Passive localization using TDOA and FDOA measurements usually does not have direct solution and requires numerical methods to determine the emitter's geolocation. We examine a satellite passive localization method based on particle swarm optimization(PSO), which provides an evolutionary computation method to solve the nonlinear optimal problem. However, PSO can not be straightforwardly applied to satellite passive localization because it is a constrained nonlinear optimal problem when using the constraint condition of the earth surface. We suggest "flying" the particle swarm directly using the earth surface constraint. Computer simulation results show the effectiveness of the new localization method.
{"title":"PSO Based Passive Satellite Localization Using TDOA and FDOA Measurements","authors":"Y. Bin, Qiu Yan, Lu An Nan","doi":"10.1109/ICIS.2011.47","DOIUrl":"https://doi.org/10.1109/ICIS.2011.47","url":null,"abstract":"Passive localization using TDOA and FDOA measurements usually does not have direct solution and requires numerical methods to determine the emitter's geolocation. We examine a satellite passive localization method based on particle swarm optimization(PSO), which provides an evolutionary computation method to solve the nonlinear optimal problem. However, PSO can not be straightforwardly applied to satellite passive localization because it is a constrained nonlinear optimal problem when using the constraint condition of the earth surface. We suggest \"flying\" the particle swarm directly using the earth surface constraint. Computer simulation results show the effectiveness of the new localization method.","PeriodicalId":256762,"journal":{"name":"2011 10th IEEE/ACIS International Conference on Computer and Information Science","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115253931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Optimization algorithms are very important in product design. They could be divided into two classes: traditional local search methods and heuristic global ones. Sequential quadratic programming (SQP) algorithm has been known as one of the most prominent and fastest methods, but its local exploitation characteristic leads to the fact that it could be easily trapped by local optimum. However, heuristic methods such as differential evolution (DE) possess better convergence quality although their convergence speed is not good enough. This paper proposes a hybrid differential evolution and sequential quadratic programming algorithm, denoted as DE-SQP. At first, SQP adopts active set method and range space method to solve quadratic programming problems. Then, SQP is combined with DE. Experiments using benchmark optimization problems and engineering design problems are presented and DE-SQP is compared with other global optimization algorithms. Results demonstrate that DE-SQP is reliable, effective and efficient.
{"title":"Hybrid Differential Evolution and Sequential Quadratic Programming Algorithm","authors":"Wenhui Shou, Wenhui Fan, Zhenxiao Gao, Boyuan Liu","doi":"10.1109/ICIS.2011.10","DOIUrl":"https://doi.org/10.1109/ICIS.2011.10","url":null,"abstract":"Optimization algorithms are very important in product design. They could be divided into two classes: traditional local search methods and heuristic global ones. Sequential quadratic programming (SQP) algorithm has been known as one of the most prominent and fastest methods, but its local exploitation characteristic leads to the fact that it could be easily trapped by local optimum. However, heuristic methods such as differential evolution (DE) possess better convergence quality although their convergence speed is not good enough. This paper proposes a hybrid differential evolution and sequential quadratic programming algorithm, denoted as DE-SQP. At first, SQP adopts active set method and range space method to solve quadratic programming problems. Then, SQP is combined with DE. Experiments using benchmark optimization problems and engineering design problems are presented and DE-SQP is compared with other global optimization algorithms. Results demonstrate that DE-SQP is reliable, effective and efficient.","PeriodicalId":256762,"journal":{"name":"2011 10th IEEE/ACIS International Conference on Computer and Information Science","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122599987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Trusted Platform Module (TPM) is an embedded cryptographic processor and non-volatile storage device which designed to be tamper-proof. There are many sensitive data in the TPM. We present a sensitive data backup and recovery mechanism in the TPM used in some abnormal situations such as power outage to ensure the data consistency and analyze the feasibility of this mechanism in detail. Besides, we use the backup stack and mark zone cyclically to avoid hardware malfunction in this mechanism.
{"title":"Keep Consistency: A Data Backup and Recovery Mechanism in TPM","authors":"Yumeng Feng, Guangyuan Shi","doi":"10.1109/ICIS.2011.21","DOIUrl":"https://doi.org/10.1109/ICIS.2011.21","url":null,"abstract":"The Trusted Platform Module (TPM) is an embedded cryptographic processor and non-volatile storage device which designed to be tamper-proof. There are many sensitive data in the TPM. We present a sensitive data backup and recovery mechanism in the TPM used in some abnormal situations such as power outage to ensure the data consistency and analyze the feasibility of this mechanism in detail. Besides, we use the backup stack and mark zone cyclically to avoid hardware malfunction in this mechanism.","PeriodicalId":256762,"journal":{"name":"2011 10th IEEE/ACIS International Conference on Computer and Information Science","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128345243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
For human observation and advanced processing in actual applications, the gray-scale range expansion and scenery contrast improvement are the key problems of IR image processing. Aiming at the problems, by analyzing the IR image characters and human visual system, an IR image gray-scale transformation algorithm based on human visual system (HVSBGT) is proposed. The algorithm is combined threshold division and non-linear gray-scale transformation. The experiments of actual IR images from staring cooled and un-cooled medium wave IRFPA thermal imagers show that the proposed algorithm is effective on expanding the gray-scale range and improving the scenery contrast. Using the algorithm, the IR image entropy is increased and better than those using traditional algorithms. Meanwhile, by setting different thresholds, the sky background is inhibited and some object details are enhanced partially such as buildings, water surface and plants. For digital signal processor (DSP) hardware processing, a large number of exponential and logarithmic operations are simplified by using gray-scale mapping table. The HVSBGT algorithm can provide high quality IR images for subjective observation and lay a foundation for advanced algorithms. The realization of HVSBGT algorithm is of great value and practical significance for the thermal imaging systems and equipments.
{"title":"An IR Image Gray-Scale Transformation Algorithm Based on Human Visual System","authors":"Yang Cao, Weiqi Jin, Chongliang Liu, Xiu Liu","doi":"10.1109/ICIS.2011.39","DOIUrl":"https://doi.org/10.1109/ICIS.2011.39","url":null,"abstract":"For human observation and advanced processing in actual applications, the gray-scale range expansion and scenery contrast improvement are the key problems of IR image processing. Aiming at the problems, by analyzing the IR image characters and human visual system, an IR image gray-scale transformation algorithm based on human visual system (HVSBGT) is proposed. The algorithm is combined threshold division and non-linear gray-scale transformation. The experiments of actual IR images from staring cooled and un-cooled medium wave IRFPA thermal imagers show that the proposed algorithm is effective on expanding the gray-scale range and improving the scenery contrast. Using the algorithm, the IR image entropy is increased and better than those using traditional algorithms. Meanwhile, by setting different thresholds, the sky background is inhibited and some object details are enhanced partially such as buildings, water surface and plants. For digital signal processor (DSP) hardware processing, a large number of exponential and logarithmic operations are simplified by using gray-scale mapping table. The HVSBGT algorithm can provide high quality IR images for subjective observation and lay a foundation for advanced algorithms. The realization of HVSBGT algorithm is of great value and practical significance for the thermal imaging systems and equipments.","PeriodicalId":256762,"journal":{"name":"2011 10th IEEE/ACIS International Conference on Computer and Information Science","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125407224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ontology has emerged as one of the rapidly growing method for meaningful knowledge representation. Realizing the potential of Semantic Web, Web Ontology Language (OWL) has provided a standard notation for creating Ontologies, while SWRL has provided the notation for defining rules to build new knowledge bases for the web applications. However, need for an efficient query Language for Ontologies is still unaddressed. In this paper we present ROQL, a Rule-based Ontology Query Language for creation and querying Ontologies based on the semantics of OWL 2.0 and syntax of SQL and SPARQL. With ROQL we provide abstract syntax to work with Ontologies. Compared with off-the-shelf query languages, we offer the support for creating, updating, and selecting knowledge from Ontology based knowledge bases with considerably more efficiently and flexibly. In addition to the clear and easy syntax, ROQL provides the possibility for defining rules in queries while selecting and inferring knowledge.
{"title":"4th Generation Flexible Query Language for Ontology Querying","authors":"M. Shoaib, A. Basharat","doi":"10.1109/ICIS.2011.60","DOIUrl":"https://doi.org/10.1109/ICIS.2011.60","url":null,"abstract":"Ontology has emerged as one of the rapidly growing method for meaningful knowledge representation. Realizing the potential of Semantic Web, Web Ontology Language (OWL) has provided a standard notation for creating Ontologies, while SWRL has provided the notation for defining rules to build new knowledge bases for the web applications. However, need for an efficient query Language for Ontologies is still unaddressed. In this paper we present ROQL, a Rule-based Ontology Query Language for creation and querying Ontologies based on the semantics of OWL 2.0 and syntax of SQL and SPARQL. With ROQL we provide abstract syntax to work with Ontologies. Compared with off-the-shelf query languages, we offer the support for creating, updating, and selecting knowledge from Ontology based knowledge bases with considerably more efficiently and flexibly. In addition to the clear and easy syntax, ROQL provides the possibility for defining rules in queries while selecting and inferring knowledge.","PeriodicalId":256762,"journal":{"name":"2011 10th IEEE/ACIS International Conference on Computer and Information Science","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116817209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Concerning of the website group system, this paper proposes a new solution of graduation authorization management, which can improve the efficiency of resources management, optimize the distribution of management permissions and improve the efficiency of foreground permission check. This paper analyzes the properties and limitations of several common website group systems in permission management and introduces this solution's improved design ideas and key techniques, including fast generation algorithm of pruning channel tree, roles filtering, stage-by-stage permission filtering, concurrency collision avoidance, etc. This solution is successfully applied in the new version of Tsinghua University information release system.
{"title":"Solutions of Permissions Management for Website Group System Based on Graduation Authorization","authors":"S. Liang, Xinyu Zhang","doi":"10.1109/ICIS.2011.54","DOIUrl":"https://doi.org/10.1109/ICIS.2011.54","url":null,"abstract":"Concerning of the website group system, this paper proposes a new solution of graduation authorization management, which can improve the efficiency of resources management, optimize the distribution of management permissions and improve the efficiency of foreground permission check. This paper analyzes the properties and limitations of several common website group systems in permission management and introduces this solution's improved design ideas and key techniques, including fast generation algorithm of pruning channel tree, roles filtering, stage-by-stage permission filtering, concurrency collision avoidance, etc. This solution is successfully applied in the new version of Tsinghua University information release system.","PeriodicalId":256762,"journal":{"name":"2011 10th IEEE/ACIS International Conference on Computer and Information Science","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116714339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hainan Ecological Software Park, as the Hainan tourist informatization industry base, is the technical support platform to ensure establishing an international tourist island. In this paper, a management model of software park design is proposed based on cloud computing service architecture. The proposed model can help to optimize resource allocation, reduce software development cost, create a coordinated and standardized software development environment.
{"title":"Design of Hainan Ecological Software Park Management Model Based on Cloud Computing","authors":"J. Zhong","doi":"10.1109/ICIS.2011.69","DOIUrl":"https://doi.org/10.1109/ICIS.2011.69","url":null,"abstract":"Hainan Ecological Software Park, as the Hainan tourist informatization industry base, is the technical support platform to ensure establishing an international tourist island. In this paper, a management model of software park design is proposed based on cloud computing service architecture. The proposed model can help to optimize resource allocation, reduce software development cost, create a coordinated and standardized software development environment.","PeriodicalId":256762,"journal":{"name":"2011 10th IEEE/ACIS International Conference on Computer and Information Science","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127081397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Based on enzyme sequence information and predicted secondary structure information as feature parameters, by using support vector machine (SVM), a novel method for identifying the ¦Â-hairpin motifs in enzymes is proposed. The method is trained and tested on an enzymes database of 4030 ¦Â-hairpins and 1780 non-¦Â-hairpins. For training dataset in 5-fold cross-validation, the overall accuracy is 91.00%, Matthew's correlation coefficient (MCC) is 0.79, and for testing dataset in independent test, the overall accuracy is 88.93%, MCC is 0.76. In addition, this method has been further used to predict 1345 ¦Â-hairpins which contain ligand binding sites. For training dataset in 5-fold cross-validation and for testing dataset in independent test, the overall accuracy reach 89.28% and 88.79%, MCC are 0.77 and 0.74, respectively.
以酶序列信息和预测的二级结构信息为特征参数,利用支持向量机(SVM),提出了一种识别酶中Â-hairpin基序的新方法。该方法在4030 μ t Â-hairpins和1780 μ t Â-hairpins的酶数据库上进行了训练和测试。对于5倍交叉验证的训练数据集,总体准确率为91.00%,马修相关系数(MCC)为0.79;对于独立测试的测试数据集,总体准确率为88.93%,MCC为0.76。此外,该方法还用于预测含有配体结合位点的1345 μ t Â-hairpins。对于5倍交叉验证的训练数据集和独立测试的测试数据集,总体准确率达到89.28%和88.79%,MCC分别为0.77和0.74。
{"title":"Identifying the ß-Hairpin Motifs in Enzymes by Using Support Vector Machine","authors":"Xingxing Liu, Xiuzhen Hu","doi":"10.1109/ICIS.2011.12","DOIUrl":"https://doi.org/10.1109/ICIS.2011.12","url":null,"abstract":"Based on enzyme sequence information and predicted secondary structure information as feature parameters, by using support vector machine (SVM), a novel method for identifying the ¦Â-hairpin motifs in enzymes is proposed. The method is trained and tested on an enzymes database of 4030 ¦Â-hairpins and 1780 non-¦Â-hairpins. For training dataset in 5-fold cross-validation, the overall accuracy is 91.00%, Matthew's correlation coefficient (MCC) is 0.79, and for testing dataset in independent test, the overall accuracy is 88.93%, MCC is 0.76. In addition, this method has been further used to predict 1345 ¦Â-hairpins which contain ligand binding sites. For training dataset in 5-fold cross-validation and for testing dataset in independent test, the overall accuracy reach 89.28% and 88.79%, MCC are 0.77 and 0.74, respectively.","PeriodicalId":256762,"journal":{"name":"2011 10th IEEE/ACIS International Conference on Computer and Information Science","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128921681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Newcomers¡¦ socialization is an important issue to organizations. It wastes finances if they have to recruit new members again and again. Nowadays, Intranet applications provide a new format by which companies can take advantage. Intranet is a popular in house system used within the company. Intranet use is unavoidable when new staff members begin their job. It¡¦s possible to help keep newcomers from changing positions by using the Intranet to improve their socialization. This study aims to understand how Intranet information affects information-seeking behavior in the process of newcomers¡¦ organizational socialization. The results are as follows: (1) From an information perspective, newcomers are passive in receiving information via the Intranet. Newcomers primarily get reference information from the Intranet, followed by appraisal information, and then relationship information. It¡¦s helpful for understanding their job as well as the organization and history of organizational socialization. (2) From a communication perspective, the newcomers are aggressive in seeking information from the Intranet. Most newcomers primarily get relationship information, followed by reference information, and then appraisal information from the Intranet. It¡¦s helpful in understanding the task proficiency requirements, people, language and politics of organizational socialization. The study conclusions show that the Intranet system is helpful in information seeking and socialization from both information and communication perspectives. Also, information and communication perspectives are complementary to each other in regard to newcomer socialization. Constructing an excellent Intranet system will improve newcomers¡¦ socialization better and faster. The Intranet can become a useful and people-inclusive socialization environment.
{"title":"Newcomers' Socialization by Intranet System","authors":"Ling-E. Chang, Shang-Ping Lin","doi":"10.1109/ICIS.2011.45","DOIUrl":"https://doi.org/10.1109/ICIS.2011.45","url":null,"abstract":"Newcomers¡¦ socialization is an important issue to organizations. It wastes finances if they have to recruit new members again and again. Nowadays, Intranet applications provide a new format by which companies can take advantage. Intranet is a popular in house system used within the company. Intranet use is unavoidable when new staff members begin their job. It¡¦s possible to help keep newcomers from changing positions by using the Intranet to improve their socialization. This study aims to understand how Intranet information affects information-seeking behavior in the process of newcomers¡¦ organizational socialization. The results are as follows: (1) From an information perspective, newcomers are passive in receiving information via the Intranet. Newcomers primarily get reference information from the Intranet, followed by appraisal information, and then relationship information. It¡¦s helpful for understanding their job as well as the organization and history of organizational socialization. (2) From a communication perspective, the newcomers are aggressive in seeking information from the Intranet. Most newcomers primarily get relationship information, followed by reference information, and then appraisal information from the Intranet. It¡¦s helpful in understanding the task proficiency requirements, people, language and politics of organizational socialization. The study conclusions show that the Intranet system is helpful in information seeking and socialization from both information and communication perspectives. Also, information and communication perspectives are complementary to each other in regard to newcomer socialization. Constructing an excellent Intranet system will improve newcomers¡¦ socialization better and faster. The Intranet can become a useful and people-inclusive socialization environment.","PeriodicalId":256762,"journal":{"name":"2011 10th IEEE/ACIS International Conference on Computer and Information Science","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134521659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper aims to discuss some of the potential legal issues when hotel companies in Macao sell their hotel rooms over their own websites, namely, terms and conditions, the protection of personal information and the provision of security facilities. Little is known by way of research of potential online legal issues in the tourism industry of Macao, this paper attempts to supplement the limited existing work. The 5-star grouping of hotels in Macao is more able or willing to achieve the desired level of legal protection within their websites whereas the 3-star grouping of hotels has much more ground to cover. Attention to issues such as addressing personal data protection online and adopting appropriate security measures when taking and holding sensitive data of hotel guests should be given more considerable priority within this grouping of service providers.
{"title":"A Discussion on the Legal Issues When Selling Hotel Rooms Online: A Case of Macao","authors":"Loi Mei Kun","doi":"10.1109/ICIS.2011.31","DOIUrl":"https://doi.org/10.1109/ICIS.2011.31","url":null,"abstract":"This paper aims to discuss some of the potential legal issues when hotel companies in Macao sell their hotel rooms over their own websites, namely, terms and conditions, the protection of personal information and the provision of security facilities. Little is known by way of research of potential online legal issues in the tourism industry of Macao, this paper attempts to supplement the limited existing work. The 5-star grouping of hotels in Macao is more able or willing to achieve the desired level of legal protection within their websites whereas the 3-star grouping of hotels has much more ground to cover. Attention to issues such as addressing personal data protection online and adopting appropriate security measures when taking and holding sensitive data of hotel guests should be given more considerable priority within this grouping of service providers.","PeriodicalId":256762,"journal":{"name":"2011 10th IEEE/ACIS International Conference on Computer and Information Science","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128748882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}