{"title":"Mine Airflow Optimizing Control Based on Harmony Annealing Search","authors":"Jinxue Sui, Li Yang, Hui Fan, Zhen Hua","doi":"10.1109/ISME.2010.263","DOIUrl":"https://doi.org/10.1109/ISME.2010.263","url":null,"abstract":"Mine fire not only brings about great loss of coal resources and damage the whole mining system, but also causes the massive personnel casualty. Based on the air distribution request of the mine ventilation network, solves airflow quantitative optimizing control to the mine ventilation system network's nonlinear programming mathematical model using harmony annealing search, fuses the dynamic perturbation and the simulated annealing to improve the original harmony search algorithm, new harmony annealing search algorithm enhances the convergent speed, has overcome certain limitations of the traditional ventilation network optimizing control algorithm, obtains ventilation system's globally optimal solution, has provided a scientific and reliable basis to develop disaster prevention and processing.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130293205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comprehensive Evaluation Based on Gray Relation Analysis for Information Security Management Measurement","authors":"Xi-quan Guo, W. Luo, Guo-xiang Yao","doi":"10.1109/ISME.2010.8","DOIUrl":"https://doi.org/10.1109/ISME.2010.8","url":null,"abstract":"The purpose of this paper is to study the comprehensive evaluation method for Information Security Management Measurement (ISMM). An organization’s information security management performance would be assessed from three dimensions: implementation, effectiveness and input. Each dimensional evaluation value and final result can be calculated by gray relation analysis. A cube model for ISMM is then presented and it is capable of providing valuable results for managers since it is based on managing, technical and economic considerations. Under the circumstance that ISMM is mainly concerned about indicators of microcosmic level and frameworks of macro level, the advance of comprehensive evaluation based on gray relation analysis benefits building a more integrated ISMM system.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114020671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of Several Time Synchronization Protocols in WSN","authors":"Xiaolu Liu, Shumin Zhou","doi":"10.1109/ISME.2010.222","DOIUrl":"https://doi.org/10.1109/ISME.2010.222","url":null,"abstract":"Providing a powerful synchronization system is one of the most important goals to be pursued if an efficient utilization of WSN has to be addressed. This paper evaluates several classic time synchronization protocols based on clock model, and presents the sources of error on the basis of their elements. In detail, firefly algorithm achieves synchronization via a series of pulses emitted by pulse-coupled oscillators. The conclusions provide some reference for future study of improving the synchronization accuracy and efficiency.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121259008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Computer Simulation Study of High Concentration Polymer Flooding","authors":"D. Yin, Wei-ming Huang, Xueqing Xu","doi":"10.1109/ISME.2010.89","DOIUrl":"https://doi.org/10.1109/ISME.2010.89","url":null,"abstract":"Considering the high cost and long term of field experiment with high concentration polymer flooding and the irreversibility of reservoir development process, in order to ensure the best development results of the production block, a numerical simulation study was carried out in this paper to calculate the high concentration polymer flooding development programs of Xing-5 polymer drive pilot area in Daqing oil field of China. Through comparing the development indexes, the optimal program was selected. Simulation results show that the more amount of polymer is injected and the higher the injection concentration is, the better development results can be obtained. The optimum injection mode is continuous injection of high concentration polymer, and the pilot area should bring high concentration polymer flooding into operation as early as possible. So this work provides theoretical directions for the work of future development management of this test area.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129103661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Identification Method of Key Customer Based on CRM","authors":"Yanhui Wang","doi":"10.1109/ISME.2010.30","DOIUrl":"https://doi.org/10.1109/ISME.2010.30","url":null,"abstract":"The thesis first defined the conception of key customer, then set up key customer identification method based on customer value, customer loyalty degree and customer polymerization degree. The method adopted the analytic hierarchy process method to determine the weight of each index. The key customer is classified into three kinds, which include not only single key customers, but also the polymerization consisting of many small and medium-sized customers. The validity of the method was proved with practical example of a power supply enterprise. The result of identificaton can classify customers and provide the basis to constitute marketing strategy.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116348297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Testing Method and Experimental Studies on Single Laser Pulse Energy","authors":"Guoxing Liang, M. Lv, X. Gao","doi":"10.1109/ISME.2010.202","DOIUrl":"https://doi.org/10.1109/ISME.2010.202","url":null,"abstract":"A new type of testing device is designed for energy of laser pulse in this paper. By using it, pulse energy of KJG-1YAG-400A laser welder can be measured. The calorific models have been established for the device, and the analysis of thermal loss has been finished. Running curves have been obtained between time and resistance after the device absorbing laser energy. After test data is amended, the relationship among single pulse of laser energy, pulse width and current has been revealed, which provided theoretical foundation and practical experience for the laser brazing process.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117005506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Algorithm Study on Thinning and Keeping Connectivity of Bituminous Pavement Crack Images","authors":"Chu Yanli","doi":"10.1109/ISME.2010.265","DOIUrl":"https://doi.org/10.1109/ISME.2010.265","url":null,"abstract":"The main research point is the thinning method to the pavement crack images through using mathematical morphology in this paper. The efficient steps of the thinning algorithm are given for binary images and the satisfactory thinned images are obtained through experiments. In some cases, the thinned images will produce cavities or breakpoints, it needs to be processed by closing method in order to keep the connctivity of the thinned images. Experimental result shows improvement in both operational speed and accuracy rate, and it is satisfatory. Expected to be applied to the automatic detection of road surface defects, for the highway management and maintenance department to provide scientific basis for decision-making.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116757696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud-Based Name Disambiguation Algorithm","authors":"Yang Juan, He Hua, Wu Bin","doi":"10.1109/ISME.2010.33","DOIUrl":"https://doi.org/10.1109/ISME.2010.33","url":null,"abstract":"In Scientific Collaboration Networks, the phenomenon that one author name corresponds to many author entities is very common. Traditional algorithms for name disambiguation performed inefficiently in dealing with massive data. This paper presents a parallel algorithm for solving the name disambiguation problem: first merge authors with same names and similar author information, then divide the scientific collaboration networks into author communities, authors with same name in one community is supposed as one entity with great possibility. The algorithm is based on the Cloud-Computing platform, and has the ability to deal with massive data. In our experiment, the algorithm efficiently processed massive data and achieved an average f-score of 0.93.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115338794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Provably Secure Threshold Ring Signature Scheme in Certificateless Cryptography","authors":"Huaqun Wang, Shengju Han","doi":"10.1109/ISME.2010.113","DOIUrl":"https://doi.org/10.1109/ISME.2010.113","url":null,"abstract":"Ring signature is a kind of group-oriented signature. It allows a member of a group to sign messages on behalf of the group without revealing his/her identity. Certificateless public key cryptography was first introduced by Al-Riyami and Paterson at Asiacrypt 2003. In certificateless cryptography, it does not require the use of certificates to guarantee the authenticity of users' public keys. Meanwhile, certificateless cryptography does not have the key escrow problem, which seems to be inherent in the identity-based cryptography. In this paper, we introduce the notion of thresholdring signature into certificateless public key cryptography and propose a concrete certificateless threshold ring signature(CLT-Ring) scheme. The security models of certificateless thresholdring signature are also formalized. The new scheme is provably secure in the random oracle model.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115615919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Impact of Loss Aversion on Investment Choice","authors":"Jiannan Gao, Cheng Wang","doi":"10.1109/ISME.2010.118","DOIUrl":"https://doi.org/10.1109/ISME.2010.118","url":null,"abstract":"Our aim is to find how asset allocation decisions might vary with investor’s attitude about loss aversion. Based on the loss aversion theory, we modified the returns of the risky assets of the Mean-variance model, and set up an investor’s objective function. By the empirical research, we show that the investor’s feeling of loss aversion can have a potent effect on investment choice. Compared with a risk-averse investor, the investor who takes loss aversion into account will hold less risky assets. We also find that the degree of the investor’s feeling of loss aversion can have significant impact on investment choice. The higher the degree is, the less the investor would invest in the risky assets.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126135433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}