In the 21st century, economy globalization is inevitable and international trade by ocean shipping is increasing greatly, so there is a fastigium in the ship market for shipbuilding industry. In China, there were 14.52 million shipping tons of ships finished in 2006 and China has been the three most important shipbuilding countries for 12 years, but its shipbuilding technology and management mode are undeveloped and restrict the competitive power of Chinese enterprises. Considering the real status of Chinese enterprises and technique characters of modern shipbuilding, the shipbuilding logistics mode is put forward and analyzed. And then the shipbuilding logistics management system based on MRP-II and JIT is built up, which has three kinds of plans and controls, i.e. MPS (master production schedule), MRP (material requirements planning) and shop-floor production schedule. This shipbuilding logistics management system is important and applicable for Chinese enterprises to build up the logistics mode fitting modern shipbuilding so as to improve the technology and management level and increase the competitive power.
21世纪,经济全球化是必然的趋势,国际海运贸易的急剧增长,船舶市场对造船业产生了一种热潮。中国2006年完成船舶1452万吨,连续12年成为世界三大造船大国,但造船技术和管理模式不发达,制约了中国企业的竞争力。结合我国企业的实际情况和现代造船的技术特点,提出并分析了造船物流模式。在此基础上,构建了基于MRP- ii和JIT的造船物流管理系统,该系统具有主生产计划MPS (master production schedule)、物料需求计划MRP (material requirements planning)和车间生产计划MRP (shop-floor production schedule)三种计划和控制。该造船物流管理系统对于我国企业建立适合现代造船的物流模式,提高技术和管理水平,增强竞争力具有重要的应用价值。
{"title":"Research on the Shipbuilding Logistics System under Modern Shipbuilding","authors":"Weihong Yue, Chengfang Wang, Qingying Zhang","doi":"10.1109/CCCM.2008.88","DOIUrl":"https://doi.org/10.1109/CCCM.2008.88","url":null,"abstract":"In the 21st century, economy globalization is inevitable and international trade by ocean shipping is increasing greatly, so there is a fastigium in the ship market for shipbuilding industry. In China, there were 14.52 million shipping tons of ships finished in 2006 and China has been the three most important shipbuilding countries for 12 years, but its shipbuilding technology and management mode are undeveloped and restrict the competitive power of Chinese enterprises. Considering the real status of Chinese enterprises and technique characters of modern shipbuilding, the shipbuilding logistics mode is put forward and analyzed. And then the shipbuilding logistics management system based on MRP-II and JIT is built up, which has three kinds of plans and controls, i.e. MPS (master production schedule), MRP (material requirements planning) and shop-floor production schedule. This shipbuilding logistics management system is important and applicable for Chinese enterprises to build up the logistics mode fitting modern shipbuilding so as to improve the technology and management level and increase the competitive power.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115053916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Manufacturing Execution System (MES) links plan management and workshop control in an enterprise, which is an integrative management and control system of workshop production oriented to manufacturing process. MES ontology is a formal specification of conceptualization in MES domain, which plays an important role in the process of development and application of MES. In this paper the MES model of multiple views is firstly put forward. Secondly, a study is carried out on the ontology engineering and OWL. Thirdly, according to the MES model of multiple views, MES ontology model derived from the MES model of multiple views is achieved. Finally, MES ontology is described with OWL.
{"title":"Construct MES Ontology with OWL","authors":"Wen Long","doi":"10.1109/CCCM.2008.280","DOIUrl":"https://doi.org/10.1109/CCCM.2008.280","url":null,"abstract":"Manufacturing Execution System (MES) links plan management and workshop control in an enterprise, which is an integrative management and control system of workshop production oriented to manufacturing process. MES ontology is a formal specification of conceptualization in MES domain, which plays an important role in the process of development and application of MES. In this paper the MES model of multiple views is firstly put forward. Secondly, a study is carried out on the ontology engineering and OWL. Thirdly, according to the MES model of multiple views, MES ontology model derived from the MES model of multiple views is achieved. Finally, MES ontology is described with OWL.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122675546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Spam has become one of the severest problems for today's network systems. In this paper, we present an adaptive spam filtering mechanism based on message fingerprinting. In our mechanism, each message is represented by a fingerprint vector, and two messages with a short distance in their fingerprint vectors are viewed as variants of each other. We present methods for fast matching a query message against a list of known spam messages, and methods for adaptive updating of the fingerprint vectors of known spam messages. Experiments on real spam data demonstrate the effectiveness of the proposed method.
{"title":"Adaptive Spam Filtering Based on Fingerprint Vectors","authors":"Weihong Liu, Weidong Fang","doi":"10.1109/CCCM.2008.275","DOIUrl":"https://doi.org/10.1109/CCCM.2008.275","url":null,"abstract":"Spam has become one of the severest problems for today's network systems. In this paper, we present an adaptive spam filtering mechanism based on message fingerprinting. In our mechanism, each message is represented by a fingerprint vector, and two messages with a short distance in their fingerprint vectors are viewed as variants of each other. We present methods for fast matching a query message against a list of known spam messages, and methods for adaptive updating of the fingerprint vectors of known spam messages. Experiments on real spam data demonstrate the effectiveness of the proposed method.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122654499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As new field of computer intelligence research, artificial immune system inspired by biological immune system, provides a strong paradigm for information processing and problem solving. Artificial immune network theory is an important theory of AIS and has already wildly applied in the fields of data clustering, data analysis and robot control. This research proposes firstly to apply artificial immune network theory into risk assessment of managerial field, provides specific model construction process relating to case study and testifies the result with data from real test.
{"title":"Research on the Application of Immune Network Theory in Risk Assessment","authors":"Cai Shuqin, Wang Ge, Cai Hong","doi":"10.1109/CCCM.2008.324","DOIUrl":"https://doi.org/10.1109/CCCM.2008.324","url":null,"abstract":"As new field of computer intelligence research, artificial immune system inspired by biological immune system, provides a strong paradigm for information processing and problem solving. Artificial immune network theory is an important theory of AIS and has already wildly applied in the fields of data clustering, data analysis and robot control. This research proposes firstly to apply artificial immune network theory into risk assessment of managerial field, provides specific model construction process relating to case study and testifies the result with data from real test.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122761921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A number of routing schemes have been proposed to improve the lookup performance of distributed hash table (DHT). There are three representative routing schemes among existing DHTs: recursive routing, semi-recursive routing and iterative routing. To know which routing scheme is more efficient, this paper takes one of the most important DHTs -- Chord as an example to simulate the three representative routing schemes and discusses the effectiveness of them from the aspects of lookup latency, effect of churn and difficulty of NAT traversal. The simulations and analysis show that they have advantages in different situations.
{"title":"Simulation and Analysis of Routing Schemes in Structured P2P System","authors":"Yinbo Cheng, X. Wen, Yong Sun","doi":"10.1109/CCCM.2008.241","DOIUrl":"https://doi.org/10.1109/CCCM.2008.241","url":null,"abstract":"A number of routing schemes have been proposed to improve the lookup performance of distributed hash table (DHT). There are three representative routing schemes among existing DHTs: recursive routing, semi-recursive routing and iterative routing. To know which routing scheme is more efficient, this paper takes one of the most important DHTs -- Chord as an example to simulate the three representative routing schemes and discusses the effectiveness of them from the aspects of lookup latency, effect of churn and difficulty of NAT traversal. The simulations and analysis show that they have advantages in different situations.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121994633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we present a graphic model of multiple-plane and multiple-stage packet switching system based on its topological architecture. We found that there are two vertex sub-sets belonging to the balanced vertex set and another two vertex sub-sets belonging to the competitive vertex set in MPMS model, respectively. Therefore, we only need to use balancing policies for the balanced vertex sets and use scheduling policies for the competitive vertex set to switch packets. Moreover, switching path counts (SPC) was proved to be equal to the multiplication of vertex out-degree of the balanced vertex sub-sets. Lastly, we studied the sufficient condition, is the SPC value is not less than parameter n, to offer enough non-conflicting switching paths for any vertex pair matching between DEMs and MUXs in MPMS.
{"title":"Research on Graphic Model of the Novel Multiple-plane and Multiple-stage Packet Switching System","authors":"Xiangjie Ma, Xiuqin Li, Julong Lan, Junpeng Mao, Lei He, Baisheng Zhang","doi":"10.1109/CCCM.2008.153","DOIUrl":"https://doi.org/10.1109/CCCM.2008.153","url":null,"abstract":"In this paper, we present a graphic model of multiple-plane and multiple-stage packet switching system based on its topological architecture. We found that there are two vertex sub-sets belonging to the balanced vertex set and another two vertex sub-sets belonging to the competitive vertex set in MPMS model, respectively. Therefore, we only need to use balancing policies for the balanced vertex sets and use scheduling policies for the competitive vertex set to switch packets. Moreover, switching path counts (SPC) was proved to be equal to the multiplication of vertex out-degree of the balanced vertex sub-sets. Lastly, we studied the sufficient condition, is the SPC value is not less than parameter n, to offer enough non-conflicting switching paths for any vertex pair matching between DEMs and MUXs in MPMS.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122152288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
For human's vision, the edge forms where the value of color of an image changes rapidly. And the changes are so abstract that it is very difficult to quantize. In this paper, a method detecting color image edges based on triangle similarity is presented, which turn the color changes into the changes of a trianglepsilas form. It makes the abstract problem become not only quantization but also a problem shift to us that developed more perfect field. The experiment results show that the method exploits the color feature fully, raising the accuracy of edge detection and making sure the continuous of edges.
{"title":"An Approach of Color Image Edge Detection Based on Triangle Similarity","authors":"Han Junjun, Zhao Jingxiu, Wang Mian","doi":"10.1109/CCCM.2008.110","DOIUrl":"https://doi.org/10.1109/CCCM.2008.110","url":null,"abstract":"For human's vision, the edge forms where the value of color of an image changes rapidly. And the changes are so abstract that it is very difficult to quantize. In this paper, a method detecting color image edges based on triangle similarity is presented, which turn the color changes into the changes of a trianglepsilas form. It makes the abstract problem become not only quantization but also a problem shift to us that developed more perfect field. The experiment results show that the method exploits the color feature fully, raising the accuracy of edge detection and making sure the continuous of edges.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122198925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to compensate time-delay in the networked control system (NCS), the paper presents a state prediction control method which adopted time-stamp. At first, we studied a time-stamp based time-delay measuring algorithm of NCS and implemented the state prediction based time-delay compensation control to the system. Then, we proposed a state prediction control approach of establishing an approximate model to object states in the controller and actuator time-driven. With that, we designed a state prediction controller to make the system achieve prediction control and deduced the necessary and sufficient conditions for stabilizing the system. At last, the simulation results of the numerical example prove the validity of the proposed approach.
{"title":"Time-Delay Compensation Control of Networked Control Systems Using Timestamp Based State Prediction","authors":"Jiwei Hua, Tao Liang, Hexu Sun, Zhao-ming Lei","doi":"10.1109/CCCM.2008.333","DOIUrl":"https://doi.org/10.1109/CCCM.2008.333","url":null,"abstract":"In order to compensate time-delay in the networked control system (NCS), the paper presents a state prediction control method which adopted time-stamp. At first, we studied a time-stamp based time-delay measuring algorithm of NCS and implemented the state prediction based time-delay compensation control to the system. Then, we proposed a state prediction control approach of establishing an approximate model to object states in the controller and actuator time-driven. With that, we designed a state prediction controller to make the system achieve prediction control and deduced the necessary and sufficient conditions for stabilizing the system. At last, the simulation results of the numerical example prove the validity of the proposed approach.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129416813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
X. Shixiong, Yuan Guan, Zhang Lei, Deng Zhiwen, X. Jingyan
Smart terminal equipments, such as mobile phone, PDA etc., develop quickly at present. At the same time, there is huge information with various formats in the society, such as image, text, table etc. How to obtain information with WAP (Wireless Application Protocol) is an emergency problem nowadays. In allusion to this issue, a study on WAP self-adapt based on Web usage logs is proposed in the paper. Under the background of the application of data mining on the Web, the user interest algorithm and the WAP page rebuild algorithm with retrieval and mining of userpsilas usage logs data are put forward., user personalize data sharing in the WAP pages is implemented combining with the relevant user content interest algorithm.
{"title":"Study on Wap Self-Adapt Based on Web Usage Mining","authors":"X. Shixiong, Yuan Guan, Zhang Lei, Deng Zhiwen, X. Jingyan","doi":"10.1109/CCCM.2008.210","DOIUrl":"https://doi.org/10.1109/CCCM.2008.210","url":null,"abstract":"Smart terminal equipments, such as mobile phone, PDA etc., develop quickly at present. At the same time, there is huge information with various formats in the society, such as image, text, table etc. How to obtain information with WAP (Wireless Application Protocol) is an emergency problem nowadays. In allusion to this issue, a study on WAP self-adapt based on Web usage logs is proposed in the paper. Under the background of the application of data mining on the Web, the user interest algorithm and the WAP page rebuild algorithm with retrieval and mining of userpsilas usage logs data are put forward., user personalize data sharing in the WAP pages is implemented combining with the relevant user content interest algorithm.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129622365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Web Services makes network operators to accelerate the adoption of IT software concepts as service oriented architecture into the telecoms domain, which can reduce the time for value-added services to market. In this paper, we present an overview of the recent development in telecommunication area with a focus on key technologies that can be applied to Web service enablement of communication. In particular, we present the real-time Web services communication model (RT-WSCM) based on Session Initiation Protocol (SIP), and which is one of the most important protocols for multimedia and voice communication over IP communication, and also we introduce the more details for enhanced state machine, the messages dispatching design and implementation for RT-WSCM. Finally, we give the conclusion and future essential work.
{"title":"SIP Based Real-Time Web Services Communication Model","authors":"Cheng Bo, Guo Jie, Meng Xiangwu, Chen Junliang","doi":"10.1109/CCCM.2008.284","DOIUrl":"https://doi.org/10.1109/CCCM.2008.284","url":null,"abstract":"Web Services makes network operators to accelerate the adoption of IT software concepts as service oriented architecture into the telecoms domain, which can reduce the time for value-added services to market. In this paper, we present an overview of the recent development in telecommunication area with a focus on key technologies that can be applied to Web service enablement of communication. In particular, we present the real-time Web services communication model (RT-WSCM) based on Session Initiation Protocol (SIP), and which is one of the most important protocols for multimedia and voice communication over IP communication, and also we introduce the more details for enhanced state machine, the messages dispatching design and implementation for RT-WSCM. Finally, we give the conclusion and future essential work.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124615545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}