首页 > 最新文献

2012 Fourth International Conference on Computational and Information Sciences最新文献

英文 中文
Study on Battle Damage Level Prediction Using Hybrid-learning Algorithm 基于混合学习算法的战斗损伤水平预测研究
Pub Date : 2012-09-13 DOI: 10.1109/ICCIS.2012.298
Cheng Zhang, Quan Shi, T. Liu, W. Zhao
It is important to predict battle damage level timely and accurately for operation commander to adjust firing action intent, issue command, control situations, and make decisions correctly. Adaptive neural fuzzy inference system (ANFIS) architecture and the hybrid-learning algorithm by applying back-propagation and least mean squares procedure are studied. ANFIS model for battle damage level prediction is established based on the analysis of the main influence factors of battle damage level. The prediction of battle damage level being consistent with the factual damage level is achieved by training the proposed ANFIS model using damage test data. Simulations comparing analysis for battle damage level prediction results are conducted using the proposed method and BP neutral network respectively. Simulation results demonstrate that the proposed method can predict battle damage level correctly and the precision is higher than that of BP neutral network, and thus may provide an effective method for battle damage level prediction.
及时准确地预测战损等级,对作战指挥员调整射击动作意图、发布指挥控制态势、正确决策具有重要意义。研究了自适应神经模糊推理系统(ANFIS)的体系结构以及基于反向传播和最小均二乘法的混合学习算法。在分析影响战损等级主要因素的基础上,建立了战损等级预测的ANFIS模型。利用损伤试验数据对所提出的ANFIS模型进行训练,实现了与实际损伤水平一致的战斗损伤水平预测。分别用该方法和BP神经网络对作战损伤等级预测结果进行了仿真对比分析。仿真结果表明,该方法能够正确预测战斗损伤等级,且精度高于BP神经网络,为战斗损伤等级预测提供了一种有效的方法。
{"title":"Study on Battle Damage Level Prediction Using Hybrid-learning Algorithm","authors":"Cheng Zhang, Quan Shi, T. Liu, W. Zhao","doi":"10.1109/ICCIS.2012.298","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.298","url":null,"abstract":"It is important to predict battle damage level timely and accurately for operation commander to adjust firing action intent, issue command, control situations, and make decisions correctly. Adaptive neural fuzzy inference system (ANFIS) architecture and the hybrid-learning algorithm by applying back-propagation and least mean squares procedure are studied. ANFIS model for battle damage level prediction is established based on the analysis of the main influence factors of battle damage level. The prediction of battle damage level being consistent with the factual damage level is achieved by training the proposed ANFIS model using damage test data. Simulations comparing analysis for battle damage level prediction results are conducted using the proposed method and BP neutral network respectively. Simulation results demonstrate that the proposed method can predict battle damage level correctly and the precision is higher than that of BP neutral network, and thus may provide an effective method for battle damage level prediction.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130999401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research of Online Education Ontology Model 在线教育本体模型研究
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.233
Lei Du, Guixing Zheng, Bo You, Xiankun Zhang, Lina Bai
In the past twenty years, online education has grown as a main part of current education. However, the unambiguous and uniform expression of online education is a crucial challenge. Since ontology is becoming a recognized vehicle for knowledge reuse, knowledge sharing and modeling, online education(OE_Onto) is designed by using ABC model as upper ontology in order to solve these problems. OE_Onto can provide the shared knowledge in semantics to achieve the cooperation and reuse between people and the different online education systems. In this paper, OE_Onto is respectively described in five-tuple involving the concepts, relations, functions, axioms and instances. Finally, the experiment of an online education process is completed to validate OE_Onto.
在过去的二十年里,在线教育已经发展成为当今教育的重要组成部分。然而,在线教育的明确和统一的表达是一个至关重要的挑战。由于本体正在成为知识重用、知识共享和知识建模的公认工具,为了解决这些问题,采用ABC模型作为上层本体设计了在线教育(OE_Onto)。OE_Onto可以提供语义上的共享知识,实现人和不同的在线教育系统之间的合作和重用。本文用五元组分别描述了OE_Onto,包括概念、关系、函数、公理和实例。最后,通过一个在线教育过程的实验来验证OE_Onto。
{"title":"Research of Online Education Ontology Model","authors":"Lei Du, Guixing Zheng, Bo You, Xiankun Zhang, Lina Bai","doi":"10.1109/ICCIS.2012.233","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.233","url":null,"abstract":"In the past twenty years, online education has grown as a main part of current education. However, the unambiguous and uniform expression of online education is a crucial challenge. Since ontology is becoming a recognized vehicle for knowledge reuse, knowledge sharing and modeling, online education(OE_Onto) is designed by using ABC model as upper ontology in order to solve these problems. OE_Onto can provide the shared knowledge in semantics to achieve the cooperation and reuse between people and the different online education systems. In this paper, OE_Onto is respectively described in five-tuple involving the concepts, relations, functions, axioms and instances. Finally, the experiment of an online education process is completed to validate OE_Onto.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115234838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Agent-Based Dynamic Order Acceptance Policy in Make-to-Order Manufacturing 订单制造中基于agent的动态订单接受策略
Juan Hao, Jianjun Yu
Order acceptance is a key success factor in make-to-order (MTO) manufacturing firms. In this work, in order to maximize average revenue in an infinite planning horizon, we use dynamic programming to model the order acceptance problem, and solve it with reinforcement learning approach. A novel approach for simulation-based development for dynamic order acceptance using average-reward reinforcement learning is proposed. Through the simulation, an intelligent decision policy to dynamically control the coming orders is learned by the agent. Comparisons made with First-Come-First-Serve (FCFS) highlight the effectiveness of the proposed novel approach to maximize the average revenue.
订单接受是订单制造企业成功的关键因素。在这项工作中,为了在无限规划范围内最大化平均收益,我们使用动态规划来建模订单接受问题,并使用强化学习方法来解决它。提出了一种利用平均奖励强化学习进行动态订单接受仿真开发的新方法。通过仿真,学习智能决策策略来动态控制即将到来的订单。与先到先得(FCFS)的比较突出了提出的新方法在最大化平均收入方面的有效性。
{"title":"Agent-Based Dynamic Order Acceptance Policy in Make-to-Order Manufacturing","authors":"Juan Hao, Jianjun Yu","doi":"10.1109/ICCIS.2012.60","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.60","url":null,"abstract":"Order acceptance is a key success factor in make-to-order (MTO) manufacturing firms. In this work, in order to maximize average revenue in an infinite planning horizon, we use dynamic programming to model the order acceptance problem, and solve it with reinforcement learning approach. A novel approach for simulation-based development for dynamic order acceptance using average-reward reinforcement learning is proposed. Through the simulation, an intelligent decision policy to dynamically control the coming orders is learned by the agent. Comparisons made with First-Come-First-Serve (FCFS) highlight the effectiveness of the proposed novel approach to maximize the average revenue.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124273354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on K Nearest Neighbor Non-parametric Regression Algorithm Based on KD-Tree and Clustering Analysis 基于KD-Tree和聚类分析的K近邻非参数回归算法研究
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.246
Zheng-Wu Yuan, Yuan-Hui Wang
Regarding to the limitations of the existing K nearest neighbor non-parametric regression methods, spatial autocorrelation analysis is used to determine the state vector in this paper. In order to improve the speed of searching data, this paper uses the method of clipping samples to reduce data storage and split the sample quickly by KD-Tree. It also reduces the search volume of the nearest neighbor through the pruning principle of KD-Tree, gets the subset by proportional sampling in the KD-Tree subset, and runs K-Means clustering multiple times. Then the optimal K value is selected which can improve the forecast error of the uniform K value on the traditional non-parametric regression. The experimental results show that improved forecasting method is superior to the traditional method.
针对现有K近邻非参数回归方法的局限性,本文采用空间自相关分析来确定状态向量。为了提高搜索数据的速度,本文采用样本裁剪的方法减少数据存储,并采用KD-Tree快速分割样本。利用KD-Tree的剪枝原理减少最近邻的搜索量,在KD-Tree子集中按比例采样得到子集,并多次运行K-Means聚类。然后选取最优K值,改善了传统非参数回归中均匀K值的预测误差。实验结果表明,改进的预测方法优于传统的预测方法。
{"title":"Research on K Nearest Neighbor Non-parametric Regression Algorithm Based on KD-Tree and Clustering Analysis","authors":"Zheng-Wu Yuan, Yuan-Hui Wang","doi":"10.1109/ICCIS.2012.246","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.246","url":null,"abstract":"Regarding to the limitations of the existing K nearest neighbor non-parametric regression methods, spatial autocorrelation analysis is used to determine the state vector in this paper. In order to improve the speed of searching data, this paper uses the method of clipping samples to reduce data storage and split the sample quickly by KD-Tree. It also reduces the search volume of the nearest neighbor through the pruning principle of KD-Tree, gets the subset by proportional sampling in the KD-Tree subset, and runs K-Means clustering multiple times. Then the optimal K value is selected which can improve the forecast error of the uniform K value on the traditional non-parametric regression. The experimental results show that improved forecasting method is superior to the traditional method.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127184514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
The Polar Parallel Coordinates Method for Time-Series Data Visualization 时间序列数据可视化的极平行坐标方法
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.334
C. Shenghui, Jiang Zhifang, Qiang Qi, Shuo Li, Xiangxu Meng
Parallel coordinates is a very important visualization method, but the dimensions it can express are limited by the length or width of the screen. In this paper, we present the polar parallel coordinates method. First, we define the polar parallel coordinates as the coordinate whose axes exist between the same degree and show the expression of the axis. We give the algorithms for the polar parallel coordinates generation and data shown in the polar parallel coordinates. Then we point out two feathers of the polar parallel coordinates. It can express more axes than parallel coordinates and reflect the characteristics of time-series data. Based on this, we compare the parallel coordinates with the polar parallel coordinates by the time-series data visualization.
平行坐标是一种非常重要的可视化方法,但它所能表达的尺寸受到屏幕长度或宽度的限制。本文提出了极平行坐标法。首先,我们将极平行坐标定义为轴在同一度之间的坐标,并给出了轴的表达式。给出了极平行坐标的生成算法和极平行坐标中显示的数据。然后指出了两根羽毛的极平行坐标。它能表达比平行坐标更多的坐标轴,能反映时间序列数据的特点。在此基础上,通过时间序列数据的可视化,将平行坐标与极平行坐标进行比较。
{"title":"The Polar Parallel Coordinates Method for Time-Series Data Visualization","authors":"C. Shenghui, Jiang Zhifang, Qiang Qi, Shuo Li, Xiangxu Meng","doi":"10.1109/ICCIS.2012.334","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.334","url":null,"abstract":"Parallel coordinates is a very important visualization method, but the dimensions it can express are limited by the length or width of the screen. In this paper, we present the polar parallel coordinates method. First, we define the polar parallel coordinates as the coordinate whose axes exist between the same degree and show the expression of the axis. We give the algorithms for the polar parallel coordinates generation and data shown in the polar parallel coordinates. Then we point out two feathers of the polar parallel coordinates. It can express more axes than parallel coordinates and reflect the characteristics of time-series data. Based on this, we compare the parallel coordinates with the polar parallel coordinates by the time-series data visualization.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124935999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Comparison of Two Algorithms of Attribute Reduction Based on Fuzzy Rough Set 基于模糊粗糙集的两种属性约简算法的比较
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.107
JianLiang Meng, Ye Xu, Junwei Zhang
Currently, with the large number of data and the increasing importance of it, how to find useful pattern in the large data, has become an important application of data mining. The rough set attribute reduction algorithm, used to study how to contain the same information when we use fewer properties to describe the objects, has been more widely used, so that the concept of soft computing is becoming increasingly popular. Rough set attribute reduction algorithm can only be applied to discrete data sets, and how to apply it to the continuous collections of the real data is a hot issue in the fuzzy mathematics. By applying the concept of fuzzy set in this issue, we can reduce the loss of information in discretization of continuous attributes. Thus the reduction results have less properties for description and contain the same information at the same time. Because of the difference between the directions of fuzzy set theory applications, that is, the reduction is based on the degree of dependence or the discernibility matrices. It can produce different fuzzy rough set attribute reductions. CCD-FRSAR(attribute reduction based on the compact computational domain of fuzzy-rough set) and FRSAR-SAT (fuzzy-rough set attribute reduction of satisfiability problem)are new and have practical values in these algorithms. Two algorithms have different ways to apply fuzzy sets theory, so the effects of them are different, too. This article describes the related ideas of fuzzy mathematics, describes the two algorithms and compares them.
当前,随着数据量的增加和重要性的提高,如何在大数据中发现有用的模式,已经成为数据挖掘的一个重要应用。粗糙集属性约简算法研究的是在使用较少的属性来描述对象的情况下如何包含相同的信息,该算法得到了更广泛的应用,使得软计算的概念日益流行。粗糙集属性约简算法只能应用于离散数据集,如何将其应用于真实数据的连续集合是模糊数学中的一个热点问题。在此问题中应用模糊集的概念,可以减少连续属性离散化过程中的信息损失。因此,约简结果具有较少的描述性质,同时包含相同的信息。由于模糊集理论应用的方向不同,即基于依赖程度或可辨矩阵的约简。它可以产生不同的模糊粗糙集属性约简。CCD-FRSAR(基于模糊粗糙集紧凑计算域的属性约简)和FRSAR-SAT(基于可满足性问题的模糊粗糙集属性约简)是一种新的算法,在这些算法中具有实用价值。两种算法应用模糊集理论的方式不同,因此效果也不同。本文介绍了模糊数学的相关思想,对两种算法进行了描述和比较。
{"title":"Comparison of Two Algorithms of Attribute Reduction Based on Fuzzy Rough Set","authors":"JianLiang Meng, Ye Xu, Junwei Zhang","doi":"10.1109/ICCIS.2012.107","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.107","url":null,"abstract":"Currently, with the large number of data and the increasing importance of it, how to find useful pattern in the large data, has become an important application of data mining. The rough set attribute reduction algorithm, used to study how to contain the same information when we use fewer properties to describe the objects, has been more widely used, so that the concept of soft computing is becoming increasingly popular. Rough set attribute reduction algorithm can only be applied to discrete data sets, and how to apply it to the continuous collections of the real data is a hot issue in the fuzzy mathematics. By applying the concept of fuzzy set in this issue, we can reduce the loss of information in discretization of continuous attributes. Thus the reduction results have less properties for description and contain the same information at the same time. Because of the difference between the directions of fuzzy set theory applications, that is, the reduction is based on the degree of dependence or the discernibility matrices. It can produce different fuzzy rough set attribute reductions. CCD-FRSAR(attribute reduction based on the compact computational domain of fuzzy-rough set) and FRSAR-SAT (fuzzy-rough set attribute reduction of satisfiability problem)are new and have practical values in these algorithms. Two algorithms have different ways to apply fuzzy sets theory, so the effects of them are different, too. This article describes the related ideas of fuzzy mathematics, describes the two algorithms and compares them.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126036388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection of Electromagnetic Trojans Based on API Cycle Mining 基于API周期挖掘的电磁木马检测
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.128
Rongmao Chen, Bofeng Zhang, Jiangchun Ren, Zhenghu Gong
Computer electromagnetic radiation Trojan arouses concern gradually due to its particularity in route of transmission. Currently, technologies for preventing electromagnetic radiation are mainly divided into two types of software and hardware. Hardware has a high cost and limited range of application, while most of current software protection mechanism is in theoretical research stage with quite complex principles. This paper makes exploration on prevention methods for displayer electromagnetic Trojan. Trojans need to be realized through changes of pixel on the displayer when working, their function called by their bottom of system would also present characteristics of corresponding sequence. Based on this characteristic, this paper proposes Trojan detection methods based on API sequence cycle mining, and pixel interference is also proposed as a prevention method at the end of this paper. It is indicated by experiments, the method could better detect displayer electromagnetic Trojan programs and has a strong versatility, low cost, and easy to deploy applications.
计算机电磁辐射木马由于其传播途径的特殊性,逐渐引起人们的关注。目前,防止电磁辐射的技术主要分为软件和硬件两大类。硬件保护成本高,适用范围有限,而目前的软件保护机制大多处于理论研究阶段,原理相当复杂。本文对显示器电磁木马的防范方法进行了探讨。木马在工作时需要通过改变显示器上的像素来实现,其系统底层调用的函数也会呈现出相应的序列特征。基于这一特点,本文提出了基于API序列周期挖掘的木马检测方法,并在文章的最后提出了像素干扰作为预防方法。实验表明,该方法能较好地检测显示器电磁木马程序,通用性强,成本低,易于部署应用。
{"title":"Detection of Electromagnetic Trojans Based on API Cycle Mining","authors":"Rongmao Chen, Bofeng Zhang, Jiangchun Ren, Zhenghu Gong","doi":"10.1109/ICCIS.2012.128","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.128","url":null,"abstract":"Computer electromagnetic radiation Trojan arouses concern gradually due to its particularity in route of transmission. Currently, technologies for preventing electromagnetic radiation are mainly divided into two types of software and hardware. Hardware has a high cost and limited range of application, while most of current software protection mechanism is in theoretical research stage with quite complex principles. This paper makes exploration on prevention methods for displayer electromagnetic Trojan. Trojans need to be realized through changes of pixel on the displayer when working, their function called by their bottom of system would also present characteristics of corresponding sequence. Based on this characteristic, this paper proposes Trojan detection methods based on API sequence cycle mining, and pixel interference is also proposed as a prevention method at the end of this paper. It is indicated by experiments, the method could better detect displayer electromagnetic Trojan programs and has a strong versatility, low cost, and easy to deploy applications.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125281621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Reservoir Sedimentary and Pore Characteristics of Chang 6 in Wuqi Oilfield 吴起油田长6储层沉积及孔隙特征研究
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.252
Fengxia Li, Zhengku Wang
In this paper, we utilized comprehensive geological analysis methods to identify sedimentary micro-facies in Wuqi Oilfield. Based on identification marks of sedimentary facies such as lithologic features, sedimentary structures and paleontological fossil, we classified the sedimentary micro-facies in this field into 4 types, including underwater distributary channel, mouth bar, distal bar and interdistributary bay facies. According to the observation of cores and casting thin sections, we made analysis on the pore characteristics of Chang 6 reservoir. The pore characteristic of target area is mainly intergranular space, which takes 3.27%, followed by feldspar and rock debris dissolution pore. The analysis shows that, the sedimentary thichness and grain size of underwater distributary channel are both quite big. The content of flake silicate mineral, for example, mica, is relatively low, but its porosity and permeability is high compared with mouth bar and distal bar. Interdistributary bay facies that has the lowest porosity and permeability are very strong.
本文利用综合地质分析方法对吴起油田沉积微相进行了识别。根据岩性特征、沉积构造和古生物化石等沉积相识别标志,将本区沉积微相划分为水下分流河道相、河口坝相、远端坝相和分流间湾相4种类型。根据岩心和铸体薄片观察,对长6储层孔隙特征进行了分析。靶区孔隙特征以粒间孔隙为主,占3.27%,其次为长石孔隙和岩屑溶蚀孔隙。分析表明,水下分流河道的沉积厚度和粒度均较大。云母等片状硅酸盐矿物的含量相对较低,但其孔隙度和渗透率均高于口砂和远砂。而孔隙度和渗透率最低的分流间湾相则非常强。
{"title":"Research on Reservoir Sedimentary and Pore Characteristics of Chang 6 in Wuqi Oilfield","authors":"Fengxia Li, Zhengku Wang","doi":"10.1109/ICCIS.2012.252","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.252","url":null,"abstract":"In this paper, we utilized comprehensive geological analysis methods to identify sedimentary micro-facies in Wuqi Oilfield. Based on identification marks of sedimentary facies such as lithologic features, sedimentary structures and paleontological fossil, we classified the sedimentary micro-facies in this field into 4 types, including underwater distributary channel, mouth bar, distal bar and interdistributary bay facies. According to the observation of cores and casting thin sections, we made analysis on the pore characteristics of Chang 6 reservoir. The pore characteristic of target area is mainly intergranular space, which takes 3.27%, followed by feldspar and rock debris dissolution pore. The analysis shows that, the sedimentary thichness and grain size of underwater distributary channel are both quite big. The content of flake silicate mineral, for example, mica, is relatively low, but its porosity and permeability is high compared with mouth bar and distal bar. Interdistributary bay facies that has the lowest porosity and permeability are very strong.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122768309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Trust Model Based on Punish Mechanism in Peer-to-Peer Network 基于惩罚机制的点对点网络信任模型
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.357
Xiaoyan Ma
Along with the rapid development of peer-to-peer network technology and the fast increasing number of users, the problems of security in peer-to-peer network is becoming more and more important. By researching the previous trust model of peer-to-peer network, we propose a trust model(PTM) for peer-to-peer networks based on punish mechanism. Firstly, we use the method of social grouping nodes in the calculation model of trust. Then bring in punish mechanism in trust model. This model can stimulate nodes which provide sincere reliable service.
随着点对点网络技术的飞速发展和用户数量的迅速增加,点对点网络的安全问题也变得越来越重要。在研究前人对等网络信任模型的基础上,提出了基于惩罚机制的对等网络信任模型(PTM)。首先,我们在信任计算模型中使用了社会分组节点的方法。然后在信任模型中引入惩罚机制。该模型能够激励提供真诚可靠服务的节点。
{"title":"The Trust Model Based on Punish Mechanism in Peer-to-Peer Network","authors":"Xiaoyan Ma","doi":"10.1109/ICCIS.2012.357","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.357","url":null,"abstract":"Along with the rapid development of peer-to-peer network technology and the fast increasing number of users, the problems of security in peer-to-peer network is becoming more and more important. By researching the previous trust model of peer-to-peer network, we propose a trust model(PTM) for peer-to-peer networks based on punish mechanism. Firstly, we use the method of social grouping nodes in the calculation model of trust. Then bring in punish mechanism in trust model. This model can stimulate nodes which provide sincere reliable service.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122971361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TAFR: A TTL-aware Message Ferry Scheme in DTN TAFR: DTN的即时通讯讯息转渡计划
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.309
Xiaoyang Wu, Yingwen Chen, Ming Xu, Wei Peng
Partitioning network, especially some DTN, can use Message Ferry(MF) scheme to restore network connection. Message TTL describes the maximum delay tolerance of transmission and messages with out-of-date TTL should be dropped. In this paper, we will study the problem of how to design the ferry's moving route dynamically to get high message delivery ratio under the constraint of message TTL, which we call it TAFR problem as well as algorithms. We compare TAFRA to existing SIRA and Random Way point algorithm with different message TTLs and ferry number in two scenarios. The simulation shows that TAFRA can get nearly twice the delivery ratio than SIRA in low message TTL conditions, and 50% more delivery ratio with increasing ferry number. Furthermore, the simulation shows that TAFRA provides on-demand characteristics which are more suitable in some non-uniformly distribute message condition.
分区网络,特别是某些DTN,可以使用Message Ferry(MF)方案来恢复网络连接。消息TTL描述了传输的最大延迟容忍,超过TTL的消息应该被丢弃。在本文中,我们将研究如何在消息TTL约束下动态设计渡轮的移动路线以获得较高的消息传递率的问题,我们称之为TAFR问题以及算法。在两种情况下,我们将TAFRA与现有的SIRA和随机路径点算法在不同的消息ttl和渡轮数量下进行了比较。仿真结果表明,在低报文TTL条件下,TAFRA的发送率是SIRA的近两倍,随着轮渡次数的增加,其发送率提高了50%。仿真结果表明,TAFRA提供了更适合于非均匀分布消息条件下的随需应变特性。
{"title":"TAFR: A TTL-aware Message Ferry Scheme in DTN","authors":"Xiaoyang Wu, Yingwen Chen, Ming Xu, Wei Peng","doi":"10.1109/ICCIS.2012.309","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.309","url":null,"abstract":"Partitioning network, especially some DTN, can use Message Ferry(MF) scheme to restore network connection. Message TTL describes the maximum delay tolerance of transmission and messages with out-of-date TTL should be dropped. In this paper, we will study the problem of how to design the ferry's moving route dynamically to get high message delivery ratio under the constraint of message TTL, which we call it TAFR problem as well as algorithms. We compare TAFRA to existing SIRA and Random Way point algorithm with different message TTLs and ferry number in two scenarios. The simulation shows that TAFRA can get nearly twice the delivery ratio than SIRA in low message TTL conditions, and 50% more delivery ratio with increasing ferry number. Furthermore, the simulation shows that TAFRA provides on-demand characteristics which are more suitable in some non-uniformly distribute message condition.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129505087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2012 Fourth International Conference on Computational and Information Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1