Pub Date : 2012-10-04DOI: 10.1109/URKE.2012.6319580
H. Banati, Punam Bedi, P. Marwaha
Web services are self-describing, open components that support rapid, low-cost composition of distributed applications. They are being considered as the best choice of industry to provide solution for multiple clients scattered in heterogeneous environment. However, change in the business requirements result in multiple versions of Web services. Maintaining variety of versions is difficult especially for organizations, with established products and a large customer base. The problem aggregates even more when a product requires customization for its clients with minor differences in each version. This forces to deploy multiple Web services for each one of them. This work presents WSDL-Temporal, an extension of WSDL to handle issues related to change management in Web Service. The approach allows maintaining multiple versions of interfaces/operations/elements within a single Web service that can be accessed by clients. The paper extends the case study of W3C specification of WSDL to present WSDL-Temporal approach of change management. Not only does WSDL-Temporal handle changes but is also capable of handling both backward compatible and incompatible changes. Another advantage of using a single WSDL-T service for service producers is that they can now push required changes to the production environment more frequently and need not to accumulate a set of changes for next release. It also enables the service providers to deprecate or retire services in a graceful manner.
{"title":"WSDL-temporal: An approach for change management in web services","authors":"H. Banati, Punam Bedi, P. Marwaha","doi":"10.1109/URKE.2012.6319580","DOIUrl":"https://doi.org/10.1109/URKE.2012.6319580","url":null,"abstract":"Web services are self-describing, open components that support rapid, low-cost composition of distributed applications. They are being considered as the best choice of industry to provide solution for multiple clients scattered in heterogeneous environment. However, change in the business requirements result in multiple versions of Web services. Maintaining variety of versions is difficult especially for organizations, with established products and a large customer base. The problem aggregates even more when a product requires customization for its clients with minor differences in each version. This forces to deploy multiple Web services for each one of them. This work presents WSDL-Temporal, an extension of WSDL to handle issues related to change management in Web Service. The approach allows maintaining multiple versions of interfaces/operations/elements within a single Web service that can be accessed by clients. The paper extends the case study of W3C specification of WSDL to present WSDL-Temporal approach of change management. Not only does WSDL-Temporal handle changes but is also capable of handling both backward compatible and incompatible changes. Another advantage of using a single WSDL-T service for service producers is that they can now push required changes to the production environment more frequently and need not to accumulate a set of changes for next release. It also enables the service providers to deprecate or retire services in a graceful manner.","PeriodicalId":277189,"journal":{"name":"2012 2nd International Conference on Uncertainty Reasoning and Knowledge Engineering","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116121639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A method of information entropy optimized time delays is proposed for the chaotic time series reconstruction. First, it establishes an information entropy optimum model in phase space for high-dimensional time delays by using conditional entropy. Then solved these parameters using genetic algorithm(GA). This method constructs an optimum phase space, which maintains independence of reconstruction coordinate and retains the dynamic characteristics of the original system. In the numerical simulations, results of the Lorenz system show that it could improve the performance of chaotic time series prediction.
{"title":"High-dimensional time delays selection for phase space reconstruction with information theory","authors":"Chuntao Zhang, Jialiang Xu, Xiaofeng Chen, Jiao Guo","doi":"10.1109/URKE.2012.6319545","DOIUrl":"https://doi.org/10.1109/URKE.2012.6319545","url":null,"abstract":"A method of information entropy optimized time delays is proposed for the chaotic time series reconstruction. First, it establishes an information entropy optimum model in phase space for high-dimensional time delays by using conditional entropy. Then solved these parameters using genetic algorithm(GA). This method constructs an optimum phase space, which maintains independence of reconstruction coordinate and retains the dynamic characteristics of the original system. In the numerical simulations, results of the Lorenz system show that it could improve the performance of chaotic time series prediction.","PeriodicalId":277189,"journal":{"name":"2012 2nd International Conference on Uncertainty Reasoning and Knowledge Engineering","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133835200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-04DOI: 10.1109/URKE.2012.6319553
Li Qing-shan, Zou Yan-xin, Sun Ying-cheng
Ontology as a concept and model description way, is widely used in various fields, and achieved good effect. Ontology based on intelligent Agent how to realize its definition of the concept in Meta search engine, help system realize the personalized, still need further research. This paper put forward a meta search engine personalized mechanism based on ontology with the use of the Agent technology, this mechanism through mining user behavior of characteristics with Agent for information retrieval, combining ontology technology set up and update the user general view, can well reflect user current interest and to the user's interest to the renewal of the dynamic. Based on ontology users can also according to the user's query scene reasoning and used in filter search results, can make the search results to meet user needs, has the personalized. Finally, in the intelligent Meta search engine prototype platform of the related experimental study, results verified the feasibility of personalized mechanism, and reached a certain degree of intelligent effect.
{"title":"Ontology based user personalization mechanism in meta search engine","authors":"Li Qing-shan, Zou Yan-xin, Sun Ying-cheng","doi":"10.1109/URKE.2012.6319553","DOIUrl":"https://doi.org/10.1109/URKE.2012.6319553","url":null,"abstract":"Ontology as a concept and model description way, is widely used in various fields, and achieved good effect. Ontology based on intelligent Agent how to realize its definition of the concept in Meta search engine, help system realize the personalized, still need further research. This paper put forward a meta search engine personalized mechanism based on ontology with the use of the Agent technology, this mechanism through mining user behavior of characteristics with Agent for information retrieval, combining ontology technology set up and update the user general view, can well reflect user current interest and to the user's interest to the renewal of the dynamic. Based on ontology users can also according to the user's query scene reasoning and used in filter search results, can make the search results to meet user needs, has the personalized. Finally, in the intelligent Meta search engine prototype platform of the related experimental study, results verified the feasibility of personalized mechanism, and reached a certain degree of intelligent effect.","PeriodicalId":277189,"journal":{"name":"2012 2nd International Conference on Uncertainty Reasoning and Knowledge Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131281884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-04DOI: 10.1109/URKE.2012.6319524
W. Muliady, H. Widiputra
Slang is one of the problems encountered in developing Lexical Database. There is no complete source officially for slangs in any language. This research attempts to create a list of Indonesian slangs using the proposed framework and methodology. The contents for slangs are generated by Twitter; therefore it can encounter the newest slangs available in the society.
{"title":"Generating Indonesian slang lexicons from twitter","authors":"W. Muliady, H. Widiputra","doi":"10.1109/URKE.2012.6319524","DOIUrl":"https://doi.org/10.1109/URKE.2012.6319524","url":null,"abstract":"Slang is one of the problems encountered in developing Lexical Database. There is no complete source officially for slangs in any language. This research attempts to create a list of Indonesian slangs using the proposed framework and methodology. The contents for slangs are generated by Twitter; therefore it can encounter the newest slangs available in the society.","PeriodicalId":277189,"journal":{"name":"2012 2nd International Conference on Uncertainty Reasoning and Knowledge Engineering","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123415082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-04DOI: 10.1109/URKE.2012.6319543
Dan Tang, Jian Huang
Most of secret image sharing schemes are follow the idea of classic Shamir scheme, namely the (k,n) threshold scheme based on one-variable polynomial. Which schemes succeed much advantages of the Shamir scheme, such as implentment easily, both have features of Perfect and Ideal and so on. But those schemes regard images as data stream, and not adequately consider the matrix characteristics of the digital image. In view of this situation, this paper proposed a new secret image sharing scheme based on bivariate polynomial, besides has most advantages of Shamir scheme, access structure in the new scheme has been greatly enriched. And the most important, the new scheme is much more suitable for image processing.
{"title":"Secret image sharing scheme based on bivariate polynomial","authors":"Dan Tang, Jian Huang","doi":"10.1109/URKE.2012.6319543","DOIUrl":"https://doi.org/10.1109/URKE.2012.6319543","url":null,"abstract":"Most of secret image sharing schemes are follow the idea of classic Shamir scheme, namely the (k,n) threshold scheme based on one-variable polynomial. Which schemes succeed much advantages of the Shamir scheme, such as implentment easily, both have features of Perfect and Ideal and so on. But those schemes regard images as data stream, and not adequately consider the matrix characteristics of the digital image. In view of this situation, this paper proposed a new secret image sharing scheme based on bivariate polynomial, besides has most advantages of Shamir scheme, access structure in the new scheme has been greatly enriched. And the most important, the new scheme is much more suitable for image processing.","PeriodicalId":277189,"journal":{"name":"2012 2nd International Conference on Uncertainty Reasoning and Knowledge Engineering","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115136900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-04DOI: 10.1109/URKE.2012.6319589
A. C. Leuveano, Fairul Azni Bin Jafar, Mohd Razali Bin Muhamad
One of the well-known inventory control techniques utilized in the supply chain is integrated inventory model. Recently, previous research [Z.X Chen and B.R Sarker, Multi-vendor integrated procurement-production system under shared transportation and just-in-time delivery system, Journal of the Operational Society 61 (2010) 1654-1666] have developed an integrated model to synchronize the production flow from multi-vendor to manufacturer through shared transportation. However, the model is complex to find the optimal solution. Because of these complexities, simplifications of the model are often based on limiting assumptions. Since the model is a non-linear integer programming type, this paper addresses genetic algorithm to overcome the limitations to find batch production lot size of vendors and manufacturer, delivery quantities and number of deliveries from different vendors to the manufacturer in order to minimize total cost of all parties involved in the supply chain. Furthermore, a numerical example is presented to illustrate the results.
{"title":"Development of genetic algorithm on multi-vendor integrated procurement-production system under shared transportation and just-in-time delivery system","authors":"A. C. Leuveano, Fairul Azni Bin Jafar, Mohd Razali Bin Muhamad","doi":"10.1109/URKE.2012.6319589","DOIUrl":"https://doi.org/10.1109/URKE.2012.6319589","url":null,"abstract":"One of the well-known inventory control techniques utilized in the supply chain is integrated inventory model. Recently, previous research [Z.X Chen and B.R Sarker, Multi-vendor integrated procurement-production system under shared transportation and just-in-time delivery system, Journal of the Operational Society 61 (2010) 1654-1666] have developed an integrated model to synchronize the production flow from multi-vendor to manufacturer through shared transportation. However, the model is complex to find the optimal solution. Because of these complexities, simplifications of the model are often based on limiting assumptions. Since the model is a non-linear integer programming type, this paper addresses genetic algorithm to overcome the limitations to find batch production lot size of vendors and manufacturer, delivery quantities and number of deliveries from different vendors to the manufacturer in order to minimize total cost of all parties involved in the supply chain. Furthermore, a numerical example is presented to illustrate the results.","PeriodicalId":277189,"journal":{"name":"2012 2nd International Conference on Uncertainty Reasoning and Knowledge Engineering","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114397019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-04DOI: 10.1109/URKE.2012.6319555
Shan Gao, Hongmei Li
There are some problems still exist in traditional individual Breast Cancer Diagnosis. To solve the problems, an individual credit assessment model based on support vector classification method is proposed. Using SPSS Clementine data mining tool, the personal credit data is clustering analysis by Support Vector Machine. It is analyzed in detail with the different kernel functions and parameters of Support vector machine. Support vector machine could be used to improve the work of medical practitioners in the diagnosis of breast cancer.
{"title":"Breast cancer diagnosis based on support vector machine","authors":"Shan Gao, Hongmei Li","doi":"10.1109/URKE.2012.6319555","DOIUrl":"https://doi.org/10.1109/URKE.2012.6319555","url":null,"abstract":"There are some problems still exist in traditional individual Breast Cancer Diagnosis. To solve the problems, an individual credit assessment model based on support vector classification method is proposed. Using SPSS Clementine data mining tool, the personal credit data is clustering analysis by Support Vector Machine. It is analyzed in detail with the different kernel functions and parameters of Support vector machine. Support vector machine could be used to improve the work of medical practitioners in the diagnosis of breast cancer.","PeriodicalId":277189,"journal":{"name":"2012 2nd International Conference on Uncertainty Reasoning and Knowledge Engineering","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126527295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-04DOI: 10.1109/URKE.2012.6319537
Yuge Zheng, Hongjuan Tian
The research of Boolean index sets of graphs is one of the important graph theory in the graph theory . Boolean index sets of graphs are to use the vertex sets and the edge sets of graphs to study the characteristics of various graphs and their inherent characteristics through corresponding the mapping function to Z2. It's theory can be applied to information engineering, communication networks, computer science, economic management, medicine, etc. The edge-balance index set is an important issue in Boolean index set. In this paper, we defined edge-friendly labeling of the graph, edge-balance index set of the graph and the graph Cnm × Pmn (n=4,m≥2). We completely determine the edge-balance index sets of the graph Cnm × Pmn(m ≡ 0(mod 3)) and solve formula proof and graphic tectonic methods.
{"title":"On the edge-balance index sets of a classes of nested network graph","authors":"Yuge Zheng, Hongjuan Tian","doi":"10.1109/URKE.2012.6319537","DOIUrl":"https://doi.org/10.1109/URKE.2012.6319537","url":null,"abstract":"The research of Boolean index sets of graphs is one of the important graph theory in the graph theory . Boolean index sets of graphs are to use the vertex sets and the edge sets of graphs to study the characteristics of various graphs and their inherent characteristics through corresponding the mapping function to Z2. It's theory can be applied to information engineering, communication networks, computer science, economic management, medicine, etc. The edge-balance index set is an important issue in Boolean index set. In this paper, we defined edge-friendly labeling of the graph, edge-balance index set of the graph and the graph Cnm × Pmn (n=4,m≥2). We completely determine the edge-balance index sets of the graph Cnm × Pmn(m ≡ 0(mod 3)) and solve formula proof and graphic tectonic methods.","PeriodicalId":277189,"journal":{"name":"2012 2nd International Conference on Uncertainty Reasoning and Knowledge Engineering","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125923307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-04DOI: 10.1109/URKE.2012.6319527
Cai Ying-fang, Qiu Wanghua
The purpose of this paper is to improve retrieval efficiency to muli-attribute instance knowledge. The paper expressed multi-attribute instance knowledge as a model with multi-attribute and tree structure, which synthetically apply similarity calculation method of value type attribute and of imprecise value type attribute and of word type attribute, which optimized step of calculation and order of calculation, and improved retrieval efficiency.
{"title":"Research on retrieval of multi- attribute instance knowledge based on ontology","authors":"Cai Ying-fang, Qiu Wanghua","doi":"10.1109/URKE.2012.6319527","DOIUrl":"https://doi.org/10.1109/URKE.2012.6319527","url":null,"abstract":"The purpose of this paper is to improve retrieval efficiency to muli-attribute instance knowledge. The paper expressed multi-attribute instance knowledge as a model with multi-attribute and tree structure, which synthetically apply similarity calculation method of value type attribute and of imprecise value type attribute and of word type attribute, which optimized step of calculation and order of calculation, and improved retrieval efficiency.","PeriodicalId":277189,"journal":{"name":"2012 2nd International Conference on Uncertainty Reasoning and Knowledge Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131491639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-04DOI: 10.1109/URKE.2012.6319575
Li Yuan
One of the main challenges in face recognition is represented by pose and illumination variations that drastically affect the recognition performance. This paper presents a new approach for face recognition based on Regularized-Labeled Linear Discriminant Analysis (RL-LDA) learning from 3D models. In the training stage, 3D face information is exploited to generate a large number of 2D virtual images with varying pose and illumination, and these images are grouped into different labeled subsets in a supervised manner. Labeled Linear Discriminant Analysis (L-LDA) is operated on each subsets subsequently. On this basis, eigenspectrum analysis is implemented to regularize the extracted L-LDA features. Recognition is accomplished by calculating RL-LDA features, and achieved a recognition rate of 98.4% on WHU-3D-2D database.
{"title":"2D face recognition based on RL-LDA learning from 3D model","authors":"Li Yuan","doi":"10.1109/URKE.2012.6319575","DOIUrl":"https://doi.org/10.1109/URKE.2012.6319575","url":null,"abstract":"One of the main challenges in face recognition is represented by pose and illumination variations that drastically affect the recognition performance. This paper presents a new approach for face recognition based on Regularized-Labeled Linear Discriminant Analysis (RL-LDA) learning from 3D models. In the training stage, 3D face information is exploited to generate a large number of 2D virtual images with varying pose and illumination, and these images are grouped into different labeled subsets in a supervised manner. Labeled Linear Discriminant Analysis (L-LDA) is operated on each subsets subsequently. On this basis, eigenspectrum analysis is implemented to regularize the extracted L-LDA features. Recognition is accomplished by calculating RL-LDA features, and achieved a recognition rate of 98.4% on WHU-3D-2D database.","PeriodicalId":277189,"journal":{"name":"2012 2nd International Conference on Uncertainty Reasoning and Knowledge Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132682566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}