Manufacturing industry is challenged with the task of mass customization in a timely and cost-efficient manner. Knowledge Management (KM) can provide a new approach needed to manage intellectual capital as a valuable organizational resource for supporting customized preferences, so a framework of knowledge management for Mass Customization (MC) was developed. Knowledge management makes mass customization a more viable strategy for manufacturers as they work to meet changing customer needs and desires. The purpose of this research is to establish a Knowledge management framework Internet-based for mass customization to effectively analyze knowledge, provide solutions, support customer customization, evaluate the data and advance mass customization level.
{"title":"A Framework of Knowledge Management for Mass Customization Internet-Based","authors":"Tianhong Luo, Zhongkai Xiong, Yi-Ping Fang","doi":"10.1109/ISISE.2008.76","DOIUrl":"https://doi.org/10.1109/ISISE.2008.76","url":null,"abstract":"Manufacturing industry is challenged with the task of mass customization in a timely and cost-efficient manner. Knowledge Management (KM) can provide a new approach needed to manage intellectual capital as a valuable organizational resource for supporting customized preferences, so a framework of knowledge management for Mass Customization (MC) was developed. Knowledge management makes mass customization a more viable strategy for manufacturers as they work to meet changing customer needs and desires. The purpose of this research is to establish a Knowledge management framework Internet-based for mass customization to effectively analyze knowledge, provide solutions, support customer customization, evaluate the data and advance mass customization level.","PeriodicalId":209615,"journal":{"name":"2008 International Symposium on Information Science and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123316817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Knowledge Acquisition has been the focus in knowledge engineering for a long time. In this paper, knowledge acquisition technique based on structural analysis is formed by applying structural modeling, which is on basis of knowledge structural model. This technique can be applied to knowledge acquisition by dynamic interaction; and the new knowledge is related to the existing meta knowledge system. By enlighten of the existing knowledge, this method can automatically accomplish knowledge architecture and implicit relation acquisition. It is applied to Traditional Chinese Medicine (TCM) diagnosis and treatment knowledge acquisition in this paper; and the results show that the structural model not only indicates unknown relations, but also protrudes the structural relations of existing knowledge, thus making knowledge acquisition more efficient.
{"title":"Analysis on Interactive Structure of Knowledge Acquisition","authors":"Dezheng Zhang, A. Wulamu, Lixin Gao, Pin Shan","doi":"10.1109/ISISE.2008.328","DOIUrl":"https://doi.org/10.1109/ISISE.2008.328","url":null,"abstract":"Knowledge Acquisition has been the focus in knowledge engineering for a long time. In this paper, knowledge acquisition technique based on structural analysis is formed by applying structural modeling, which is on basis of knowledge structural model. This technique can be applied to knowledge acquisition by dynamic interaction; and the new knowledge is related to the existing meta knowledge system. By enlighten of the existing knowledge, this method can automatically accomplish knowledge architecture and implicit relation acquisition. It is applied to Traditional Chinese Medicine (TCM) diagnosis and treatment knowledge acquisition in this paper; and the results show that the structural model not only indicates unknown relations, but also protrudes the structural relations of existing knowledge, thus making knowledge acquisition more efficient.","PeriodicalId":209615,"journal":{"name":"2008 International Symposium on Information Science and Engineering","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115113369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper introduces a mathematical model for chunk parsing of Chinese sentence. Automatic identification of Chinese chunk is implemented by using BP network. Based on BP network, some new research methods and experiments on the input features are proposed and performed in this paper. The experimental results show that the full use of the known information can improve the accuracy of Chinese chunk identification.
{"title":"Automatic Identification of Chinese Chunk Based on BP Network","authors":"W. Xiaohua, Cheng Linghui, Wang Rongbo","doi":"10.1109/ISISE.2008.79","DOIUrl":"https://doi.org/10.1109/ISISE.2008.79","url":null,"abstract":"This paper introduces a mathematical model for chunk parsing of Chinese sentence. Automatic identification of Chinese chunk is implemented by using BP network. Based on BP network, some new research methods and experiments on the input features are proposed and performed in this paper. The experimental results show that the full use of the known information can improve the accuracy of Chinese chunk identification.","PeriodicalId":209615,"journal":{"name":"2008 International Symposium on Information Science and Engineering","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125151352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, coal mine accidents have happened frequently in our country. These bring high casualties and huge economic losses, and ring the alarm bell for our coal industry. The traditional coal mine gas monitoring system uses the method of wire network, because of the restriction of time and space flexibility in the wire network, it is impossible to build a wire system in short time. For real-time and unmanned guard monitoring the concentration of gas and lowering the potential safety hazard of mine, we design a gas monitoring system based on wireless sensor network. In this thesis, we analyze the energy efficiency of MAC protocols of this system, compare S-MAC protocol with T-MAC protocol, and research their working principles. Aiming at the energy efficiency, we establish the mathematical model and do the simulation with NS-2. The results of simulation illustrate that in the same condition T-MAC protocol consumes less energy and it can satisfy the latency of communication.
{"title":"The Research of Energy Efficient MAC Protocols in Gas Monitoring System of Mine","authors":"Hewei Yuan","doi":"10.1109/ISISE.2008.38","DOIUrl":"https://doi.org/10.1109/ISISE.2008.38","url":null,"abstract":"In recent years, coal mine accidents have happened frequently in our country. These bring high casualties and huge economic losses, and ring the alarm bell for our coal industry. The traditional coal mine gas monitoring system uses the method of wire network, because of the restriction of time and space flexibility in the wire network, it is impossible to build a wire system in short time. For real-time and unmanned guard monitoring the concentration of gas and lowering the potential safety hazard of mine, we design a gas monitoring system based on wireless sensor network. In this thesis, we analyze the energy efficiency of MAC protocols of this system, compare S-MAC protocol with T-MAC protocol, and research their working principles. Aiming at the energy efficiency, we establish the mathematical model and do the simulation with NS-2. The results of simulation illustrate that in the same condition T-MAC protocol consumes less energy and it can satisfy the latency of communication.","PeriodicalId":209615,"journal":{"name":"2008 International Symposium on Information Science and Engineering","volume":"436 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126112944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, a cluster based hybrid architecture is proposed which not only combines the advantages of both cluster and flat architecture, but also introduces how to use multiple communication models in wireless sensor networks(WSNs). Furthermore, the hybrid architecture uses multicast to solve the problem of ldquobroadcast blastrdquo, and adopts deployment of heterogeneous sensors to solve the problem of ldquohot spotrdquo. At last, performance analysis is proposed to indicate that the hybrid architecture has the properties of scalability, distribution, long life-time and robustness.
{"title":"A Cluster Based Hybrid Architecture for Wireless Sensor Networks","authors":"Yao Ye, V. Hilaire, A. Koukam, Cai Wandong","doi":"10.1109/ISISE.2008.66","DOIUrl":"https://doi.org/10.1109/ISISE.2008.66","url":null,"abstract":"In this paper, a cluster based hybrid architecture is proposed which not only combines the advantages of both cluster and flat architecture, but also introduces how to use multiple communication models in wireless sensor networks(WSNs). Furthermore, the hybrid architecture uses multicast to solve the problem of ldquobroadcast blastrdquo, and adopts deployment of heterogeneous sensors to solve the problem of ldquohot spotrdquo. At last, performance analysis is proposed to indicate that the hybrid architecture has the properties of scalability, distribution, long life-time and robustness.","PeriodicalId":209615,"journal":{"name":"2008 International Symposium on Information Science and Engineering","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115549002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
CFD numerical simulation has often been performed to analyze the characteristics of the fluid field and design the measurement device like flowmeter. It needs parallel compute to improve the efficiency. The most important factor in distributed computing is cost and the small scale cluster with multi-core CPU is very feasible for parallel computation of CFD simulation. A small scale cluster with multi-core CPU is set up to discuss the performance of parallel computation in CFD simulation. It is verified by a CFD test which simulates a flowmeter in a pipe flow field, the results show that the mesh cell scale of actual computation is very important for ideal results. They also show that our small scale cluster with multi-core CPU is of good scalability and very high efficiency.
{"title":"The Multi-Core CPU Parallel Computation for CFD Simulation of Flowmeter","authors":"Chen Jian-zhen, Liao Bin, Shen Dan-ping","doi":"10.1109/ISISE.2008.144","DOIUrl":"https://doi.org/10.1109/ISISE.2008.144","url":null,"abstract":"CFD numerical simulation has often been performed to analyze the characteristics of the fluid field and design the measurement device like flowmeter. It needs parallel compute to improve the efficiency. The most important factor in distributed computing is cost and the small scale cluster with multi-core CPU is very feasible for parallel computation of CFD simulation. A small scale cluster with multi-core CPU is set up to discuss the performance of parallel computation in CFD simulation. It is verified by a CFD test which simulates a flowmeter in a pipe flow field, the results show that the mesh cell scale of actual computation is very important for ideal results. They also show that our small scale cluster with multi-core CPU is of good scalability and very high efficiency.","PeriodicalId":209615,"journal":{"name":"2008 International Symposium on Information Science and Engineering","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114439402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Supplier lies in first node of SC (supply chain). Rational supplier evaluation and selection are important to the whole SC's agility and competition. Based on analysis of supplier management, supplier evaluation guide line is discussed in paper. Then neural network-based supplier evaluation model is established. BP dynamic neural network is applied in constructing model and the amelioration weight reset arithmetic is imported in supplier evaluation and selection model. Finally, service-oriented software development method is used to develop neural network-based supplier selection expert system. Supplierpsilas product, quality guarantee, product providing history, after service, qualification certificate and enterprise development potential are provided with Web service. Each supplier used this system to fill in its supply information in Internet. The information is transmitted to supplier evaluation and selection center through XML information. According to supplier selection and evaluation arithmetic, supplier evaluation and selection center computes supplier selection and evaluation result. Enterprise can select classic supplier based on supplier selection and evaluation result.
{"title":"The Study on Agile Supply Chain-based Supplier Selection and Evaluation","authors":"Jia Ju Wu, Gang Liu, Chuanyu Xi","doi":"10.1109/ISISE.2008.25","DOIUrl":"https://doi.org/10.1109/ISISE.2008.25","url":null,"abstract":"Supplier lies in first node of SC (supply chain). Rational supplier evaluation and selection are important to the whole SC's agility and competition. Based on analysis of supplier management, supplier evaluation guide line is discussed in paper. Then neural network-based supplier evaluation model is established. BP dynamic neural network is applied in constructing model and the amelioration weight reset arithmetic is imported in supplier evaluation and selection model. Finally, service-oriented software development method is used to develop neural network-based supplier selection expert system. Supplierpsilas product, quality guarantee, product providing history, after service, qualification certificate and enterprise development potential are provided with Web service. Each supplier used this system to fill in its supply information in Internet. The information is transmitted to supplier evaluation and selection center through XML information. According to supplier selection and evaluation arithmetic, supplier evaluation and selection center computes supplier selection and evaluation result. Enterprise can select classic supplier based on supplier selection and evaluation result.","PeriodicalId":209615,"journal":{"name":"2008 International Symposium on Information Science and Engineering","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116611937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A variety of cluster analysis techniques exist to group objects having similar characteristics. While there have been recent advances in algorithms for clustering data, some are unable to handle uncertainty in the clustering process while others have stability issues. This paper proposes a new algorithm for clustering data based on rough set theory, which has the ability to handle the uncertainty in the clustering process.
{"title":"An Algorithm for Clustering Data Based on Rough Set Theory","authors":"Shangzhi Wu","doi":"10.1109/ISISE.2008.71","DOIUrl":"https://doi.org/10.1109/ISISE.2008.71","url":null,"abstract":"A variety of cluster analysis techniques exist to group objects having similar characteristics. While there have been recent advances in algorithms for clustering data, some are unable to handle uncertainty in the clustering process while others have stability issues. This paper proposes a new algorithm for clustering data based on rough set theory, which has the ability to handle the uncertainty in the clustering process.","PeriodicalId":209615,"journal":{"name":"2008 International Symposium on Information Science and Engineering","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116730616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chunyan Ma, Junsheng Wu, Zhang Tao, Yunpeng Zhang, Xiaobin Cai
To generate test cases for the unit testing of business process written in BPEL, developers have to prepare input data for the BPEL process under test (PUT) and verification conditions for output data from the PUT. It could be a tedious task due to the complexity of the PUT which describes the Web flow of a distributed collaboration of individual service providers executing concurrently. This paper shows how Stream X-machine based testing techniques could be applied to automatically generate test cases for BPEL process.
{"title":"Testing BPEL with Stream X-Machine","authors":"Chunyan Ma, Junsheng Wu, Zhang Tao, Yunpeng Zhang, Xiaobin Cai","doi":"10.1109/ISISE.2008.201","DOIUrl":"https://doi.org/10.1109/ISISE.2008.201","url":null,"abstract":"To generate test cases for the unit testing of business process written in BPEL, developers have to prepare input data for the BPEL process under test (PUT) and verification conditions for output data from the PUT. It could be a tedious task due to the complexity of the PUT which describes the Web flow of a distributed collaboration of individual service providers executing concurrently. This paper shows how Stream X-machine based testing techniques could be applied to automatically generate test cases for BPEL process.","PeriodicalId":209615,"journal":{"name":"2008 International Symposium on Information Science and Engineering","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128476788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Incorporating knowledge into a statistical unsupervised model, an approach of semantic dependency analysis on Chinese is presented. Semantic units and part dependency relationships are identified based on knowledge first, and then analysis is given by training the unsupervised model with extended inside-outside algorithm. Despite F1 of the experiments is not better than that of supervised approach, it can be compared with the level of the state of the art unsupervised methods of SRL and the trouble of hand-annotated corpus is dispensed with. The experiments show the extended inside-outside algorithm can overcome the shortcomings of the original one such as expensive training costs, local maximum and unsatisfactory similarity with results given by linguists.
{"title":"Unsupervised Chinese Semantic Dependency Analysis","authors":"Shi Jing, Shi Xin","doi":"10.1109/ISISE.2008.67","DOIUrl":"https://doi.org/10.1109/ISISE.2008.67","url":null,"abstract":"Incorporating knowledge into a statistical unsupervised model, an approach of semantic dependency analysis on Chinese is presented. Semantic units and part dependency relationships are identified based on knowledge first, and then analysis is given by training the unsupervised model with extended inside-outside algorithm. Despite F1 of the experiments is not better than that of supervised approach, it can be compared with the level of the state of the art unsupervised methods of SRL and the trouble of hand-annotated corpus is dispensed with. The experiments show the extended inside-outside algorithm can overcome the shortcomings of the original one such as expensive training costs, local maximum and unsatisfactory similarity with results given by linguists.","PeriodicalId":209615,"journal":{"name":"2008 International Symposium on Information Science and Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128250016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}