首页 > 最新文献

2010 IEEE International Conference on Progress in Informatics and Computing最新文献

英文 中文
Term rewriting for describing constrained policy graph and conflict detection 描述约束策略图和冲突检测的术语重写
Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5687864
Nima Khairdoost, N. Ghahraman
Constrained policy graph (CPG) is an imaginative graph and is in a high level understanding in comparison with pure logic. In this model we can describe the policies in constrained form according to the related system. In addition to the ability of describing ACPs, CPG model is able to combine policies and analyze them in order to detect possible conflicts arising from ACPs combination. Term rewriting systems are practical systems used in different fields including automatic theorem proving and developing computational models. Using term rewriting can help us in formal description and verification of access control policies (ACPs) and models. In this article after expression of how policies are described, their combination and conflict detection in CPG model, we describe them using term rewriting rules. These rules are appropriate tools for the automatic analysis of policies and conflict detection after their combination.
约束策略图(Constrained policy graph, CPG)是一种想象性图,与纯逻辑相比,具有较高的理解水平。在该模型中,我们可以根据相关系统以约束形式描述策略。CPG模型除了具有描述acp的能力外,还能够对策略进行组合和分析,以检测acp组合可能产生的冲突。术语重写系统是应用于自动定理证明和建立计算模型等不同领域的实用系统。使用术语重写可以帮助我们对访问控制策略(acp)和模型进行正式描述和验证。在本文中,在描述了CPG模型中的策略描述、策略组合和冲突检测之后,我们使用术语重写规则对策略进行了描述。这些规则是策略组合后自动分析和冲突检测的合适工具。
{"title":"Term rewriting for describing constrained policy graph and conflict detection","authors":"Nima Khairdoost, N. Ghahraman","doi":"10.1109/PIC.2010.5687864","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687864","url":null,"abstract":"Constrained policy graph (CPG) is an imaginative graph and is in a high level understanding in comparison with pure logic. In this model we can describe the policies in constrained form according to the related system. In addition to the ability of describing ACPs, CPG model is able to combine policies and analyze them in order to detect possible conflicts arising from ACPs combination. Term rewriting systems are practical systems used in different fields including automatic theorem proving and developing computational models. Using term rewriting can help us in formal description and verification of access control policies (ACPs) and models. In this article after expression of how policies are described, their combination and conflict detection in CPG model, we describe them using term rewriting rules. These rules are appropriate tools for the automatic analysis of policies and conflict detection after their combination.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122434406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Realistic real-time rendering for ocean waves on GPU 逼真的实时渲染的海浪在GPU上
Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5688013
Wenhui Zhang, Huan Zhou, L. Tang, X. Zhou
Creating and rendering realistic ocean is one of the most daunting tasks in computer graphics. An efficient algorithm is used to render ocean waves by taking advantage of the parallelism and programmability of GPU and the new characteristics of vertex sampling of Shader Model 3.0. The ocean modeling is optimized by level-of-detail (LOD) technology. The real-time wave simulation is realized by the technology of animated texture associated with time, which storages 250 pictures of the height map of ocean surface and is used to superimpose the grid vertex. The illumination effects of the water, such as the reflection, refraction and Fresnel effects, are rendered. Experimental results are shown very well to meet the photorealism and real-time requirement (>60fps) and can be applied to generate real-time water in visual reality.
创建和渲染逼真的海洋是计算机图形学中最艰巨的任务之一。利用GPU的并行性和可编程性以及Shader Model 3.0顶点采样的新特性,提出了一种高效的海浪渲染算法。采用细节级(LOD)技术对海洋模型进行优化。采用与时间关联的动画纹理技术,存储了250幅海面高度图,并将网格顶点进行叠加,实现了海浪的实时模拟。水的照明效果,如反射,折射和菲涅耳效应,被渲染。实验结果表明,该方法能够很好地满足真实感和实时性要求(>60fps),可用于视觉现实中的实时水生成。
{"title":"Realistic real-time rendering for ocean waves on GPU","authors":"Wenhui Zhang, Huan Zhou, L. Tang, X. Zhou","doi":"10.1109/PIC.2010.5688013","DOIUrl":"https://doi.org/10.1109/PIC.2010.5688013","url":null,"abstract":"Creating and rendering realistic ocean is one of the most daunting tasks in computer graphics. An efficient algorithm is used to render ocean waves by taking advantage of the parallelism and programmability of GPU and the new characteristics of vertex sampling of Shader Model 3.0. The ocean modeling is optimized by level-of-detail (LOD) technology. The real-time wave simulation is realized by the technology of animated texture associated with time, which storages 250 pictures of the height map of ocean surface and is used to superimpose the grid vertex. The illumination effects of the water, such as the reflection, refraction and Fresnel effects, are rendered. Experimental results are shown very well to meet the photorealism and real-time requirement (>60fps) and can be applied to generate real-time water in visual reality.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116031536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automatic generation of geometric base sequences 自动生成几何碱基序列
Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5687899
Rui Ling, Yuan-jun He, Kairen Deng
How to use computers to effectively solve geometric computation problems is one important focus in the development of geometry. In this paper, we introduce a new method to solve geometric problems with a geometric method. We establish a set of geometric bases and generate sequences of these geometric bases automatically with forward-reasoning. The geometric base sequence is a new description of the solution of geometric problems which is more readable than the solution generated by algebra methods. Moreover, we modify the hidden Markov chain model to avoid information explosion. Experimental results indicate that our method can be used to generate the sequences efficiently.
如何利用计算机有效地解决几何计算问题是几何学科发展的一个重要方向。本文介绍了一种用几何方法求解几何问题的新方法。我们建立了一组几何基,并利用前向推理自动生成这些几何基的序列。几何基序列是对几何问题解的一种新的描述,比代数方法生成的解更具可读性。此外,我们对隐马尔可夫链模型进行了修正,以避免信息爆炸。实验结果表明,该方法可以有效地生成序列。
{"title":"Automatic generation of geometric base sequences","authors":"Rui Ling, Yuan-jun He, Kairen Deng","doi":"10.1109/PIC.2010.5687899","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687899","url":null,"abstract":"How to use computers to effectively solve geometric computation problems is one important focus in the development of geometry. In this paper, we introduce a new method to solve geometric problems with a geometric method. We establish a set of geometric bases and generate sequences of these geometric bases automatically with forward-reasoning. The geometric base sequence is a new description of the solution of geometric problems which is more readable than the solution generated by algebra methods. Moreover, we modify the hidden Markov chain model to avoid information explosion. Experimental results indicate that our method can be used to generate the sequences efficiently.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":"294 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116696746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Saddle point detection for connecting objects in 2D images based on mathematic programming restraints 基于数学规划约束的二维图像连接目标鞍点检测
Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5688018
Ken Chen, Yicong Wang, G. Jiang, L. Banta
Saddle points formed through morphologic erosion and existing between adjacent connecting objects in 2D images have been applied for segmenting purposes. In this article, a new approach is presented for searching the saddle points in 2D images using mathematic programming restraints for the purpose of ultimately separating the connecting objects. By combining the pixel distribution information in 3D topographic image and mathematic programming restraints for saddle point, the saddle points in the image can thus be identified. In addition, the relation between step selection in the algorithm and detection rate is also explored. The experiment results on the given real particle images suggest the better robustness in saddle point detection algorithm, which undoubtedly lays the practical and theoretic base for touching object segmentation for 2D images.
利用二维图像中存在于相邻连接物体之间的形态侵蚀形成的鞍点进行分割。本文提出了一种利用数学规划约束在二维图像中搜索鞍点的新方法,目的是最终分离连接对象。将三维地形图像中的像素分布信息与鞍点的数学规划约束相结合,实现图像中鞍点的识别。此外,还探讨了算法中的步长选择与检测率之间的关系。在给定的真实粒子图像上的实验结果表明,鞍点检测算法具有较好的鲁棒性,这无疑为二维图像的触摸目标分割奠定了实践和理论基础。
{"title":"Saddle point detection for connecting objects in 2D images based on mathematic programming restraints","authors":"Ken Chen, Yicong Wang, G. Jiang, L. Banta","doi":"10.1109/PIC.2010.5688018","DOIUrl":"https://doi.org/10.1109/PIC.2010.5688018","url":null,"abstract":"Saddle points formed through morphologic erosion and existing between adjacent connecting objects in 2D images have been applied for segmenting purposes. In this article, a new approach is presented for searching the saddle points in 2D images using mathematic programming restraints for the purpose of ultimately separating the connecting objects. By combining the pixel distribution information in 3D topographic image and mathematic programming restraints for saddle point, the saddle points in the image can thus be identified. In addition, the relation between step selection in the algorithm and detection rate is also explored. The experiment results on the given real particle images suggest the better robustness in saddle point detection algorithm, which undoubtedly lays the practical and theoretic base for touching object segmentation for 2D images.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116864699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feature preserving consolidation for unorganized point clouds 为无组织点云保留整合功能
Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5687891
Bao Li, Wei Jiang, Zhi-Quan Cheng, Gang Dang, Shiyao Jin
We introduce a novel method for the consolidation of unorganized point clouds with noise, outliers, non-uniformities as well as sharp features. This method is feature preserving, in the sense that given an initial estimation of normal, it is able to recover the sharp features contained in the original geometric data which are usually contaminated during the acquisition. The key ingredient of our approach is a weighting term from normal space as an effective complement to the recently proposed consolidation techniques. Moreover, a normal mollification step is employed during the consolidation to get normal information respecting sharp features besides the position of each point. Experiments on both synthetic and real-world scanned models validate the ability of our approach in producing denoised, evenly distributed and feature preserving point clouds, which are preferred by most surface reconstruction methods.
我们提出了一种新的方法来巩固无组织点云的噪声,异常值,非均匀性和尖锐的特征。这种方法是特征保留的,在给定初始法向估计的情况下,它能够恢复原始几何数据中通常在获取过程中被污染的尖锐特征。我们方法的关键成分是一个来自正态空间的加权项,作为最近提出的巩固技术的有效补充。此外,在合并过程中采用法向软化步骤,以获得除每个点的位置外关于尖锐特征的法向信息。在合成和真实扫描模型上的实验验证了我们的方法在产生去噪、均匀分布和特征保留的点云方面的能力,这是大多数表面重建方法所首选的。
{"title":"Feature preserving consolidation for unorganized point clouds","authors":"Bao Li, Wei Jiang, Zhi-Quan Cheng, Gang Dang, Shiyao Jin","doi":"10.1109/PIC.2010.5687891","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687891","url":null,"abstract":"We introduce a novel method for the consolidation of unorganized point clouds with noise, outliers, non-uniformities as well as sharp features. This method is feature preserving, in the sense that given an initial estimation of normal, it is able to recover the sharp features contained in the original geometric data which are usually contaminated during the acquisition. The key ingredient of our approach is a weighting term from normal space as an effective complement to the recently proposed consolidation techniques. Moreover, a normal mollification step is employed during the consolidation to get normal information respecting sharp features besides the position of each point. Experiments on both synthetic and real-world scanned models validate the ability of our approach in producing denoised, evenly distributed and feature preserving point clouds, which are preferred by most surface reconstruction methods.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123215529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Application of tabu search heuristic algorithms for the purpose of energy saving in optimal load distribution strategy for multiple chiller water units 以节能为目的的禁忌搜索启发式算法在多台冷水机组负荷优化分配策略中的应用
Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5687444
J. Zhang, Kanyu Zhang
Tabu search algorithm has been applied to solve the optimal load distribution strategy problem for the cooling system constituted by multiple chiller water units, which has the characteristic such as complexity, constraint, nonlinearity, modeling difficulty, etc. The tabu search algorithms based on the neighborhood search can avoid the local optimization avoidance and has the artificial intelligence memory mechanism. In this paper, two chiller water units connected in parallel working using the tabu algorithm was observed. Compared with the conventional method, the results indicated that the tabu search algorithms has much less power consumption and is very suitable for application in air condition system operation.
采用禁忌搜索算法求解由多个冷水机组组成的冷却系统的最优负荷分配策略问题,该问题具有复杂、约束、非线性、建模困难等特点。基于邻域搜索的禁忌搜索算法可以避免局部优化回避,并具有人工智能记忆机制。本文采用禁忌算法对两台冷水机组并联运行进行了观察。结果表明,与传统方法相比,禁忌搜索算法具有更低的功耗,非常适合在空调系统运行中应用。
{"title":"Application of tabu search heuristic algorithms for the purpose of energy saving in optimal load distribution strategy for multiple chiller water units","authors":"J. Zhang, Kanyu Zhang","doi":"10.1109/PIC.2010.5687444","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687444","url":null,"abstract":"Tabu search algorithm has been applied to solve the optimal load distribution strategy problem for the cooling system constituted by multiple chiller water units, which has the characteristic such as complexity, constraint, nonlinearity, modeling difficulty, etc. The tabu search algorithms based on the neighborhood search can avoid the local optimization avoidance and has the artificial intelligence memory mechanism. In this paper, two chiller water units connected in parallel working using the tabu algorithm was observed. Compared with the conventional method, the results indicated that the tabu search algorithms has much less power consumption and is very suitable for application in air condition system operation.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123665081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Perceptual image hash for tampering detection using Zernike moments 感知图像哈希篡改检测使用泽尼克矩
Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5687938
Yan Zhao, Weimin Wei
In this paper, a new image hashing method using Zernike moments is proposed. This method is based on rotation invariance of magnitudes and corrected phases of Zernike moments. At first the input image is divided into overlapped blocks. Zernike moments of these blocks are calculated and then each of the amplitudes and phases of modified Zernike moments is then encoded into three bits to form the intermediate hash. Lastly, the final hash sequence is obtained by pseudo-randomly permuting the intermediate hash sequence. Similarity between hashes is measured with the Hamming distance. Experimental results show that this method is robust against most content-preserving attacks. The Hamming distance of Hashes between two different images is bigger than the threshold. This method can be used to detect tampering image, and can locate the tampered region in the image.
本文提出了一种基于泽尼克矩的图像哈希算法。该方法基于幅值的旋转不变性和泽尼克矩的修正相位。首先,输入图像被分成重叠的块。计算这些块的泽尼克矩,然后将修改后的泽尼克矩的每个振幅和相位编码为3位,形成中间哈希。最后,对中间哈希序列进行伪随机置换,得到最终哈希序列。哈希之间的相似性是用汉明距离来衡量的。实验结果表明,该方法对大多数内容保留攻击具有较强的鲁棒性。两幅不同图像之间哈希值的汉明距离大于阈值。该方法可用于检测篡改图像,并能定位图像中的篡改区域。
{"title":"Perceptual image hash for tampering detection using Zernike moments","authors":"Yan Zhao, Weimin Wei","doi":"10.1109/PIC.2010.5687938","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687938","url":null,"abstract":"In this paper, a new image hashing method using Zernike moments is proposed. This method is based on rotation invariance of magnitudes and corrected phases of Zernike moments. At first the input image is divided into overlapped blocks. Zernike moments of these blocks are calculated and then each of the amplitudes and phases of modified Zernike moments is then encoded into three bits to form the intermediate hash. Lastly, the final hash sequence is obtained by pseudo-randomly permuting the intermediate hash sequence. Similarity between hashes is measured with the Hamming distance. Experimental results show that this method is robust against most content-preserving attacks. The Hamming distance of Hashes between two different images is bigger than the threshold. This method can be used to detect tampering image, and can locate the tampered region in the image.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123869649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Certificate-based proxy signature 基于证书的代理签名
Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5687580
Jianneng Chen, Zhenjie Huang
Certificate-based public key cryptography was introduced to remove the use of certificate to ensure the authentication of the user's public key in the traditional cryptography and overcome the key escrow problem in the identity-based public key cryptography. The proxy signature schemes allow proxy signers to sign messages on behalf of an original signer. Combining the concept of certificate-based signature with the concept of proxy signature, in this paper, we present a notion of certificate-based proxy signature based on bilinear parings and proposed a scheme assuming the hardness of Computational Diffie-Hellman Problem.
基于证书的公钥加密消除了传统加密中使用证书来保证用户公钥的认证,克服了基于身份的公钥加密中存在的密钥托管问题。代理签名方案允许代理签名人代表原始签名人对消息进行签名。将基于证书签名的概念与代理签名的概念相结合,提出了一种基于双线性对的基于证书的代理签名的概念,并提出了一种假设计算Diffie-Hellman问题硬度的方案。
{"title":"Certificate-based proxy signature","authors":"Jianneng Chen, Zhenjie Huang","doi":"10.1109/PIC.2010.5687580","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687580","url":null,"abstract":"Certificate-based public key cryptography was introduced to remove the use of certificate to ensure the authentication of the user's public key in the traditional cryptography and overcome the key escrow problem in the identity-based public key cryptography. The proxy signature schemes allow proxy signers to sign messages on behalf of an original signer. Combining the concept of certificate-based signature with the concept of proxy signature, in this paper, we present a notion of certificate-based proxy signature based on bilinear parings and proposed a scheme assuming the hardness of Computational Diffie-Hellman Problem.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124175429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A collaborative filtering recommendation algorithm based on improved similarity measure method 一种基于改进相似度量方法的协同过滤推荐算法
Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5687455
Y. Wu, Jianguo Zheng
Collaborative filtering recommendation algorithm is one of the most successful technologies in the e-commerce recommendation system. With the development of e-commerce, the magnitudes of users and commodities grow rapidly; the performance of traditional recommendation algorithm is getting worse. So propose a new similarity measure method, automatically generate weighting factor to combine dynamically item attribute similarity and score similarity, form a reasonable item similarity, which bring the nearest neighbors of item, and predict the item's rating to recommend. The experimental results show the algorithm enhance the steady and precision of recommendation, solve cold start issue.
协同过滤推荐算法是电子商务推荐系统中最成功的技术之一。随着电子商务的发展,用户规模和商品规模迅速增长;传统推荐算法的性能越来越差。为此,提出了一种新的相似度度量方法,自动生成加权因子,动态地将物品属性相似度和得分相似度结合起来,形成一个合理的物品相似度,从而带来物品的最近邻,并预测物品的评分推荐。实验结果表明,该算法提高了推荐的稳定性和精度,解决了冷启动问题。
{"title":"A collaborative filtering recommendation algorithm based on improved similarity measure method","authors":"Y. Wu, Jianguo Zheng","doi":"10.1109/PIC.2010.5687455","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687455","url":null,"abstract":"Collaborative filtering recommendation algorithm is one of the most successful technologies in the e-commerce recommendation system. With the development of e-commerce, the magnitudes of users and commodities grow rapidly; the performance of traditional recommendation algorithm is getting worse. So propose a new similarity measure method, automatically generate weighting factor to combine dynamically item attribute similarity and score similarity, form a reasonable item similarity, which bring the nearest neighbors of item, and predict the item's rating to recommend. The experimental results show the algorithm enhance the steady and precision of recommendation, solve cold start issue.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130017980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An approach to analyse similarity of business process variants 一种分析业务流程变体相似性的方法
Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5687872
Noor Mazlina Mahmod, Syafeeza Ahmad Radzi
This paper addresses the problem of managing variance in process instances for business process modeling. In business work practice, variance is a valuable source of organizational intellectual capital that needs to be captured and capitalized as it represents a preferred and successful work practice. Therefore, it is important to provide an effective method to analyze the similarity between these variants since it can bring benefits for organization productivity and provide consistency. Through this paper, we propose a systematic approach to deal with the complexity of business process variants by analyzing the structure relationship and the execution construct in order to measure the similarity degree of the variants.
本文讨论了在业务流程建模过程实例中管理差异的问题。在业务工作实践中,方差是组织智力资本的宝贵来源,需要捕获和资本化,因为它代表了首选的和成功的工作实践。因此,提供一种有效的方法来分析这些变体之间的相似性是很重要的,因为它可以为组织的生产力带来好处并提供一致性。本文通过分析业务流程变体的结构关系和执行构造,提出了一种系统的方法来处理业务流程变体的复杂性,以度量变体的相似程度。
{"title":"An approach to analyse similarity of business process variants","authors":"Noor Mazlina Mahmod, Syafeeza Ahmad Radzi","doi":"10.1109/PIC.2010.5687872","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687872","url":null,"abstract":"This paper addresses the problem of managing variance in process instances for business process modeling. In business work practice, variance is a valuable source of organizational intellectual capital that needs to be captured and capitalized as it represents a preferred and successful work practice. Therefore, it is important to provide an effective method to analyze the similarity between these variants since it can bring benefits for organization productivity and provide consistency. Through this paper, we propose a systematic approach to deal with the complexity of business process variants by analyzing the structure relationship and the execution construct in order to measure the similarity degree of the variants.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126186143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2010 IEEE International Conference on Progress in Informatics and Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1