an important theory of AIS and has already wildly applied in the fields of data clustering, data analysis and robot control. This research proposes firstly to apply artificial immune network theory into risk assessment of managerial field, provides specific model construction process relating to case study and testifies the result with data from real test.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122761921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Simulation and Analysis of Routing Schemes in Structured P2P System 结构化P2P系统中路由方案的仿真与分析
Yinbo Cheng, X. Wen, Yong Sun
{"title":"Simulation and Analysis of Routing Schemes in Structured P2P System","authors":"Yinbo Cheng, X. Wen, Yong Sun","doi":"10.1109/CCCM.2008.241","DOIUrl":"https://doi.org/10.1109/CCCM.2008.241","url":null,"abstract":"A number of routing schemes have been proposed to improve the lookup performance of distributed hash table (DHT). There are three representative routing schemes among existing DHTs: recursive routing, semi-recursive routing and iterative routing. To know which routing scheme is more efficient, this paper takes one of the most important DHTs -- Chord as an example to simulate the three representative routing schemes and discusses the effectiveness of them from the aspects of lookup latency, effect of churn and difficulty of NAT traversal. The simulations and analysis show that they have advantages in different situations.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121994633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Research on Graphic Model of the Novel Multiple-plane and Multiple-stage Packet Switching System 新型多平面多级分组交换系统的图形模型研究
Xiangjie Ma, Xiuqin Li, Julong Lan, Junpeng Mao, Lei He, Baisheng Zhang
{"title":"Research on Graphic Model of the Novel Multiple-plane and Multiple-stage Packet Switching System","authors":"Xiangjie Ma, Xiuqin Li, Julong Lan, Junpeng Mao, Lei He, Baisheng Zhang","doi":"10.1109/CCCM.2008.153","DOIUrl":"https://doi.org/10.1109/CCCM.2008.153","url":null,"abstract":"In this paper, we present a graphic model of multiple-plane and multiple-stage packet switching system based on its topological architecture. We found that there are two vertex sub-sets belonging to the balanced vertex set and another two vertex sub-sets belonging to the competitive vertex set in MPMS model, respectively. Therefore, we only need to use balancing policies for the balanced vertex sets and use scheduling policies for the competitive vertex set to switch packets. Moreover, switching path counts (SPC) was proved to be equal to the multiplication of vertex out-degree of the balanced vertex sub-sets. Lastly, we studied the sufficient condition, is the SPC value is not less than parameter n, to offer enough non-conflicting switching paths for any vertex pair matching between DEMs and MUXs in MPMS.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122152288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Approach of Color Image Edge Detection Based on Triangle Similarity 基于三角形相似度的彩色图像边缘检测方法
Han Junjun, Zhao Jingxiu, Wang Mian
{"title":"An Approach of Color Image Edge Detection Based on Triangle Similarity","authors":"Han Junjun, Zhao Jingxiu, Wang Mian","doi":"10.1109/CCCM.2008.110","DOIUrl":"https://doi.org/10.1109/CCCM.2008.110","url":null,"abstract":"For human's vision, the edge forms where the value of color of an image changes rapidly. And the changes are so abstract that it is very difficult to quantize. In this paper, a method detecting color image edges based on triangle similarity is presented, which turn the color changes into the changes of a trianglepsilas form. It makes the abstract problem become not only quantization but also a problem shift to us that developed more perfect field. The experiment results show that the method exploits the color feature fully, raising the accuracy of edge detection and making sure the continuous of edges.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122198925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Time-Delay Compensation Control of Networked Control Systems Using Timestamp Based State Prediction 基于时间戳状态预测的网络控制系统时滞补偿控制
Jiwei Hua, Tao Liang, Hexu Sun, Zhao-ming Lei
{"title":"Time-Delay Compensation Control of Networked Control Systems Using Timestamp Based State Prediction","authors":"Jiwei Hua, Tao Liang, Hexu Sun, Zhao-ming Lei","doi":"10.1109/CCCM.2008.333","DOIUrl":"https://doi.org/10.1109/CCCM.2008.333","url":null,"abstract":"In order to compensate time-delay in the networked control system (NCS), the paper presents a state prediction control method which adopted time-stamp. At first, we studied a time-stamp based time-delay measuring algorithm of NCS and implemented the state prediction based time-delay compensation control to the system. Then, we proposed a state prediction control approach of establishing an approximate model to object states in the controller and actuator time-driven. With that, we designed a state prediction controller to make the system achieve prediction control and deduced the necessary and sufficient conditions for stabilizing the system. At last, the simulation results of the numerical example prove the validity of the proposed approach.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129416813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Study on Wap Self-Adapt Based on Web Usage Mining 基于Web使用挖掘的Wap自适应研究
X. Shixiong, Yuan Guan, Zhang Lei, Deng Zhiwen, X. Jingyan
{"title":"Study on Wap Self-Adapt Based on Web Usage Mining","authors":"X. Shixiong, Yuan Guan, Zhang Lei, Deng Zhiwen, X. Jingyan","doi":"10.1109/CCCM.2008.210","DOIUrl":"https://doi.org/10.1109/CCCM.2008.210","url":null,"abstract":"Smart terminal equipments, such as mobile phone, PDA etc., develop quickly at present. At the same time, there is huge information with various formats in the society, such as image, text, table etc. How to obtain information with WAP (Wireless Application Protocol) is an emergency problem nowadays. In allusion to this issue, a study on WAP self-adapt based on Web usage logs is proposed in the paper. Under the background of the application of data mining on the Web, the user interest algorithm and the WAP page rebuild algorithm with retrieval and mining of userpsilas usage logs data are put forward., user personalize data sharing in the WAP pages is implemented combining with the relevant user content interest algorithm.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129622365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
SIP Based Real-Time Web Services Communication Model 基于SIP的实时Web服务通信模型
Cheng Bo, Guo Jie, Meng Xiangwu, Chen Junliang
{"title":"SIP Based Real-Time Web Services Communication Model","authors":"Cheng Bo, Guo Jie, Meng Xiangwu, Chen Junliang","doi":"10.1109/CCCM.2008.284","DOIUrl":"https://doi.org/10.1109/CCCM.2008.284","url":null,"abstract":"Web Services makes network operators to accelerate the adoption of IT software concepts as service oriented architecture into the telecoms domain, which can reduce the time for value-added services to market. In this paper, we present an overview of the recent development in telecommunication area with a focus on key technologies that can be applied to Web service enablement of communication. In particular, we present the real-time Web services communication model (RT-WSCM) based on Session Initiation Protocol (SIP), and which is one of the most important protocols for multimedia and voice communication over IP communication, and also we introduce the more details for enhanced state machine, the messages dispatching design and implementation for RT-WSCM. Finally, we give the conclusion and future essential work.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124615545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信