2008 International Conference on Internet Computing in Science and Engineering最新文献

筛选
英文 中文
Machine Tool Distributed Cooperative Design System Based on Extended MVC-Based Web Application Framework and XML Interoperable Information Model 基于扩展mvc的Web应用框架和XML互操作信息模型的机床分布式协同设计系统
2008 International Conference on Internet Computing in Science and Engineering Pub Date : 2008-01-28 DOI: 10.1109/ICICSE.2008.67
Yan Cao, Lina Yang, Yanli Yang, Hua Chen, Ning Liu
{"title":"Machine Tool Distributed Cooperative Design System Based on Extended MVC-Based Web Application Framework and XML Interoperable Information Model","authors":"Yan Cao, Lina Yang, Yanli Yang, Hua Chen, Ning Liu","doi":"10.1109/ICICSE.2008.67","DOIUrl":"https://doi.org/10.1109/ICICSE.2008.67","url":null,"abstract":"To satisfy current requirements of Web applications and solve the existing problems in Web application development, an extended MVC-based Web application framework based on XML on J2EE platform is put forward that is more flexible, expansible and maintainable. According to the characteristics of structured and unstructured machine tool product data in Web based distributed cooperative design environment, the definition and model of an XML- based document tree is presented, which is able to unify the representation of product design and manufacturing information. An XML style interface and mapping interface mechanism are discussed to realize interactive information transaction across heterogeneous platforms. A machine tool distributed cooperative design system is developed to validate the extended MVC-based web application framework and XML interoperable information model. The result shows their effectiveness.","PeriodicalId":333889,"journal":{"name":"2008 International Conference on Internet Computing in Science and Engineering","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125495255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Objective Evaluation of Several Shift Invariant Image Fusion Methods 几种平移不变图像融合方法的客观评价
2008 International Conference on Internet Computing in Science and Engineering Pub Date : 2008-01-28 DOI: 10.1109/ICICSE.2008.72
Yin Qing Li, L. Li, Bao Li
{"title":"Objective Evaluation of Several Shift Invariant Image Fusion Methods","authors":"Yin Qing Li, L. Li, Bao Li","doi":"10.1109/ICICSE.2008.72","DOIUrl":"https://doi.org/10.1109/ICICSE.2008.72","url":null,"abstract":"The results from most of image fusion methods are evaluated using single criteria, which has its limitations. A quantitative method is proposed to evaluate several shift invariants by using three fusion approaches, mainly the discrete wavelet frames, steerable pyramid, and dual-tree complex wavelet transform, respectively. The performances and features of these approaches are compared each other. The experimental simulation proves that the proposed evaluation is an efficient and applicable model.","PeriodicalId":333889,"journal":{"name":"2008 International Conference on Internet Computing in Science and Engineering","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127960948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mitigating Harm of Liar-Farm in Reputation Model of VoIP Spam Filtering System VoIP垃圾邮件过滤系统信誉模型中的谎言场危害缓解
2008 International Conference on Internet Computing in Science and Engineering Pub Date : 2008-01-28 DOI: 10.1109/ICICSE.2008.66
Fei Wang, Yijun Mo, Caihong Yang, Benxiong Huang
{"title":"Mitigating Harm of Liar-Farm in Reputation Model of VoIP Spam Filtering System","authors":"Fei Wang, Yijun Mo, Caihong Yang, Benxiong Huang","doi":"10.1109/ICICSE.2008.66","DOIUrl":"https://doi.org/10.1109/ICICSE.2008.66","url":null,"abstract":"Reputation can help VoIP system detect spammers and filter spam calls, however, existing of liar farm would destroy the infrastructure of reputation system. As the spammers are more and more trickish, they would certainly construct liar farms and ask liars to inject unfair positive evaluation to raise their reputation. Furthermore, false recommendation emerged dynamically and randomly. Hence, most traditional solution can hardly mitigate the threat from liars. In this paper, we proposed a novel schema which is based on game theory against false recommendation. In our approach, we define recommendation game (RG) and construct the strategy of reputation requester, \"tit for tat\", against dynamical and random behavior of spammer and liar. At last, we verify the RG in the P2P-AVS (anti-voice-spam). Results show that RG could mitigate the threat of liar farm and raise the accuracy of spam detection, and make reputation system be robust and stable even if there are a lot of liars.","PeriodicalId":333889,"journal":{"name":"2008 International Conference on Internet Computing in Science and Engineering","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129194325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sufficient Conditions for Absolute Stability and Optimization Using Genetic Algorithms of Specific Class of Fuzzy Logic Controllers 一类模糊逻辑控制器绝对稳定及遗传算法优化的充分条件
2008 International Conference on Internet Computing in Science and Engineering Pub Date : 2008-01-28 DOI: 10.1109/ICICSE.2008.101
J. Osmic, N. Prljaca
{"title":"Sufficient Conditions for Absolute Stability and Optimization Using Genetic Algorithms of Specific Class of Fuzzy Logic Controllers","authors":"J. Osmic, N. Prljaca","doi":"10.1109/ICICSE.2008.101","DOIUrl":"https://doi.org/10.1109/ICICSE.2008.101","url":null,"abstract":"This paper has proposed Specific class of single input single output (SISO) Mamdani fuzzy logic proportional controllers (FLPC) with triangle input membership functions, output membership functions with the same area, the sum-product composition rule for inference and centroid of area defuzzifier for control of both stable and unstable SISO linear time invariant systems. The proposed FLPC in fact represents memoryless, nonlinear, locally Lipschitz mapping between its input and output. According to the Popov criterion for absolute stability, nonlinear part of the system must satisfy sector conditions. In this paper necessary and sufficient conditions have been determined, which must satisfy FLPC parameters in order for the memoryless function represented by FLPC to satisfy the sector conditions. Subsequently, using the Popov criterion, the sufficient conditions for absolute stability of feedback connected linear system and FLPC have been determined. Based on the results achieved, an optimization method for both parameters and decision rules of FLPC has been proposed using genetic algorithms.","PeriodicalId":333889,"journal":{"name":"2008 International Conference on Internet Computing in Science and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131394934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Research Approach on Network Control Systems 一种新的网络控制系统研究方法
2008 International Conference on Internet Computing in Science and Engineering Pub Date : 2008-01-28 DOI: 10.1109/ICICSE.2008.104
Zhang Lihua, Wu Yuqiang, Gong Lei, Chen Haojie
{"title":"A Novel Research Approach on Network Control Systems","authors":"Zhang Lihua, Wu Yuqiang, Gong Lei, Chen Haojie","doi":"10.1109/ICICSE.2008.104","DOIUrl":"https://doi.org/10.1109/ICICSE.2008.104","url":null,"abstract":"The era of a world connected by networks, especially by Internet, has imposed new challenges to control theory and application. The original method of modeling of a network control system as continuous - discrete with random structure is presented in the article. The method allows taking into account stochastic character of data transfer via channel, to determine the areas of stability of control systems, and to choose the most effective algorithms of control by the distributed technological systems. Moreover, the application of the given method for the analysis and calculation of areas of network control systems stability with competing access to the data transfer channel is shown by the example of standard Ethernet..","PeriodicalId":333889,"journal":{"name":"2008 International Conference on Internet Computing in Science and Engineering","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131682580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
ICAIS: A Novel Incremental Clustering Algorithm Based on Artificial Immune Systems 一种新的基于人工免疫系统的增量聚类算法
2008 International Conference on Internet Computing in Science and Engineering Pub Date : 2008-01-28 DOI: 10.1109/ICICSE.2008.13
Xianghua Li, Tianyang Lu, Zhengxuan Wang, Chao Gao
{"title":"ICAIS: A Novel Incremental Clustering Algorithm Based on Artificial Immune Systems","authors":"Xianghua Li, Tianyang Lu, Zhengxuan Wang, Chao Gao","doi":"10.1109/ICICSE.2008.13","DOIUrl":"https://doi.org/10.1109/ICICSE.2008.13","url":null,"abstract":"Although many kinds of clustering algorithms are proposed, there has been much less work on the incremental clustering. Inspired by the artificial immune systems, the authors apply it to the incremental clustering, propose a novel incremental clustering algorithm called ICAIS. The algorithm mainly uses the mechanism of immune response of the adaptive immune system. The primary immune response corresponds to forming the new clusters. The secondary immune response corresponds to recognizing the data belonging to the existed clusters. The experiments show that ICAIS has advantages in recognizing new pattern, the effect is better.","PeriodicalId":333889,"journal":{"name":"2008 International Conference on Internet Computing in Science and Engineering","volume":"7 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132324587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Potential Target Traversing Detection Algorithm Based on Voronoi Diagram 基于Voronoi图的潜在目标遍历检测算法
2008 International Conference on Internet Computing in Science and Engineering Pub Date : 2008-01-28 DOI: 10.1109/ICICSE.2008.41
Jin Zhang, Daxin Liu, Yuezhu Xu, Meng Zhao, Wenhui Zhao
{"title":"Potential Target Traversing Detection Algorithm Based on Voronoi Diagram","authors":"Jin Zhang, Daxin Liu, Yuezhu Xu, Meng Zhao, Wenhui Zhao","doi":"10.1109/ICICSE.2008.41","DOIUrl":"https://doi.org/10.1109/ICICSE.2008.41","url":null,"abstract":"In a wireless sensor network, sensors are scattered randomly by aircraft or rocket ejection. On account of scattered randomness, there may be sparse areas of sensors, in which, sensors cannot detect every hole and corner. Aimed at the region coverage, from another profile, the paper analyses and explains that the randomness of sensor scattered and the limitation of sensor monitor capability lead the appearance of potential traversing path in the whole wireless sensor network, and proposes the potential target traversing detection algorithm based on Voronoi diagram and corresponding solution. Through the analysis of experimental results, the feasibility and the validity of the detection algorithm are proved, and the potential risk can be made up by corresponding solution.","PeriodicalId":333889,"journal":{"name":"2008 International Conference on Internet Computing in Science and Engineering","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123020971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Hierarchical Clustering Routing Algorithm for Wireless Sensor Networks 一种新的无线传感器网络分层聚类路由算法
2008 International Conference on Internet Computing in Science and Engineering Pub Date : 2008-01-28 DOI: 10.1109/ICICSE.2008.26
Kaihua Xu, Yongcan Jia, Yuhua Liu
{"title":"A Novel Hierarchical Clustering Routing Algorithm for Wireless Sensor Networks","authors":"Kaihua Xu, Yongcan Jia, Yuhua Liu","doi":"10.1109/ICICSE.2008.26","DOIUrl":"https://doi.org/10.1109/ICICSE.2008.26","url":null,"abstract":"Hierarchical clustering is a new clustering scheme in WSN. This paper presents a novel clustering scheme integrating Hierarchical clustering On the basis of classical routing algorithm. Simulation results show that the new scheme efficiently mitigates the hot spot problem in WSN and achieves much improvement in network lifetime and load balance compared to the old algorithm.","PeriodicalId":333889,"journal":{"name":"2008 International Conference on Internet Computing in Science and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115966933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The Model Selection for Semi-Supervised Support Vector Machines 半监督支持向量机的模型选择
2008 International Conference on Internet Computing in Science and Engineering Pub Date : 2008-01-28 DOI: 10.1109/ICICSE.2008.29
Ying Zhao, Jianpei Zhang, Jing Yang
{"title":"The Model Selection for Semi-Supervised Support Vector Machines","authors":"Ying Zhao, Jianpei Zhang, Jing Yang","doi":"10.1109/ICICSE.2008.29","DOIUrl":"https://doi.org/10.1109/ICICSE.2008.29","url":null,"abstract":"Model selection for semi-supervised support vector machine is an important step in a high-performance learning machine. It is usually done by minimizing an estimate of generalization error based on the bounds of the leave-one-out such as radius-margin bound and on the performance measures such as generalized approximate cross-validation empirical error, etc. In order to get the parameter of SVM with RBF kernel, this paper presents a linear grid search method, which combines grid search and linear search. This method can reduce the resources required both in terms of processing time and of storage space. Experiments both on artificial and real word datasets show that the proposed linear grid search has the advantage of good performance compared to using linear search alone.","PeriodicalId":333889,"journal":{"name":"2008 International Conference on Internet Computing in Science and Engineering","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116636261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Semantic Web-Oriented Ontology Model 面向语义web的本体模型研究
2008 International Conference on Internet Computing in Science and Engineering Pub Date : 2008-01-28 DOI: 10.1109/ICICSE.2008.84
Jing Wang, Jianpei Zhang, Ying Wang
{"title":"Research on Semantic Web-Oriented Ontology Model","authors":"Jing Wang, Jianpei Zhang, Ying Wang","doi":"10.1109/ICICSE.2008.84","DOIUrl":"https://doi.org/10.1109/ICICSE.2008.84","url":null,"abstract":"The World Wide Web is an open and distributed repository with lots of information, in which the ontologies can help users to get their required information. This paper improves representation method of the existing ontology by introducing matter-element and its extensibility in extenics, and put forward a new ontology model-extenics knowledge ontology model. In this paper, some research has been done in order to make semantic Web stronger in network information search and mining.","PeriodicalId":333889,"journal":{"name":"2008 International Conference on Internet Computing in Science and Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126084522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信