2010 International Conference of Information Science and Management Engineering最新文献

筛选
英文 中文
Mine Airflow Optimizing Control Based on Harmony Annealing Search 基于和谐退火搜索的矿井气流优化控制
Jinxue Sui, Li Yang, Hui Fan, Zhen Hua
{"title":"Mine Airflow Optimizing Control Based on Harmony Annealing Search","authors":"Jinxue Sui, Li Yang, Hui Fan, Zhen Hua","doi":"10.1109/ISME.2010.263","DOIUrl":"https://doi.org/10.1109/ISME.2010.263","url":null,"abstract":"Mine fire not only brings about great loss of coal resources and damage the whole mining system, but also causes the massive personnel casualty. Based on the air distribution request of the mine ventilation network, solves airflow quantitative optimizing control to the mine ventilation system network's nonlinear programming mathematical model using harmony annealing search, fuses the dynamic perturbation and the simulated annealing to improve the original harmony search algorithm, new harmony annealing search algorithm enhances the convergent speed, has overcome certain limitations of the traditional ventilation network optimizing control algorithm, obtains ventilation system's globally optimal solution, has provided a scientific and reliable basis to develop disaster prevention and processing.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130293205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comprehensive Evaluation Based on Gray Relation Analysis for Information Security Management Measurement 基于灰色关联分析的信息安全管理测度综合评价
Xi-quan Guo, W. Luo, Guo-xiang Yao
{"title":"Comprehensive Evaluation Based on Gray Relation Analysis for Information Security Management Measurement","authors":"Xi-quan Guo, W. Luo, Guo-xiang Yao","doi":"10.1109/ISME.2010.8","DOIUrl":"https://doi.org/10.1109/ISME.2010.8","url":null,"abstract":"The purpose of this paper is to study the comprehensive evaluation method for Information Security Management Measurement (ISMM). An organization’s information security management performance would be assessed from three dimensions: implementation, effectiveness and input. Each dimensional evaluation value and final result can be calculated by gray relation analysis. A cube model for ISMM is then presented and it is capable of providing valuable results for managers since it is based on managing, technical and economic considerations. Under the circumstance that ISMM is mainly concerned about indicators of microcosmic level and frameworks of macro level, the advance of comprehensive evaluation based on gray relation analysis benefits building a more integrated ISMM system.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114020671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of Several Time Synchronization Protocols in WSN 无线传感器网络中几种时间同步协议的评价
Xiaolu Liu, Shumin Zhou
{"title":"Evaluation of Several Time Synchronization Protocols in WSN","authors":"Xiaolu Liu, Shumin Zhou","doi":"10.1109/ISME.2010.222","DOIUrl":"https://doi.org/10.1109/ISME.2010.222","url":null,"abstract":"Providing a powerful synchronization system is one of the most important goals to be pursued if an efficient utilization of WSN has to be addressed. This paper evaluates several classic time synchronization protocols based on clock model, and presents the sources of error on the basis of their elements. In detail, firefly algorithm achieves synchronization via a series of pulses emitted by pulse-coupled oscillators. The conclusions provide some reference for future study of improving the synchronization accuracy and efficiency.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121259008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Computer Simulation Study of High Concentration Polymer Flooding 高浓度聚合物驱的计算机模拟研究
D. Yin, Wei-ming Huang, Xueqing Xu
{"title":"A Computer Simulation Study of High Concentration Polymer Flooding","authors":"D. Yin, Wei-ming Huang, Xueqing Xu","doi":"10.1109/ISME.2010.89","DOIUrl":"https://doi.org/10.1109/ISME.2010.89","url":null,"abstract":"Considering the high cost and long term of field experiment with high concentration polymer flooding and the irreversibility of reservoir development process, in order to ensure the best development results of the production block, a numerical simulation study was carried out in this paper to calculate the high concentration polymer flooding development programs of Xing-5 polymer drive pilot area in Daqing oil field of China. Through comparing the development indexes, the optimal program was selected. Simulation results show that the more amount of polymer is injected and the higher the injection concentration is, the better development results can be obtained. The optimum injection mode is continuous injection of high concentration polymer, and the pilot area should bring high concentration polymer flooding into operation as early as possible. So this work provides theoretical directions for the work of future development management of this test area.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129103661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Identification Method of Key Customer Based on CRM 基于CRM的关键客户识别方法研究
Yanhui Wang
{"title":"Research on Identification Method of Key Customer Based on CRM","authors":"Yanhui Wang","doi":"10.1109/ISME.2010.30","DOIUrl":"https://doi.org/10.1109/ISME.2010.30","url":null,"abstract":"The thesis first defined the conception of key customer, then set up key customer identification method based on customer value, customer loyalty degree and customer polymerization degree. The method adopted the analytic hierarchy process method to determine the weight of each index. The key customer is classified into three kinds, which include not only single key customers, but also the polymerization consisting of many small and medium-sized customers. The validity of the method was proved with practical example of a power supply enterprise. The result of identificaton can classify customers and provide the basis to constitute marketing strategy.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116348297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Testing Method and Experimental Studies on Single Laser Pulse Energy 单脉冲激光能量的测试方法与实验研究
Guoxing Liang, M. Lv, X. Gao
{"title":"Testing Method and Experimental Studies on Single Laser Pulse Energy","authors":"Guoxing Liang, M. Lv, X. Gao","doi":"10.1109/ISME.2010.202","DOIUrl":"https://doi.org/10.1109/ISME.2010.202","url":null,"abstract":"A new type of testing device is designed for energy of laser pulse in this paper. By using it, pulse energy of KJG-1YAG-400A laser welder can be measured. The calorific models have been established for the device, and the analysis of thermal loss has been finished. Running curves have been obtained between time and resistance after the device absorbing laser energy. After test data is amended, the relationship among single pulse of laser energy, pulse width and current has been revealed, which provided theoretical foundation and practical experience for the laser brazing process.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117005506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Algorithm Study on Thinning and Keeping Connectivity of Bituminous Pavement Crack Images 沥青路面裂缝图像稀疏与连通算法研究
Chu Yanli
{"title":"Algorithm Study on Thinning and Keeping Connectivity of Bituminous Pavement Crack Images","authors":"Chu Yanli","doi":"10.1109/ISME.2010.265","DOIUrl":"https://doi.org/10.1109/ISME.2010.265","url":null,"abstract":"The main research point is the thinning method to the pavement crack images through using mathematical morphology in this paper. The efficient steps of the thinning algorithm are given for binary images and the satisfactory thinned images are obtained through experiments. In some cases, the thinned images will produce cavities or breakpoints, it needs to be processed by closing method in order to keep the connctivity of the thinned images. Experimental result shows improvement in both operational speed and accuracy rate, and it is satisfatory. Expected to be applied to the automatic detection of road surface defects, for the highway management and maintenance department to provide scientific basis for decision-making.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116757696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Cloud-Based Name Disambiguation Algorithm 基于云的名称消歧算法
Yang Juan, He Hua, Wu Bin
{"title":"Cloud-Based Name Disambiguation Algorithm","authors":"Yang Juan, He Hua, Wu Bin","doi":"10.1109/ISME.2010.33","DOIUrl":"https://doi.org/10.1109/ISME.2010.33","url":null,"abstract":"In Scientific Collaboration Networks, the phenomenon that one author name corresponds to many author entities is very common. Traditional algorithms for name disambiguation performed inefficiently in dealing with massive data. This paper presents a parallel algorithm for solving the name disambiguation problem: first merge authors with same names and similar author information, then divide the scientific collaboration networks into author communities, authors with same name in one community is supposed as one entity with great possibility. The algorithm is based on the Cloud-Computing platform, and has the ability to deal with massive data. In our experiment, the algorithm efficiently processed massive data and achieved an average f-score of 0.93.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115338794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Provably Secure Threshold Ring Signature Scheme in Certificateless Cryptography 一种可证明安全的无证书加密门限环签名方案
Huaqun Wang, Shengju Han
{"title":"A Provably Secure Threshold Ring Signature Scheme in Certificateless Cryptography","authors":"Huaqun Wang, Shengju Han","doi":"10.1109/ISME.2010.113","DOIUrl":"https://doi.org/10.1109/ISME.2010.113","url":null,"abstract":"Ring signature is a kind of group-oriented signature. It allows a member of a group to sign messages on behalf of the group without revealing his/her identity. Certificateless public key cryptography was first introduced by Al-Riyami and Paterson at Asiacrypt 2003. In certificateless cryptography, it does not require the use of certificates to guarantee the authenticity of users' public keys. Meanwhile, certificateless cryptography does not have the key escrow problem, which seems to be inherent in the identity-based cryptography. In this paper, we introduce the notion of thresholdring signature into certificateless public key cryptography and propose a concrete certificateless threshold ring signature(CLT-Ring) scheme. The security models of certificateless thresholdring signature are also formalized. The new scheme is provably secure in the random oracle model.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115615919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The Impact of Loss Aversion on Investment Choice 损失厌恶对投资选择的影响
Jiannan Gao, Cheng Wang
{"title":"The Impact of Loss Aversion on Investment Choice","authors":"Jiannan Gao, Cheng Wang","doi":"10.1109/ISME.2010.118","DOIUrl":"https://doi.org/10.1109/ISME.2010.118","url":null,"abstract":"Our aim is to find how asset allocation decisions might vary with investor’s attitude about loss aversion. Based on the loss aversion theory, we modified the returns of the risky assets of the Mean-variance model, and set up an investor’s objective function. By the empirical research, we show that the investor’s feeling of loss aversion can have a potent effect on investment choice. Compared with a risk-averse investor, the investor who takes loss aversion into account will hold less risky assets. We also find that the degree of the investor’s feeling of loss aversion can have significant impact on investment choice. The higher the degree is, the less the investor would invest in the risky assets.","PeriodicalId":348878,"journal":{"name":"2010 International Conference of Information Science and Management Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126135433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信