首页 > 最新文献

2012 IEEE International Conference on Computer Science and Automation Engineering最新文献

英文 中文
The research on the behavior loyalty model of 3G subscriber based on data mining 基于数据挖掘的3G用户行为忠诚模型研究
Pub Date : 2012-06-22 DOI: 10.1109/ICSESS.2012.6269453
Di haolin, Jiao liuyan
In this paper, the author subdivides the evaluation factors of subscriber's behavior loyalty under the guidance of the precise marketing, puts forward subscriber's behavior of 3G loyalty model, and according to the correlation analysis about all of data of 3G subscriber from a regional operator in 2010 August with SAS software, features of behavior loyalty in deep subscriber . It is a foundation to make a reasonable marketing strategy.
本文在精准营销的指导下,对用户行为忠诚的评价因素进行细分,提出了3G用户行为忠诚模型,并利用SAS软件对某地区运营商2010年8月所有3G用户数据进行相关性分析,得出了深度用户行为忠诚的特征。这是制定合理的营销策略的基础。
{"title":"The research on the behavior loyalty model of 3G subscriber based on data mining","authors":"Di haolin, Jiao liuyan","doi":"10.1109/ICSESS.2012.6269453","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269453","url":null,"abstract":"In this paper, the author subdivides the evaluation factors of subscriber's behavior loyalty under the guidance of the precise marketing, puts forward subscriber's behavior of 3G loyalty model, and according to the correlation analysis about all of data of 3G subscriber from a regional operator in 2010 August with SAS software, features of behavior loyalty in deep subscriber . It is a foundation to make a reasonable marketing strategy.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130673789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The study on geography under Internet of Things 物联网下的地理学研究
Pub Date : 2012-06-22 DOI: 10.1109/ICSESS.2012.6269452
Liu Ming, Wanglin Yan
The development and expansion of Internet of Things need to solve a series of geographical questions such as space organization and industrial spatial distribution. Based on the integration of massive data between realistic space and virtual space, Internet of Things will affect the scale and means of Geographical research. Thus, this paper attempts to explore such new phenomenon of Human Geography, especially the change from Internet era to Internet of Things era, and try to construct the framework of Internet of Things Geography.
物联网的发展和扩展需要解决空间组织、产业空间分布等一系列地理问题。基于现实空间与虚拟空间海量数据的融合,物联网将影响地理研究的规模和手段。因此,本文试图探索人文地理学的这种新现象,特别是从互联网时代到物联网时代的变化,并试图构建物联网地理学的框架。
{"title":"The study on geography under Internet of Things","authors":"Liu Ming, Wanglin Yan","doi":"10.1109/ICSESS.2012.6269452","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269452","url":null,"abstract":"The development and expansion of Internet of Things need to solve a series of geographical questions such as space organization and industrial spatial distribution. Based on the integration of massive data between realistic space and virtual space, Internet of Things will affect the scale and means of Geographical research. Thus, this paper attempts to explore such new phenomenon of Human Geography, especially the change from Internet era to Internet of Things era, and try to construct the framework of Internet of Things Geography.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123829848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and implementation of web Instant Message System based on XMPP 基于XMPP的web即时消息系统的设计与实现
Pub Date : 2012-06-22 DOI: 10.1109/ICSESS.2012.6269411
Bai Xuefu, Yang Ming
With the Internet quickly development, Instant Message System (IMS) has been applied popularly in daily communication, collaboration OA, E-commerce and Enterprise Customer Service. However, the public Instant Message System can not be easily integrated into the existing enterprise system due to the limitation of different messaging protocols and system customer database. In this paper, by analyzing XMPP core protocol and requirement of enterprise-class IMS (EIMS), we design an implementation framework for EIMS by developing Openfire server and integrating custom database. The provided solution based on XMPP has a better security, openness and supports cross-platform, thus it allows enterprises to create their own EIMS that are flexible and scalable and encourage good system architecture since it can integrate web-based IMS into the other company's internal applications and services with minimum effort.
随着Internet的迅速发展,即时消息系统(IMS)在日常通信、协同办公、电子商务、企业客户服务等方面得到了广泛的应用。然而,由于不同的消息传递协议和系统客户数据库的限制,公共即时消息系统不容易集成到现有的企业系统中。本文通过分析XMPP核心协议和企业级IMS (EIMS)的需求,通过开发Openfire服务器和集成自定义数据库,设计了EIMS的实现框架。所提供的基于XMPP的解决方案具有更好的安全性、开放性和跨平台支持,因此它允许企业创建自己的灵活且可扩展的EIMS,并鼓励良好的系统架构,因为它可以以最小的工作量将基于web的IMS集成到其他公司的内部应用程序和服务中。
{"title":"Design and implementation of web Instant Message System based on XMPP","authors":"Bai Xuefu, Yang Ming","doi":"10.1109/ICSESS.2012.6269411","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269411","url":null,"abstract":"With the Internet quickly development, Instant Message System (IMS) has been applied popularly in daily communication, collaboration OA, E-commerce and Enterprise Customer Service. However, the public Instant Message System can not be easily integrated into the existing enterprise system due to the limitation of different messaging protocols and system customer database. In this paper, by analyzing XMPP core protocol and requirement of enterprise-class IMS (EIMS), we design an implementation framework for EIMS by developing Openfire server and integrating custom database. The provided solution based on XMPP has a better security, openness and supports cross-platform, thus it allows enterprises to create their own EIMS that are flexible and scalable and encourage good system architecture since it can integrate web-based IMS into the other company's internal applications and services with minimum effort.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123907900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Iris recognition based on grouping KNN and Rectangle Conversion 基于分组KNN和矩形变换的虹膜识别
Pub Date : 2012-06-22 DOI: 10.1109/ICSESS.2012.6269422
Hui Zhang, Xiang-feng Guan
In iris recognition, as a large amount of experiments show, the inner edge of iris is not a standard circle, thus edges may cause the error of accurate recognition. If we use traditional localization method of round template, it can cause the problem of iris legacy, the loss of iris textures and longer time as well. To improve the accuracy of iris location, reduce the recognition time, this paper develops a new iris recognition algorithm. Firstly, the lights pot within the pupil is filled in the original image, then the image is unfolded into a rectangle and the circle detection is substituted by the point and line detection in the rectangle image to find the inner and outer edge, secondly, texture features are extracted by EMD. Thirdly, the K nearest neighbors (KNN) of each test sample are found based on distance of Mahalanibis. Lastly, recognition results are decided by majority voting method. The recognition accuracy of simulation experiments based on CASIA iris image database amounts to 99% and has the less running time. The results show that compared to circle template, Rectangle Conversion has more accurate location of the iris, thus effectively raising the recognition accuracy.
在虹膜识别中,大量的实验表明,虹膜的内缘不是一个标准的圆,因此边缘可能会导致准确识别的误差。如果采用传统的圆形模板定位方法,会造成虹膜遗留、虹膜纹理丢失、定位时间长等问题。为了提高虹膜定位的准确性,减少识别时间,本文开发了一种新的虹膜识别算法。首先在原始图像中填充瞳孔内的光斑,然后将图像展开为矩形图像,用矩形图像中的点线检测代替圆检测来寻找内边缘和外边缘,然后通过EMD提取纹理特征。第三,根据马氏体的距离找到每个测试样本的K个近邻(KNN)。最后,采用多数投票法确定识别结果。基于CASIA虹膜图像数据库的仿真实验识别准确率达99%,且运行时间短。结果表明,与圆形模板相比,矩形转换具有更精确的虹膜定位,从而有效地提高了识别精度。
{"title":"Iris recognition based on grouping KNN and Rectangle Conversion","authors":"Hui Zhang, Xiang-feng Guan","doi":"10.1109/ICSESS.2012.6269422","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269422","url":null,"abstract":"In iris recognition, as a large amount of experiments show, the inner edge of iris is not a standard circle, thus edges may cause the error of accurate recognition. If we use traditional localization method of round template, it can cause the problem of iris legacy, the loss of iris textures and longer time as well. To improve the accuracy of iris location, reduce the recognition time, this paper develops a new iris recognition algorithm. Firstly, the lights pot within the pupil is filled in the original image, then the image is unfolded into a rectangle and the circle detection is substituted by the point and line detection in the rectangle image to find the inner and outer edge, secondly, texture features are extracted by EMD. Thirdly, the K nearest neighbors (KNN) of each test sample are found based on distance of Mahalanibis. Lastly, recognition results are decided by majority voting method. The recognition accuracy of simulation experiments based on CASIA iris image database amounts to 99% and has the less running time. The results show that compared to circle template, Rectangle Conversion has more accurate location of the iris, thus effectively raising the recognition accuracy.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121706678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A supporting tool for creating and maintaining security targets according to ISO/IEC 15408
Pub Date : 2012-06-22 DOI: 10.1109/ICSESS.2012.6269574
Gefei Sun, K. Yajima, J. Miura, Kai Shi, Y. Goto, Jingde Cheng
To acquire the certification according to ISO/IEC 15408 for a target system, it is necessary to create a security target (ST) which specifies security facilities of the system. Creating STs is not an easy task for developers because they do not know how to create STs well, even if they know the security facilities. Meanwhile, STs should be maintained continuously to keep a target system secure. Maintaining STs is not easy as same as creating STs. However, there is no tool to support developers and maintainers to create and maintain STs so far. This paper presents a supporting tool according to ISO/IEC 15408, named ST-Editor. ST-Editor tells users what should be described and how they should be described in STs and provides a helpful and secure editing and maintaining environment of STs.
为了获得ISO/IEC 15408对目标系统的认证,必须创建一个安全目标(ST),指定系统的安全设施。对于开发人员来说,创建STs并不是一件容易的事情,因为他们不知道如何很好地创建STs,即使他们知道安全设施。同时,应持续维护STs,以保证目标系统的安全。维护化粪池并不像创建化粪池那么容易。但是,目前还没有工具支持开发人员和维护人员创建和维护STs。本文介绍了一个符合ISO/IEC 15408标准的支持工具ST-Editor。ST-Editor告诉用户在STs中应该描述什么以及如何描述,并提供一个有用和安全的STs编辑和维护环境。
{"title":"A supporting tool for creating and maintaining security targets according to ISO/IEC 15408","authors":"Gefei Sun, K. Yajima, J. Miura, Kai Shi, Y. Goto, Jingde Cheng","doi":"10.1109/ICSESS.2012.6269574","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269574","url":null,"abstract":"To acquire the certification according to ISO/IEC 15408 for a target system, it is necessary to create a security target (ST) which specifies security facilities of the system. Creating STs is not an easy task for developers because they do not know how to create STs well, even if they know the security facilities. Meanwhile, STs should be maintained continuously to keep a target system secure. Maintaining STs is not easy as same as creating STs. However, there is no tool to support developers and maintainers to create and maintain STs so far. This paper presents a supporting tool according to ISO/IEC 15408, named ST-Editor. ST-Editor tells users what should be described and how they should be described in STs and provides a helpful and secure editing and maintaining environment of STs.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127701499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
The study on campus network security evaluation based on fuzzy membership 基于模糊隶属度的校园网安全评价研究
Pub Date : 2012-06-22 DOI: 10.1109/ICSESS.2012.6269475
Yan Shi
Evaluation of campus network security is a complicated systematic project. The paper analyzes the reasons of the questions, obtains the solving method, and at last builds the M(1,2,3) model without the interference of redundant data, which is different from )M(g+) and is a nonlinear model. The paper will apply the new algorithm in the fuzzy evaluation on campus network security.
校园网安全评价是一项复杂的系统工程。本文分析了问题产生的原因,得出了求解方法,最后建立了不受冗余数据干扰的M(1,2,3)模型,该模型不同于M(g+)模型,是一个非线性模型。本文将该算法应用于校园网安全模糊评价中。
{"title":"The study on campus network security evaluation based on fuzzy membership","authors":"Yan Shi","doi":"10.1109/ICSESS.2012.6269475","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269475","url":null,"abstract":"Evaluation of campus network security is a complicated systematic project. The paper analyzes the reasons of the questions, obtains the solving method, and at last builds the M(1,2,3) model without the interference of redundant data, which is different from )M(g+) and is a nonlinear model. The paper will apply the new algorithm in the fuzzy evaluation on campus network security.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122249004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Testing process model and classification of test methods for embedded software of electrical products 电气产品嵌入式软件试验过程模型及试验方法分类
Pub Date : 2012-06-22 DOI: 10.1109/ICSESS.2012.6269441
Wang Pingping, Qian Xiaoyao, Zhu Jiang
As the development of science and technology, intelligent electrical appliances are increasing, gradually introducing the embedded microprocessor software to replace hardware to complete the functional and safe control has become an inevitable trend. As the electrical use is directly related to the safety of persons and property, so the safety testing and reliability testing of software are especially important. Compared with ordinary embedded software, embedded software of appliances has their own characteristics. Combination with general-purpose embedded software testing process improved V model and Butterfly model, this paper proposes the test process model for embedded software of electrical products based on their own software characteristics and further a study for classification of the test methods.
随着科技的发展,电器的智能化程度越来越高,逐步引入嵌入式微处理器软件来代替硬件来完成功能和安全的控制已成为必然趋势。由于电气的使用直接关系到人身和财产的安全,因此软件的安全性测试和可靠性测试尤为重要。与普通嵌入式软件相比,家电嵌入式软件具有自己的特点。本文结合通用嵌入式软件测试过程改进的V模型和Butterfly模型,根据各自的软件特点,提出了电气产品嵌入式软件的测试过程模型,并对测试方法进行了分类研究。
{"title":"Testing process model and classification of test methods for embedded software of electrical products","authors":"Wang Pingping, Qian Xiaoyao, Zhu Jiang","doi":"10.1109/ICSESS.2012.6269441","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269441","url":null,"abstract":"As the development of science and technology, intelligent electrical appliances are increasing, gradually introducing the embedded microprocessor software to replace hardware to complete the functional and safe control has become an inevitable trend. As the electrical use is directly related to the safety of persons and property, so the safety testing and reliability testing of software are especially important. Compared with ordinary embedded software, embedded software of appliances has their own characteristics. Combination with general-purpose embedded software testing process improved V model and Butterfly model, this paper proposes the test process model for embedded software of electrical products based on their own software characteristics and further a study for classification of the test methods.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122282985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design of embedded secure CGI daemon 嵌入式安全CGI守护进程的设计
Pub Date : 2012-06-22 DOI: 10.1109/ICSESS.2012.6269569
Bo Qu, Zhong-xue Yang
This paper describes the technical details of design and implementation of an embedded secure CGI daemon, which not only is a CGI program residing permanently in memory but also integrates a CGI based secure HTTP server which is dedicated to support CGI specification. The content of the pager consists mainly of two parts, of which the first is designing of CGI based secure HTTP server, including SSL and HTTP programming, and generating and downloading of self-signed certificate, while the second is designing of CGI daemon including CGI programming and the mainly used techniques, such as secure login, CAPTCHA, password getting back, etc. A practical embedded application system is provided as demo example to show the usage and effects of the secure CGI daemon.
本文介绍了一个嵌入式安全CGI守护进程的设计与实现的技术细节,该守护进程不仅是一个永久驻留在内存中的CGI程序,而且集成了一个专门支持CGI规范的基于CGI的安全HTTP服务器。该寻呼器的内容主要包括两部分,第一部分是基于CGI的安全HTTP服务器的设计,包括SSL和HTTP的编程,以及自签名证书的生成和下载;第二部分是CGI守护进程的设计,包括CGI编程和主要使用的技术,如安全登录、CAPTCHA、密码返回等。以一个实际的嵌入式应用系统为例,说明了安全CGI守护进程的使用方法和效果。
{"title":"Design of embedded secure CGI daemon","authors":"Bo Qu, Zhong-xue Yang","doi":"10.1109/ICSESS.2012.6269569","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269569","url":null,"abstract":"This paper describes the technical details of design and implementation of an embedded secure CGI daemon, which not only is a CGI program residing permanently in memory but also integrates a CGI based secure HTTP server which is dedicated to support CGI specification. The content of the pager consists mainly of two parts, of which the first is designing of CGI based secure HTTP server, including SSL and HTTP programming, and generating and downloading of self-signed certificate, while the second is designing of CGI daemon including CGI programming and the mainly used techniques, such as secure login, CAPTCHA, password getting back, etc. A practical embedded application system is provided as demo example to show the usage and effects of the secure CGI daemon.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129973939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Commodity quality authentication protocol on the good faith cloud platform 诚信云平台上的商品质量认证协议
Pub Date : 2012-06-22 DOI: 10.1109/ICSESS.2012.6269510
C. Wang, Sujing Xue
The quality of the general commodities can be measured by three indicators: whether commodity production enterprises have the authenticated production capacity; whether the goods could be tested as qualified by the trusted party according to special standards; whether the goods are in the marked period of validity. By using the anti-counterfeiting code which includes the information of commodity quality and identification, the commodity quality authentication protocol can help users authenticate the platform, distinguish the forged and fake commodities, and provide the information of the production enterprises and the quality inspection institution, as well as the commodity circulation. With the above information, consumers can maintain their rights and interests to the largest degree.
一般商品的质量可以通过三个指标来衡量:商品生产企业是否具有经认证的生产能力;受托方是否能按特殊标准检验货物合格;货物是否在标明的有效期内。商品质量认证协议通过使用包含商品质量和识别信息的防伪代码,可以帮助用户对平台进行认证,区分假冒商品,并提供生产企业和质检机构以及商品流通的信息。有了以上信息,消费者可以最大程度地维护自己的权益。
{"title":"Commodity quality authentication protocol on the good faith cloud platform","authors":"C. Wang, Sujing Xue","doi":"10.1109/ICSESS.2012.6269510","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269510","url":null,"abstract":"The quality of the general commodities can be measured by three indicators: whether commodity production enterprises have the authenticated production capacity; whether the goods could be tested as qualified by the trusted party according to special standards; whether the goods are in the marked period of validity. By using the anti-counterfeiting code which includes the information of commodity quality and identification, the commodity quality authentication protocol can help users authenticate the platform, distinguish the forged and fake commodities, and provide the information of the production enterprises and the quality inspection institution, as well as the commodity circulation. With the above information, consumers can maintain their rights and interests to the largest degree.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"155 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134012802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantic query expansion method for food safety domain 食品安全领域的语义查询扩展方法
Pub Date : 2012-06-22 DOI: 10.1109/ICSESS.2012.6269402
Bowei He, Yuehua Yang, Junping Du
This paper presents a ontology-based semantic query expansion method. This method takes the food safety domain as a background and combines concepts similarity computation model. Firstly, the ontology-based representation method for food safety domain knowledge is proposed. Then, the expansion of queries is realized by the semantic relationships in food safety ontology and the expansion of the lexicon for words segmentation. Finally, concepts similarity computation model is applied to set the expansion range of domain concepts. Experimental results show that this method can not only obtain the search results consistent with the search conditions in the grammatical form, but also obtain the results semantically consistent with the search conditions. Besides, the retrieval results have been sorted according to the relevance.
提出了一种基于本体的语义查询扩展方法。该方法以食品安全领域为背景,结合概念相似度计算模型。首先,提出了基于本体的食品安全领域知识表示方法。然后,通过食品安全本体的语义关系和分词词典的扩充来实现查询的扩充;最后,应用概念相似度计算模型确定领域概念的扩展范围。实验结果表明,该方法不仅可以在语法形式上获得与搜索条件一致的搜索结果,而且可以在语义上获得与搜索条件一致的搜索结果。此外,还对检索结果进行了相关度排序。
{"title":"Semantic query expansion method for food safety domain","authors":"Bowei He, Yuehua Yang, Junping Du","doi":"10.1109/ICSESS.2012.6269402","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269402","url":null,"abstract":"This paper presents a ontology-based semantic query expansion method. This method takes the food safety domain as a background and combines concepts similarity computation model. Firstly, the ontology-based representation method for food safety domain knowledge is proposed. Then, the expansion of queries is realized by the semantic relationships in food safety ontology and the expansion of the lexicon for words segmentation. Finally, concepts similarity computation model is applied to set the expansion range of domain concepts. Experimental results show that this method can not only obtain the search results consistent with the search conditions in the grammatical form, but also obtain the results semantically consistent with the search conditions. Besides, the retrieval results have been sorted according to the relevance.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"182 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133870975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2012 IEEE International Conference on Computer Science and Automation Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1