Pub Date : 2009-12-28DOI: 10.1109/CISE.2009.5366778
M. Rajaei, S. Noferesti
In this paper we propose dynamic bandwidth provisioning method in differentiated services (DiffServ) based on learning automata. This mechanism tries to maximize bandwidth utilization and not breech quality of services (QoS) levels contracted in service level agreement. These two objectives may can contrary to each other; a trade-off has to be made. In proposed mechanism, the amount of bandwidth to provision for each per hop behavior (PHB) adjusts at regular intervals based on environment feedback. The result of multiple simulations presents using this method improves QoS in the term of loss rate, delay and throughput in comparison to static provisioning. The results show that proposed method is able to adopt to converge rapidly to optimal policy under changing traffic conditions, as well as pricing plans and QoS requirements.
{"title":"Learning Automata-Based Adoptive Bandwidth Provisioning in Differentiated Services","authors":"M. Rajaei, S. Noferesti","doi":"10.1109/CISE.2009.5366778","DOIUrl":"https://doi.org/10.1109/CISE.2009.5366778","url":null,"abstract":"In this paper we propose dynamic bandwidth provisioning method in differentiated services (DiffServ) based on learning automata. This mechanism tries to maximize bandwidth utilization and not breech quality of services (QoS) levels contracted in service level agreement. These two objectives may can contrary to each other; a trade-off has to be made. In proposed mechanism, the amount of bandwidth to provision for each per hop behavior (PHB) adjusts at regular intervals based on environment feedback. The result of multiple simulations presents using this method improves QoS in the term of loss rate, delay and throughput in comparison to static provisioning. The results show that proposed method is able to adopt to converge rapidly to optimal policy under changing traffic conditions, as well as pricing plans and QoS requirements.","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127473349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-28DOI: 10.1109/CISE.2009.5363258
Hong-wei Tang, Jian-yuan Cheng, Shi-dong Wang
in order to predict gas content of coal seam accurately in binchang mining, we use core data to build the BP neural network. We select the important controlling factors which impacted gas content of coal seam, coal bed thickness, ash and max vitrinite reflectance as the basic features of the BP neural network model, and establish the BP neural network prediction model between coal bed methane content and the main controlling factors. The testing results show that the BP neural network model could truly reflect the non-linear relationship between the gas content and the controlling factors, and obtain minimal error between the predicted results and the measured ones. This method provides the probability for using geological, logging and seismic information to predict gas content of coal seam. Key word- CBM content, geologic parameter, BP neural networks model
{"title":"The Effective Application of BP Neural Networks Prediction Model for Gas Content in Binchang Mining","authors":"Hong-wei Tang, Jian-yuan Cheng, Shi-dong Wang","doi":"10.1109/CISE.2009.5363258","DOIUrl":"https://doi.org/10.1109/CISE.2009.5363258","url":null,"abstract":"in order to predict gas content of coal seam accurately in binchang mining, we use core data to build the BP neural network. We select the important controlling factors which impacted gas content of coal seam, coal bed thickness, ash and max vitrinite reflectance as the basic features of the BP neural network model, and establish the BP neural network prediction model between coal bed methane content and the main controlling factors. The testing results show that the BP neural network model could truly reflect the non-linear relationship between the gas content and the controlling factors, and obtain minimal error between the predicted results and the measured ones. This method provides the probability for using geological, logging and seismic information to predict gas content of coal seam. Key word- CBM content, geologic parameter, BP neural networks model","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125966987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-28DOI: 10.1109/CISE.2009.5364502
Cailan Zhou, Xuan Sun, Hongjie Guo
The web information which influences the topic relevance of URL is analyzed based on the research of the search strategy about the crawler. On this basis, a new URL search algorithm based on the content and link analysis is supplied to us. The experimental results show that the algorithm not only can solve the problem of topic isolated island to increase recall, but also can avoid the phenomenon of the topic drift at the same
{"title":"The URL Search Strategy Based on the Content and Link Analysis","authors":"Cailan Zhou, Xuan Sun, Hongjie Guo","doi":"10.1109/CISE.2009.5364502","DOIUrl":"https://doi.org/10.1109/CISE.2009.5364502","url":null,"abstract":"The web information which influences the topic relevance of URL is analyzed based on the research of the search strategy about the crawler. On this basis, a new URL search algorithm based on the content and link analysis is supplied to us. The experimental results show that the algorithm not only can solve the problem of topic isolated island to increase recall, but also can avoid the phenomenon of the topic drift at the same","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123246789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-28DOI: 10.1109/CISE.2009.5363551
Kaicheng Yang, F. Lin
This paper argues that an instructional system is composed of IPT (Information Processing of Teacher), IPLs (Information Processing of Learners), IPM (Information Processing in Media) and IIS (Instructional Information Set). IPT, IPLs, IPM and IIS interacts through information flows which are named {X} and {Y}. To analyze such an instructional system ,we need to build IIS-map which is the result of knowledge modeling, to segment instruction video flow into input items which represent {Y} and calculate the quantity of attribute researchers interested. The activation is the most important attribute. The experiment shows that activation and learning effect of knowledge nodes have positive correlation.
{"title":"An Empirical Research on IIS-Map-Based Analysis Method of Instructional System","authors":"Kaicheng Yang, F. Lin","doi":"10.1109/CISE.2009.5363551","DOIUrl":"https://doi.org/10.1109/CISE.2009.5363551","url":null,"abstract":"This paper argues that an instructional system is composed of IPT (Information Processing of Teacher), IPLs (Information Processing of Learners), IPM (Information Processing in Media) and IIS (Instructional Information Set). IPT, IPLs, IPM and IIS interacts through information flows which are named {X} and {Y}. To analyze such an instructional system ,we need to build IIS-map which is the result of knowledge modeling, to segment instruction video flow into input items which represent {Y} and calculate the quantity of attribute researchers interested. The activation is the most important attribute. The experiment shows that activation and learning effect of knowledge nodes have positive correlation.","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123694269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-28DOI: 10.1109/CISE.2009.5364497
Mao Chen, Chao Yu, Lei Min, Guotao Hu
Dynamic interactive courseware with animation is very popular and of great significance in teaching in primary and secondary schools. On the analysis of the existing animation and courseware-making software, this paper introduces the design and development of a powerful and user-friendly software, which can make not only animation courseware for various subjects in elementary and secondary schools, but also educational and puzzle games.
{"title":"Development of an Animation-Making Software Applied in Education","authors":"Mao Chen, Chao Yu, Lei Min, Guotao Hu","doi":"10.1109/CISE.2009.5364497","DOIUrl":"https://doi.org/10.1109/CISE.2009.5364497","url":null,"abstract":"Dynamic interactive courseware with animation is very popular and of great significance in teaching in primary and secondary schools. On the analysis of the existing animation and courseware-making software, this paper introduces the design and development of a powerful and user-friendly software, which can make not only animation courseware for various subjects in elementary and secondary schools, but also educational and puzzle games.","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125333195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-28DOI: 10.1109/CISE.2009.5363627
Changling Li, Haiyun Xu
This paper summarized the major current value measurement methods for technology-based knowledge products (TKP), and then made an analysis to these methods in the value measuring application, and we further exploited the main difficulties and established the value measurement model for the TKP value measuring, and on this basis, we built the value measuring model for the TKP. Firs, we establish the value measurement index system, and then got the weight distribution by the analytic hierarchy process(AHP). As for the comprehensive weights calculation, the model designs to suggest the experts to give monetary value directly in all sub-indicators according their experience, which is also the data acquisition method. Finally, we used a case analysis to prove the scientificity and feasibility of the model. Keywordsknowledge products; value measurement; index weight; measurement model
{"title":"Value Measurement Model for Technology-Based Knowledge Products","authors":"Changling Li, Haiyun Xu","doi":"10.1109/CISE.2009.5363627","DOIUrl":"https://doi.org/10.1109/CISE.2009.5363627","url":null,"abstract":"This paper summarized the major current value measurement methods for technology-based knowledge products (TKP), and then made an analysis to these methods in the value measuring application, and we further exploited the main difficulties and established the value measurement model for the TKP value measuring, and on this basis, we built the value measuring model for the TKP. Firs, we establish the value measurement index system, and then got the weight distribution by the analytic hierarchy process(AHP). As for the comprehensive weights calculation, the model designs to suggest the experts to give monetary value directly in all sub-indicators according their experience, which is also the data acquisition method. Finally, we used a case analysis to prove the scientificity and feasibility of the model. Keywordsknowledge products; value measurement; index weight; measurement model","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125413495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-28DOI: 10.1109/CISE.2009.5366278
Bing Chen, Ting Yang, Tao Feng
This paper presents an ontology-based method to implement aero-engine compressor blade procedure quality analyzing. Knowledge descriptive method based on ontology is proposed to describe some relevant information involving in the compressor blade manufacturing process. The information includes product feature, part quality requirement, process planning, gage &tools, equipment working condition. Some reasoning rules has been created by SWRL (ontology rule language) based on the descriptive logic. The Racer is used for checking the consistency of procedure quality ontology. The rule described by SWRL is imported into JESS by using XSLT. The procedure quality diagnosing and reasoning can be completed by Jess. At last, an engineering application case is used to verify theory and method above mentioned.
{"title":"Ontology-Based Aero-Engine Compressor Blade Manufacturing Quality Analyzing","authors":"Bing Chen, Ting Yang, Tao Feng","doi":"10.1109/CISE.2009.5366278","DOIUrl":"https://doi.org/10.1109/CISE.2009.5366278","url":null,"abstract":"This paper presents an ontology-based method to implement aero-engine compressor blade procedure quality analyzing. Knowledge descriptive method based on ontology is proposed to describe some relevant information involving in the compressor blade manufacturing process. The information includes product feature, part quality requirement, process planning, gage &tools, equipment working condition. Some reasoning rules has been created by SWRL (ontology rule language) based on the descriptive logic. The Racer is used for checking the consistency of procedure quality ontology. The rule described by SWRL is imported into JESS by using XSLT. The procedure quality diagnosing and reasoning can be completed by Jess. At last, an engineering application case is used to verify theory and method above mentioned.","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126923269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-28DOI: 10.1109/CISE.2009.5367034
Wang Zhan-ping, Yang De-tao, Liu Meng-yang
The paper integrated agent technology with meta-search engine around university network public opinion monitoring, analyzed and designed its system framework with a view to achieve an intelligent and efficient information retrieval of monitoring of university network public opinion.
{"title":"Notice of RetractionA Study on University Network Public Opinion Monitoring Based on Intelligent Meta-Search Engine","authors":"Wang Zhan-ping, Yang De-tao, Liu Meng-yang","doi":"10.1109/CISE.2009.5367034","DOIUrl":"https://doi.org/10.1109/CISE.2009.5367034","url":null,"abstract":"The paper integrated agent technology with meta-search engine around university network public opinion monitoring, analyzed and designed its system framework with a view to achieve an intelligent and efficient information retrieval of monitoring of university network public opinion.","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115059467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-28DOI: 10.1109/CISE.2009.5363588
H. Liu, L. Li
There are some weaknesses in the traditional safety evaluation methods, such as, slow reasoning, low accuracy and so on, so thinking of a variety of factors which affect gas safety, a gas safety evaluation index system is built, which focuses on the state of gas, mine ventilation, gas monitoring, safety management and kindling. Combining the fuzzy comprehensive evaluation method with Gray Correlation method and BP neural network method, taking Hei longjiang Longmay Group as an example, a gas safety evaluation in its five mines was made. The results show that using different integrated comprehensive evaluation methods to evaluate the gas safety in the same mine, the results are different. It requires decision-makers to consider many factors and adopt more appropriate and scientific methods when making a comprehensive evaluation, which makes a right decision.
{"title":"Comprehensive Evaluation Analysis of Mine Gas Safety Based on Integrated Method","authors":"H. Liu, L. Li","doi":"10.1109/CISE.2009.5363588","DOIUrl":"https://doi.org/10.1109/CISE.2009.5363588","url":null,"abstract":"There are some weaknesses in the traditional safety evaluation methods, such as, slow reasoning, low accuracy and so on, so thinking of a variety of factors which affect gas safety, a gas safety evaluation index system is built, which focuses on the state of gas, mine ventilation, gas monitoring, safety management and kindling. Combining the fuzzy comprehensive evaluation method with Gray Correlation method and BP neural network method, taking Hei longjiang Longmay Group as an example, a gas safety evaluation in its five mines was made. The results show that using different integrated comprehensive evaluation methods to evaluate the gas safety in the same mine, the results are different. It requires decision-makers to consider many factors and adopt more appropriate and scientific methods when making a comprehensive evaluation, which makes a right decision.","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115067646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-28DOI: 10.1109/CISE.2009.5366211
Hua Li, Jianping Zhao
The central processing units of centralized structure are generally overloaded, and traditional intrusion detection system cannot effectively detect unknown attacks. To overcome the above problems, a distributed intrusion detection system model is established combining neural network with distributed detection in this paper based on the self-learning and adaptive characteristics of neural networks. A simulation experiment is done with Cauchy error estimation for avoiding trapping into local minimum. The result shows that the system can detect most of known attacks and analyze the unknown attacks, which is beneficial to artificial analysis and detection. Keywords-BP neural network; intrusion detection; distribution ;DIDS
{"title":"Distributed Intrusion Detection System Based on BP Neural Network","authors":"Hua Li, Jianping Zhao","doi":"10.1109/CISE.2009.5366211","DOIUrl":"https://doi.org/10.1109/CISE.2009.5366211","url":null,"abstract":"The central processing units of centralized structure are generally overloaded, and traditional intrusion detection system cannot effectively detect unknown attacks. To overcome the above problems, a distributed intrusion detection system model is established combining neural network with distributed detection in this paper based on the self-learning and adaptive characteristics of neural networks. A simulation experiment is done with Cauchy error estimation for avoiding trapping into local minimum. The result shows that the system can detect most of known attacks and analyze the unknown attacks, which is beneficial to artificial analysis and detection. Keywords-BP neural network; intrusion detection; distribution ;DIDS","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116462212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}