Guoqing Ma, Gang Zhao, Minhuan Huang, Dongxia Wang
Geographical opportunistic dissemination scheme in an urban setting has a lot of potential applications range from daily services like advertising and local weather forecast to safety-related services such as fire/accident warning. These applications share several unique characteristics such as location-based address of nodes and maintaining in an area for a specific time. However, all existing solutions fail to take into account these characteristics.In this paper, we propose a novel opportunistic information dissemination scheme via metropolitan bus networks. The scheme firstly makes use of geographical information like street map and bus route to convert information dissemination within a specific area to opportunistic multicast to non-overlapped road segments. A probabilistic routing protocol based on closest distance predictability is presented to multicast the message to its multiple destination road segments and then disseminate to roadside users. We use dissemination ratio and number of replicas as metrics to evaluate the performance of the scheme. And the simulation results show that the proposed dissemination scheme achieves high dissemination ratio when the number of buses is enough with an acceptable number of replicas (network overhead).
{"title":"Opportunistic Geographical Information Dissemination via Public Transportation Networks","authors":"Guoqing Ma, Gang Zhao, Minhuan Huang, Dongxia Wang","doi":"10.1109/FITME.2008.154","DOIUrl":"https://doi.org/10.1109/FITME.2008.154","url":null,"abstract":"Geographical opportunistic dissemination scheme in an urban setting has a lot of potential applications range from daily services like advertising and local weather forecast to safety-related services such as fire/accident warning. These applications share several unique characteristics such as location-based address of nodes and maintaining in an area for a specific time. However, all existing solutions fail to take into account these characteristics.In this paper, we propose a novel opportunistic information dissemination scheme via metropolitan bus networks. The scheme firstly makes use of geographical information like street map and bus route to convert information dissemination within a specific area to opportunistic multicast to non-overlapped road segments. A probabilistic routing protocol based on closest distance predictability is presented to multicast the message to its multiple destination road segments and then disseminate to roadside users. We use dissemination ratio and number of replicas as metrics to evaluate the performance of the scheme. And the simulation results show that the proposed dissemination scheme achieves high dissemination ratio when the number of buses is enough with an acceptable number of replicas (network overhead).","PeriodicalId":218182,"journal":{"name":"2008 International Seminar on Future Information Technology and Management Engineering","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121217521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper the idea of active security situation sensing is introduced. The active security situation sensor which is different from the traditional sensor such as firewall or IDS, can capture attack intention and predict attack trends before attack occurs to productive system. The design and implementation of our A3S are described, and the whole system of security situational awareness is also simply introduced.
{"title":"The Active Security Situation Sensor for Network","authors":"Dongxia Wang, Gang Zhao, Guoqing Ma","doi":"10.1109/FITME.2008.153","DOIUrl":"https://doi.org/10.1109/FITME.2008.153","url":null,"abstract":"In this paper the idea of active security situation sensing is introduced. The active security situation sensor which is different from the traditional sensor such as firewall or IDS, can capture attack intention and predict attack trends before attack occurs to productive system. The design and implementation of our A3S are described, and the whole system of security situational awareness is also simply introduced.","PeriodicalId":218182,"journal":{"name":"2008 International Seminar on Future Information Technology and Management Engineering","volume":"494 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131482329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Optimization is a classical problem in graph theory, and lots of researchers are working on the complexity of complex networks. We visualize and analyze some countriespsila national highway networks with Pajek and Ucinet, and find that they share several universal topological properties: tending to choose short edges, average degree is smaller than 4, small clustering coefficient and large diameter, and the degree distribution can be expressed in a general formula. All of above characteristics attribute to 2-dimension of the spatial network. Then we modify the optimization model from the economic viewpoint and use genetic algorithm to optimize the networks, which is proved useful and effective.
{"title":"Complexity and Optimization Analysis of Spatial Network","authors":"Jin Li, Junhai Ma","doi":"10.1109/FITME.2008.51","DOIUrl":"https://doi.org/10.1109/FITME.2008.51","url":null,"abstract":"Optimization is a classical problem in graph theory, and lots of researchers are working on the complexity of complex networks. We visualize and analyze some countriespsila national highway networks with Pajek and Ucinet, and find that they share several universal topological properties: tending to choose short edges, average degree is smaller than 4, small clustering coefficient and large diameter, and the degree distribution can be expressed in a general formula. All of above characteristics attribute to 2-dimension of the spatial network. Then we modify the optimization model from the economic viewpoint and use genetic algorithm to optimize the networks, which is proved useful and effective.","PeriodicalId":218182,"journal":{"name":"2008 International Seminar on Future Information Technology and Management Engineering","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133414619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Service monitoring is a very important part of Manufacturing Grid (MG). Our research work is aiming at MG service monitoring process. MG service monitoring modules and other four modules: User interface, detect, status messages index and status messages trigger are discussed, and the flow of service monitoring is analyzed in this paper. Service monitoring methods grounding on eight-segment monitoring command word are put forward, and the format of the monitoring command word and its status messages trigger methods are focused on. Finally, practical evidence is provided.
{"title":"Research on Service Monitoring Methods of Manufacturing Grid Based on Monitoring Command Word","authors":"Chunquan Li, Wenhan Wang, Y. Shang","doi":"10.1109/FITME.2008.156","DOIUrl":"https://doi.org/10.1109/FITME.2008.156","url":null,"abstract":"Service monitoring is a very important part of Manufacturing Grid (MG). Our research work is aiming at MG service monitoring process. MG service monitoring modules and other four modules: User interface, detect, status messages index and status messages trigger are discussed, and the flow of service monitoring is analyzed in this paper. Service monitoring methods grounding on eight-segment monitoring command word are put forward, and the format of the monitoring command word and its status messages trigger methods are focused on. Finally, practical evidence is provided.","PeriodicalId":218182,"journal":{"name":"2008 International Seminar on Future Information Technology and Management Engineering","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133962975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to enforce the sensing performance of mobile sensor network (MSN), an enhanced self-deployment (ESD) algorithm is proposed in this paper. By designing the virtual repulsive force between nodes, the movement equation and the virtual attracting-field in the sensing area, the problems of the network partition and coverage holes which are aroused by conventional potential-field-based deployment approach is solved. Simulation results show that ESD algorithm exhibits excellent performance and expands the generalization of MSN greatly.
{"title":"An Enhanced Self-deployment Algorithm in Mobile Sensor Network","authors":"Minghua Yang, Yuanda Cao, Li Tan, Jiong Yu","doi":"10.1109/FITME.2008.128","DOIUrl":"https://doi.org/10.1109/FITME.2008.128","url":null,"abstract":"In order to enforce the sensing performance of mobile sensor network (MSN), an enhanced self-deployment (ESD) algorithm is proposed in this paper. By designing the virtual repulsive force between nodes, the movement equation and the virtual attracting-field in the sensing area, the problems of the network partition and coverage holes which are aroused by conventional potential-field-based deployment approach is solved. Simulation results show that ESD algorithm exhibits excellent performance and expands the generalization of MSN greatly.","PeriodicalId":218182,"journal":{"name":"2008 International Seminar on Future Information Technology and Management Engineering","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134006910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The contribution of knowledge management to the process of decision making has been largely ignored by researchers from the fields of both decision theories and knowledge management. Firstly this paper highlights the importance of organizational decision knowledge system. Then decision makerpsilas learning behaviors and the mechanism of knowledge intervention have been analyzed and introduced. Thirdly this paper discusses the concept of total decision support (TDS) for improving the effect of decision making and compares total decision support and traditional decision support system (DSS) from several aspects. Based on the above analysis we put forward the research framework of total decision support and point out the future work.
{"title":"The Framework of Total Decision Support Based on Knowledge Management","authors":"Yinghong Zhong","doi":"10.1109/FITME.2008.61","DOIUrl":"https://doi.org/10.1109/FITME.2008.61","url":null,"abstract":"The contribution of knowledge management to the process of decision making has been largely ignored by researchers from the fields of both decision theories and knowledge management. Firstly this paper highlights the importance of organizational decision knowledge system. Then decision makerpsilas learning behaviors and the mechanism of knowledge intervention have been analyzed and introduced. Thirdly this paper discusses the concept of total decision support (TDS) for improving the effect of decision making and compares total decision support and traditional decision support system (DSS) from several aspects. Based on the above analysis we put forward the research framework of total decision support and point out the future work.","PeriodicalId":218182,"journal":{"name":"2008 International Seminar on Future Information Technology and Management Engineering","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114005124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Across-district emergency response is the mode of calling for different geographical emergency department to respond as a united system when the response area is insufficient force in tackling emergency situations. In this paper, which major in database layer and application layer, presents a scheme of emergency response transaction and information sharing system based on WebGIS and service technology. The emergency response information sharing system's database is composed of spatial data and attribute data. And there is especial an issue database, which is used for promulgate the emergency response data. ArcIMS is used to connect and management the data center and clients. ArcIMS application server in charge of receiving clients' requests, load balance, service management and pass the request to special data server. The spatial data server processes the requests and then returns the data to client using ArcXML message style. ArcIMS supports lots of terminal types include HTML browser, JAVA browser and GIS browser, etc.
{"title":"The Study on Spatial Data of Across-district Emergency Response Information Sharing System","authors":"Jing Liu","doi":"10.1109/FITME.2008.52","DOIUrl":"https://doi.org/10.1109/FITME.2008.52","url":null,"abstract":"Across-district emergency response is the mode of calling for different geographical emergency department to respond as a united system when the response area is insufficient force in tackling emergency situations. In this paper, which major in database layer and application layer, presents a scheme of emergency response transaction and information sharing system based on WebGIS and service technology. The emergency response information sharing system's database is composed of spatial data and attribute data. And there is especial an issue database, which is used for promulgate the emergency response data. ArcIMS is used to connect and management the data center and clients. ArcIMS application server in charge of receiving clients' requests, load balance, service management and pass the request to special data server. The spatial data server processes the requests and then returns the data to client using ArcXML message style. ArcIMS supports lots of terminal types include HTML browser, JAVA browser and GIS browser, etc.","PeriodicalId":218182,"journal":{"name":"2008 International Seminar on Future Information Technology and Management Engineering","volume":"16 1-2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114048455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A diameter-age model was developed for dahurian larch (Larix gmelinii. Rupr.) in northeastern China based on Chapman-Richards growth model using nonlinear mixed-effects modeling approach. The methods of model development include which parameters should be considered to be random and which should be purely fixed, as well as procedures for determining autoregressive correlation structures. Model performance was evaluated utilizing information criterion statistics (AIC, BIC, and LRT). The Chapman-Richards model with two random parameters showed the best performance. The inclusion of autoregressive models (AR(p), MA(q), ARMA(p,q)) in the mixed-effects model resulted in a significant improvement of model fitting statistics.
{"title":"Modeling Tree Diameter Growth Using Nonlinear Mixed-Effects Models","authors":"Lichun Jiang, Fengri Li","doi":"10.1109/FITME.2008.141","DOIUrl":"https://doi.org/10.1109/FITME.2008.141","url":null,"abstract":"A diameter-age model was developed for dahurian larch (Larix gmelinii. Rupr.) in northeastern China based on Chapman-Richards growth model using nonlinear mixed-effects modeling approach. The methods of model development include which parameters should be considered to be random and which should be purely fixed, as well as procedures for determining autoregressive correlation structures. Model performance was evaluated utilizing information criterion statistics (AIC, BIC, and LRT). The Chapman-Richards model with two random parameters showed the best performance. The inclusion of autoregressive models (AR(p), MA(q), ARMA(p,q)) in the mixed-effects model resulted in a significant improvement of model fitting statistics.","PeriodicalId":218182,"journal":{"name":"2008 International Seminar on Future Information Technology and Management Engineering","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124823929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Currently, there exist different trust models in peer-to-peer application. Each model has an abundance of trust information about trust and reputation attributes which are needed for establishing trust between peers. These trust models canpsilat be easily interoperable due to no approach for integrating in a semantic way the trust information from different models. Integrating trust information in a semantic way is a significant step towards the realization of trust models interoperability in an open system such as Web where resource providers and users are often strangers to one another and universal and correct expressiveness of trust information will be crucial. Therefore, this paper proposes an ontology-based approach for integrating trust information models. Additionally, it is also useful for simplifying security policies specification and protecting sensitive information.
{"title":"An Approach for Integrating Trust Information Model","authors":"Xu Wu, Jingsha He, Fei Xu","doi":"10.1109/FITME.2008.24","DOIUrl":"https://doi.org/10.1109/FITME.2008.24","url":null,"abstract":"Currently, there exist different trust models in peer-to-peer application. Each model has an abundance of trust information about trust and reputation attributes which are needed for establishing trust between peers. These trust models canpsilat be easily interoperable due to no approach for integrating in a semantic way the trust information from different models. Integrating trust information in a semantic way is a significant step towards the realization of trust models interoperability in an open system such as Web where resource providers and users are often strangers to one another and universal and correct expressiveness of trust information will be crucial. Therefore, this paper proposes an ontology-based approach for integrating trust information models. Additionally, it is also useful for simplifying security policies specification and protecting sensitive information.","PeriodicalId":218182,"journal":{"name":"2008 International Seminar on Future Information Technology and Management Engineering","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122116287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the process of risk investment decision-making, real option which is one of the key issues in the research of finance engineering is very important to enforce flexibility of management decision. As for appraising methodology, the real option approach is used. However, The investment circumstance is always vague. That is to say, the information we need is incomplete. The uncertainty influences the real option valuation by all appearances. In this paper we take into account the uncertainty of the up and down jump factors of underling assets, which are estimated by triangular fuzzy numbers. While pricing for the real option, we use the binomial model and the risk-neutral valuation approach, and then derive the risk-neutral probability intervals. As a result, we obtain a decision-making model for risk investment projects under vague circumstance. It is beneficial for the evaluation of risk-investment and useful for avoiding the mistaken investment decision-making.Finality, we provide a corresponding example analysis.
{"title":"Fuzzy Decision-Making Model for Risk Investment Projects","authors":"Z. Sheng","doi":"10.1109/FITME.2008.58","DOIUrl":"https://doi.org/10.1109/FITME.2008.58","url":null,"abstract":"In the process of risk investment decision-making, real option which is one of the key issues in the research of finance engineering is very important to enforce flexibility of management decision. As for appraising methodology, the real option approach is used. However, The investment circumstance is always vague. That is to say, the information we need is incomplete. The uncertainty influences the real option valuation by all appearances. In this paper we take into account the uncertainty of the up and down jump factors of underling assets, which are estimated by triangular fuzzy numbers. While pricing for the real option, we use the binomial model and the risk-neutral valuation approach, and then derive the risk-neutral probability intervals. As a result, we obtain a decision-making model for risk investment projects under vague circumstance. It is beneficial for the evaluation of risk-investment and useful for avoiding the mistaken investment decision-making.Finality, we provide a corresponding example analysis.","PeriodicalId":218182,"journal":{"name":"2008 International Seminar on Future Information Technology and Management Engineering","volume":"06 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129486274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}