首页 > 最新文献

2011 IEEE 2nd International Conference on Software Engineering and Service Science最新文献

英文 中文
Research on optimization of vehicle routing based on Hopfield neural network 基于Hopfield神经网络的车辆路径优化研究
Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982278
Meng Wei, Yu Bin
The optimization of vehicle routing is essentially a constraint-based shortest path problem, which can be resolved by Hopfield-based neural network. This paper proposes a vehicle routing optimization algorithm based on Hopfield, which can offer a solution for logistics distribution routing quickly under the circumstance of the given distribution position and cargo amount. Experimental results have shown that the algorithm has advantages in fast convergence and accurate computation, etc.
车辆路径优化本质上是一个基于约束的最短路径问题,可以用基于hopfield的神经网络来求解。本文提出了一种基于Hopfield的车辆路径优化算法,该算法可以在给定配送位置和货物数量的情况下,快速求解物流配送路径。实验结果表明,该算法具有收敛快、计算准确等优点。
{"title":"Research on optimization of vehicle routing based on Hopfield neural network","authors":"Meng Wei, Yu Bin","doi":"10.1109/ICSESS.2011.5982278","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982278","url":null,"abstract":"The optimization of vehicle routing is essentially a constraint-based shortest path problem, which can be resolved by Hopfield-based neural network. This paper proposes a vehicle routing optimization algorithm based on Hopfield, which can offer a solution for logistics distribution routing quickly under the circumstance of the given distribution position and cargo amount. Experimental results have shown that the algorithm has advantages in fast convergence and accurate computation, etc.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129324148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The research of routing algorithms based on NS2 in mobile ad hoc networks 移动自组网中基于NS2的路由算法研究
Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982468
Guanghui Li, Jianmin Chen
In this paper, firstly we introduce the routing protocols of mobile Ad hoc network. We then introduce the basic principle of DSDV and AODV routing protocols, including the types of protocol frames, the process of establishing routing path of protocols and maintenance operations. We also describe the changes of the AODV protocol by AODVUU. Then, we simulate the configurations of mobile nodes and scene generating by the network simulator NS2. Lastly, we compare and analyze the performances of DSDV, AODV and AODVUU protocols from packet delivery rate to end-to-end average delay, together with the interpretation for it. These works can be good references to the research of Ad hoc routing protocols.
本文首先介绍了移动自组织网络的路由协议。然后介绍了DSDV和AODV路由协议的基本原理,包括协议帧的类型、协议路由路径的建立过程和维护操作。我们还描述了AODVUU对AODV协议的改变。然后,通过网络模拟器NS2对移动节点的配置和生成的场景进行了仿真。最后,对DSDV、AODV和AODVUU协议的性能进行了比较和分析,从数据包传输速率到端到端平均延迟,并对其进行了解释。这些工作对Ad hoc路由协议的研究具有一定的参考价值。
{"title":"The research of routing algorithms based on NS2 in mobile ad hoc networks","authors":"Guanghui Li, Jianmin Chen","doi":"10.1109/ICSESS.2011.5982468","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982468","url":null,"abstract":"In this paper, firstly we introduce the routing protocols of mobile Ad hoc network. We then introduce the basic principle of DSDV and AODV routing protocols, including the types of protocol frames, the process of establishing routing path of protocols and maintenance operations. We also describe the changes of the AODV protocol by AODVUU. Then, we simulate the configurations of mobile nodes and scene generating by the network simulator NS2. Lastly, we compare and analyze the performances of DSDV, AODV and AODVUU protocols from packet delivery rate to end-to-end average delay, together with the interpretation for it. These works can be good references to the research of Ad hoc routing protocols.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130015971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Notice of RetractionA research on the the efficiency of partnership 撤销通知合伙企业效率研究
Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982321
Chuangwei Lin, He Chen
As an ancient governance model, partnership becomes a unique scene in human-capital-intensive industries, breaking the monopoly position of corporate system in the governance models of enterprises. This paper reviews the disputes over the effectiveness of partnership. Some scholars propose that, from the perspective of information economics, team production and unobservable input in corporate system lead to the existence of non-efficiency behaviors-free rider problem. Other scholars speak in defense of the efficiency of partnership. When the professional team production is not easy to supervise, partnership is an effective governance model. As long as the partners bear unlimited liability, partnership can achieve approximate efficiency by a simple pooling strategy. Even if the partners bear limited liability, as long as co-supervision exists, efficiency of partnership is still achievable. Finally, a brief conclusion will be put forward.
合伙制作为一种古老的治理模式,在人力资本密集型产业中成为独特的景象,打破了公司制在企业治理模式中的垄断地位。本文对合伙企业效力争议进行了梳理。有学者从信息经济学的角度提出,企业制度中的团队生产和不可观察的投入导致了非效率行为——搭便车问题的存在。其他学者则为合伙制的效率辩护。在专业化团队生产不易监督的情况下,合伙制是一种有效的治理模式。只要合伙人承担无限责任,合伙制可以通过简单的池化策略达到近似的效率。即使合伙人承担有限责任,只要共同监督存在,合伙企业的效率仍然是可以实现的。最后,对本文进行了简要的总结。
{"title":"Notice of RetractionA research on the the efficiency of partnership","authors":"Chuangwei Lin, He Chen","doi":"10.1109/ICSESS.2011.5982321","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982321","url":null,"abstract":"As an ancient governance model, partnership becomes a unique scene in human-capital-intensive industries, breaking the monopoly position of corporate system in the governance models of enterprises. This paper reviews the disputes over the effectiveness of partnership. Some scholars propose that, from the perspective of information economics, team production and unobservable input in corporate system lead to the existence of non-efficiency behaviors-free rider problem. Other scholars speak in defense of the efficiency of partnership. When the professional team production is not easy to supervise, partnership is an effective governance model. As long as the partners bear unlimited liability, partnership can achieve approximate efficiency by a simple pooling strategy. Even if the partners bear limited liability, as long as co-supervision exists, efficiency of partnership is still achievable. Finally, a brief conclusion will be put forward.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131087233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modified real-value negative selection algorithm and its application on fault diagnosis 改进的实值负选择算法及其在故障诊断中的应用
Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982293
Y. Li, G. Chang, C. J. Zhang, S. Liang
Analyze the drawbacks of common real-value negative selection algorithm applied on fault diagnosis, and the modified real-value negative selection algorithm is presented based on the corresponding innovations. Firstly, the fault detector set is partitioned into remember-detector set covering known-fault space and random-detector set covering unknown-fault space. Secondly, taking all known states including normal state as self set in training period, get the random-detector set through negative selection and distribution optimization. Lastly, in order to avoid ‘Fail to Alarm’ event caused by the Hole, the two-time-matching method is presented in detecting period which takes the normal state as self set. A resistance circuit fault diagnosis experiment shows that compared with the common real-value negative selection algorithm, the modified real-value negative algorithm can effectively avoid ‘Fail to Alarm’ event, and has higher diagnostic accuracy.
分析了常用的实值负选择算法在故障诊断中的不足,在相应的创新基础上提出了改进的实值负选择算法。首先,将故障检测集划分为覆盖已知故障空间的记忆检测集和覆盖未知故障空间的随机检测集。其次,将训练期间包括正态在内的所有已知状态作为自集,通过负选择和分布优化得到随机检测集;最后,为了避免孔洞导致的“未报警”事件,在检测周期提出了以正常状态为自设定的双时间匹配方法。一项电阻电路故障诊断实验表明,与常用的实值负选择算法相比,改进的实值负选择算法能有效避免“Fail to Alarm”事件,具有更高的诊断准确率。
{"title":"Modified real-value negative selection algorithm and its application on fault diagnosis","authors":"Y. Li, G. Chang, C. J. Zhang, S. Liang","doi":"10.1109/ICSESS.2011.5982293","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982293","url":null,"abstract":"Analyze the drawbacks of common real-value negative selection algorithm applied on fault diagnosis, and the modified real-value negative selection algorithm is presented based on the corresponding innovations. Firstly, the fault detector set is partitioned into remember-detector set covering known-fault space and random-detector set covering unknown-fault space. Secondly, taking all known states including normal state as self set in training period, get the random-detector set through negative selection and distribution optimization. Lastly, in order to avoid ‘Fail to Alarm’ event caused by the Hole, the two-time-matching method is presented in detecting period which takes the normal state as self set. A resistance circuit fault diagnosis experiment shows that compared with the common real-value negative selection algorithm, the modified real-value negative algorithm can effectively avoid ‘Fail to Alarm’ event, and has higher diagnostic accuracy.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130771339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cryptanalysis and improvement of a concurrent signature scheme based on identity 基于身份的并发签名方案的密码分析与改进
Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982351
Zhongjun Zhang, Shuo Xu
Concurrent signatures were introduced as an alternative approach to solving the problem of fair exchange of signatures by Chen et al.[1], in which two entities can produce two signatures that are not binding, until the keystone is released by one of the parties. Recently, Huang et al.[10] proposed a more ambiguity and stronger fairness concurrent signature scheme based on identity. However, we will show that their scheme did not satisfy the strong unforgeability properties, and was vulnerable to forgery attack. Then, we propose an improved scheme to prevent such attack.
并发签名是Chen等人[1]引入的一种解决公平交换签名问题的替代方法,其中两个实体可以产生两个不具有约束力的签名,直到其中一方释放keystone。最近,Huang等[10]提出了一种基于身份的更具模糊性和更强公平性的并发签名方案。然而,我们将证明他们的方案不满足强不可伪造性,并且容易受到伪造攻击。然后,我们提出了一种改进的方案来防止这种攻击。
{"title":"Cryptanalysis and improvement of a concurrent signature scheme based on identity","authors":"Zhongjun Zhang, Shuo Xu","doi":"10.1109/ICSESS.2011.5982351","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982351","url":null,"abstract":"Concurrent signatures were introduced as an alternative approach to solving the problem of fair exchange of signatures by Chen et al.[1], in which two entities can produce two signatures that are not binding, until the keystone is released by one of the parties. Recently, Huang et al.[10] proposed a more ambiguity and stronger fairness concurrent signature scheme based on identity. However, we will show that their scheme did not satisfy the strong unforgeability properties, and was vulnerable to forgery attack. Then, we propose an improved scheme to prevent such attack.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132992400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Risk factors analysis of IT outsourcing from the distance-based perspective 基于距离的IT外包风险因素分析
Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982326
Mao Yajing, Fang Deying
IT outsourcing as a strategic decision has become an effective way that more and more enterprises reduce costs and create their own core competencies with outside help. Distance-based IT service outsourcing cooperation model, risks of IT outsourcing is produced by the inherent reasons of “distance”. Based on the perspective of distance, this paper discussed the impact of the information distance factors, space distance factors and the knowledge distance factors on the IT outsourcing, and established the “information - space - knowledge” model of three-dimensional distance factors. Finally, through the study of some case, this paper specified the basic ideas and methods of the analysis of IT outsourcing risk based on this three-dimensional model.
IT外包作为一种战略决策,已经成为越来越多的企业借助外部帮助降低成本、创造自身核心竞争力的有效途径。基于远程的IT服务外包合作模式,IT外包的风险是由“距离”的内在原因产生的。本文基于距离的视角,探讨了信息距离因素、空间距离因素和知识距离因素对IT外包的影响,建立了“信息-空间-知识”三维距离因素模型。最后,通过对一些案例的研究,明确了基于该三维模型的IT外包风险分析的基本思路和方法。
{"title":"Risk factors analysis of IT outsourcing from the distance-based perspective","authors":"Mao Yajing, Fang Deying","doi":"10.1109/ICSESS.2011.5982326","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982326","url":null,"abstract":"IT outsourcing as a strategic decision has become an effective way that more and more enterprises reduce costs and create their own core competencies with outside help. Distance-based IT service outsourcing cooperation model, risks of IT outsourcing is produced by the inherent reasons of “distance”. Based on the perspective of distance, this paper discussed the impact of the information distance factors, space distance factors and the knowledge distance factors on the IT outsourcing, and established the “information - space - knowledge” model of three-dimensional distance factors. Finally, through the study of some case, this paper specified the basic ideas and methods of the analysis of IT outsourcing risk based on this three-dimensional model.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130290137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Application of lifting wavelet transform in oil theft signal detection 提升小波变换在盗油信号检测中的应用
Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982285
Ying-chun Li, Jun-Hong Wang, Xingjian Fu
In oil pipeline, when a theft alarm signal is generated, the strong vibration signal will be brought in stress wave. Then singularity will be introduced, which contains rich information about oil theft signal. When the detecting distance increases to a certain extent, the singularity is drowned in noise. At the same time, oil theft signal distributes mainly in low frequency band. Firstly, the system to collect stress wave signal of oil theft was briefly introduced, and on-the-spot data collection steps were given. Secondly, oil theft signal is analyzed in wavelet domain and time domain. In wavelet domain, features of energy distribution in different bands are extracted. In time domain, the stress wave signal is denoised by hard threshold method, and then the characteristics of the singularity are abstracted. The research provides a new method to monitor oil stolen events in real-time. And it is easily realized on hardware and has very good practical value.
在输油管道中,当产生盗窃报警信号时,会在应力波中带来强烈的振动信号。然后引入奇异点,其中包含了丰富的盗油信号信息。当探测距离增加到一定程度时,奇异点被噪声淹没。同时,盗油信号主要分布在低频段。首先简要介绍了盗油应力波信号采集系统,给出了现场数据采集步骤。其次,对盗油信号进行小波域和时域分析。在小波域提取不同波段的能量分布特征。在时域上,采用硬阈值法对应力波信号进行降噪,提取奇异性特征。该研究为石油被盗事件的实时监测提供了一种新的方法。并且在硬件上易于实现,具有很好的实用价值。
{"title":"Application of lifting wavelet transform in oil theft signal detection","authors":"Ying-chun Li, Jun-Hong Wang, Xingjian Fu","doi":"10.1109/ICSESS.2011.5982285","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982285","url":null,"abstract":"In oil pipeline, when a theft alarm signal is generated, the strong vibration signal will be brought in stress wave. Then singularity will be introduced, which contains rich information about oil theft signal. When the detecting distance increases to a certain extent, the singularity is drowned in noise. At the same time, oil theft signal distributes mainly in low frequency band. Firstly, the system to collect stress wave signal of oil theft was briefly introduced, and on-the-spot data collection steps were given. Secondly, oil theft signal is analyzed in wavelet domain and time domain. In wavelet domain, features of energy distribution in different bands are extracted. In time domain, the stress wave signal is denoised by hard threshold method, and then the characteristics of the singularity are abstracted. The research provides a new method to monitor oil stolen events in real-time. And it is easily realized on hardware and has very good practical value.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128810322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design patterns in software development 软件开发中的设计模式
Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982228
Huaxin Mu, Shuai Jiang
Design pattern describes a repeatedly presenting issue during software designing, as well the solution to it. Applying design pattern enables developers to reuse it to solve a specified designing issue. Design patterns help designers communicate architectural knowledge, help people learn a new design paradigm, and help new developers avoid traps and pitfalls that have traditionally been learned only by costly experiences. In this paper, we briefly introduce the concept of software design pattern and give a research on some design patterns, including Observer Pattern, Decorator Pattern, Factory Method Pattern and Abstract Factory Pattern.
设计模式描述了在软件设计过程中反复出现的问题,以及该问题的解决方案。应用设计模式使开发人员能够重用它来解决指定的设计问题。设计模式帮助设计人员交流架构知识,帮助人们学习新的设计范式,并帮助新的开发人员避免传统上只有通过昂贵的经验才能学到的陷阱和缺陷。本文简要介绍了软件设计模式的概念,并对观察者模式、装饰模式、工厂方法模式和抽象工厂模式等设计模式进行了研究。
{"title":"Design patterns in software development","authors":"Huaxin Mu, Shuai Jiang","doi":"10.1109/ICSESS.2011.5982228","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982228","url":null,"abstract":"Design pattern describes a repeatedly presenting issue during software designing, as well the solution to it. Applying design pattern enables developers to reuse it to solve a specified designing issue. Design patterns help designers communicate architectural knowledge, help people learn a new design paradigm, and help new developers avoid traps and pitfalls that have traditionally been learned only by costly experiences. In this paper, we briefly introduce the concept of software design pattern and give a research on some design patterns, including Observer Pattern, Decorator Pattern, Factory Method Pattern and Abstract Factory Pattern.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125590075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Online map matching by indexing approximate road segments 在线地图匹配通过索引近似路段
Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982313
Jingyu Han, Xiong Fu, Linfeng Liu, Dawei Jiang
Given a typical real-world application, a large number of tracking points come at a high rate in a stream fashion and efficient online map matching is a pressing concern. In this paper, two map matching schemes are proposed, which make aggressive use of available main memory to achieve efficient matching. First, road network is partitioned into approximate segments, namely line or arc segments, by minimum description length (MDL) principle. Second, approximate segments are indexed into an optimized packed R tree, insuring that the minimal coverage and overlap are achieved. Based on this, we propose two online map matching schemes, namely Top Matching (TM) and kNN Refinement Matching (KRM), coupled with corresponding buffering strategies. Theory and experiment show that the times of accessing roads is significantly reduced to approximately a fraction of 3 to 6, demonstrating superior performance in terms of running time and matching quality.
在一个典型的现实世界应用中,大量的跟踪点以流的方式以高速率出现,有效的在线地图匹配是一个迫切需要关注的问题。本文提出了两种映射匹配方案,积极利用可用主存实现高效匹配。首先,根据最小描述长度(MDL)原则,将路网划分为近似段,即直线段或圆弧段;其次,将近似段索引到优化的打包R树中,确保实现最小的覆盖和重叠。在此基础上,我们提出了两种在线地图匹配方案,即Top matching (TM)和kNN Refinement matching (KRM),并结合相应的缓冲策略。理论和实验表明,该算法的道路访问次数大大减少,约为3 ~ 6次的一小部分,在运行时间和匹配质量方面表现出优越的性能。
{"title":"Online map matching by indexing approximate road segments","authors":"Jingyu Han, Xiong Fu, Linfeng Liu, Dawei Jiang","doi":"10.1109/ICSESS.2011.5982313","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982313","url":null,"abstract":"Given a typical real-world application, a large number of tracking points come at a high rate in a stream fashion and efficient online map matching is a pressing concern. In this paper, two map matching schemes are proposed, which make aggressive use of available main memory to achieve efficient matching. First, road network is partitioned into approximate segments, namely line or arc segments, by minimum description length (MDL) principle. Second, approximate segments are indexed into an optimized packed R tree, insuring that the minimal coverage and overlap are achieved. Based on this, we propose two online map matching schemes, namely Top Matching (TM) and kNN Refinement Matching (KRM), coupled with corresponding buffering strategies. Theory and experiment show that the times of accessing roads is significantly reduced to approximately a fraction of 3 to 6, demonstrating superior performance in terms of running time and matching quality.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"187 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123389980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
AOSD and its application in development of safety-critical systems AOSD及其在安全关键系统开发中的应用
Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982377
Zhenling Zhang, Yangli Jia, G. Liu
Based on the discussion of the limitation of object-oriented software development method in dealing with the crosscutting concerns in safety-critical complex system, the aspect-oriented software development method and its' superiority are introduced. A process model of AOSD is given. The application of AOSD in the development of a safety-critical system is discussed and an example is given.
在讨论面向对象软件开发方法在处理安全关键型复杂系统中横切关注点方面的局限性的基础上,介绍了面向方面的软件开发方法及其优越性。给出了AOSD的过程模型。讨论了AOSD在安全关键系统开发中的应用,并给出了一个实例。
{"title":"AOSD and its application in development of safety-critical systems","authors":"Zhenling Zhang, Yangli Jia, G. Liu","doi":"10.1109/ICSESS.2011.5982377","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982377","url":null,"abstract":"Based on the discussion of the limitation of object-oriented software development method in dealing with the crosscutting concerns in safety-critical complex system, the aspect-oriented software development method and its' superiority are introduced. A process model of AOSD is given. The application of AOSD in the development of a safety-critical system is discussed and an example is given.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"321 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116121551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2011 IEEE 2nd International Conference on Software Engineering and Service Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1