Given a stochastic communication network with a ring topology and n vertices, where the operational probability of each link is independent and no failures happen to vertices, we expect to determine the most reliable source on the network. In this paper, we propose an efficient algorithm whose time complexity is O(n^2).
{"title":"Computing the Most Reliable Source on Stochastic Ring Networks","authors":"Wei Ding","doi":"10.1109/WCSE.2009.31","DOIUrl":"https://doi.org/10.1109/WCSE.2009.31","url":null,"abstract":"Given a stochastic communication network with a ring topology and n vertices, where the operational probability of each link is independent and no failures happen to vertices, we expect to determine the most reliable source on the network. In this paper, we propose an efficient algorithm whose time complexity is O(n^2).","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134218058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to solve the lack of knowledge of the Information Security Vulnerability Analysis Expert System, the Dynamic Cooperation Mechanism that is based on the cooperation of data dictionary and knowledge base as well as relevant innovative techniques are put forward. Furthermore, the Expert System based on the Dynamic Cooperation Mechanism (ESDCM) is put forward to solve the information security vulnerability analysis problems. As the core of ESDCM, VA (Vulnerability Analysis) is made up of VAD-S (Vulnerability Analysis in Data-dictionary) and VAK-S (Vulnerability Analysis in Knowledge base). The paper introduced the process models of the VAD-S with the dynamic cooperation mechanism and the VAK-S based on Data Dictionary and Knowledge Base (DD-KB) mechanism; gave the comprehensive frame of ESDCM, discussed some subsystems and the dynamic knowledge base system of ESDCM; and finally proved the effectiveness and advantage of ESDCM. It is hopeful that ESDCM leads the expert system to a new stage.
为了解决信息安全漏洞分析专家系统知识不足的问题,提出了基于数据字典和知识库协同的动态合作机制以及相关创新技术。在此基础上,提出了基于动态合作机制的专家系统(ESDCM)来解决信息安全漏洞分析问题。VA (Vulnerability Analysis)是ESDCM的核心,由VAD-S (Vulnerability Analysis in Data-dictionary)和VAK-S (Vulnerability Analysis in Knowledge base)两部分组成。介绍了基于动态协作机制的VAD-S过程模型和基于数据字典和知识库(DD-KB)机制的VAD-S过程模型;给出了ESDCM的总体框架,讨论了ESDCM的若干子系统和动态知识库系统;最后证明了ESDCM的有效性和优越性。ESDCM有望将专家系统带入一个新的阶段。
{"title":"Information Security Vulnerability Analysis System Based on Dynamic Cooperation Mechanism","authors":"H. Ruo, Chenguang Tian","doi":"10.1109/WCSE.2009.135","DOIUrl":"https://doi.org/10.1109/WCSE.2009.135","url":null,"abstract":"In order to solve the lack of knowledge of the Information Security Vulnerability Analysis Expert System, the Dynamic Cooperation Mechanism that is based on the cooperation of data dictionary and knowledge base as well as relevant innovative techniques are put forward. Furthermore, the Expert System based on the Dynamic Cooperation Mechanism (ESDCM) is put forward to solve the information security vulnerability analysis problems. As the core of ESDCM, VA (Vulnerability Analysis) is made up of VAD-S (Vulnerability Analysis in Data-dictionary) and VAK-S (Vulnerability Analysis in Knowledge base). The paper introduced the process models of the VAD-S with the dynamic cooperation mechanism and the VAK-S based on Data Dictionary and Knowledge Base (DD-KB) mechanism; gave the comprehensive frame of ESDCM, discussed some subsystems and the dynamic knowledge base system of ESDCM; and finally proved the effectiveness and advantage of ESDCM. It is hopeful that ESDCM leads the expert system to a new stage.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133044787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This article analyzed the issues on decision-making system of book industry under chain model in the era of e-commerce and provided a Decision Support System solution. Comparing with a variety of decision-making analysis methods applying in the Book Issue, a multi-dimensional data model that is focus on book industry decision-making has been demonstrated.
{"title":"Demonstration of Book Issue Chain Decision Support and Multi-dimensional Data Model in E-commerce Era","authors":"Tong Shi, Jishun Zhu","doi":"10.1109/WCSE.2009.20","DOIUrl":"https://doi.org/10.1109/WCSE.2009.20","url":null,"abstract":"This article analyzed the issues on decision-making system of book industry under chain model in the era of e-commerce and provided a Decision Support System solution. Comparing with a variety of decision-making analysis methods applying in the Book Issue, a multi-dimensional data model that is focus on book industry decision-making has been demonstrated.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133381836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Guoqi Liu, Zhiliang Zhu, Yi-qiang Li, Dan-cheng Li, Y. Liu
Along with the rapid growth of the Web Service, the research of non-functional properties of Web Service(QoS) becomes a hotspot. The work in this paper is based on an extended service model. It puts forward a metric policy of comprehensive QoS, and the matching algorithm including two aspects: non-QoS constraint and QoS constraint. The experimental results prove that the algorithm is reliable and sensitive to constraint conditions.
{"title":"Description and Selection Model Based on Constraint QoS for Web Service","authors":"Guoqi Liu, Zhiliang Zhu, Yi-qiang Li, Dan-cheng Li, Y. Liu","doi":"10.1109/WCSE.2009.180","DOIUrl":"https://doi.org/10.1109/WCSE.2009.180","url":null,"abstract":"Along with the rapid growth of the Web Service, the research of non-functional properties of Web Service(QoS) becomes a hotspot. The work in this paper is based on an extended service model. It puts forward a metric policy of comprehensive QoS, and the matching algorithm including two aspects: non-QoS constraint and QoS constraint. The experimental results prove that the algorithm is reliable and sensitive to constraint conditions.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"375 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134101675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Though Shandong Peninsula urban agglomeration is highly urbanized and economically developed, it has serious environmental problems. Therefore, it is of special importance to carry out regional environmental management. As the environmental management information system for Shandong Peninsula urban agglomeration is an operational process suitable for spatial entities, GIS plays a basic and dominant role. The paper elaborates on analysis of the system including analysis of characteristics and requirements of users and analysis of functional requirements. Besides, the paper also discusses on data requirements including logical description on module data as well as sources and collection of data.
{"title":"Analysis on Requirement for the Environmental Management Information System for Shandong Peninsula Urban Agglomeration","authors":"Zhang Wei, Ren Jianlan","doi":"10.1109/WCSE.2009.320","DOIUrl":"https://doi.org/10.1109/WCSE.2009.320","url":null,"abstract":"Though Shandong Peninsula urban agglomeration is highly urbanized and economically developed, it has serious environmental problems. Therefore, it is of special importance to carry out regional environmental management. As the environmental management information system for Shandong Peninsula urban agglomeration is an operational process suitable for spatial entities, GIS plays a basic and dominant role. The paper elaborates on analysis of the system including analysis of characteristics and requirements of users and analysis of functional requirements. Besides, the paper also discusses on data requirements including logical description on module data as well as sources and collection of data.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122901586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dynamic simulation for the producting process of gas well is the foundation of optimizing allocation. We designed DSOAS to do this job which is able to calculate the basic parameters and predict the output of gas well and pools. Several new methods are used in this system to simulate the gas well production such as differential simulation and neural networks. Finally, the optimal allocation of single gas well is achieved with the accuracy above 80%.
{"title":"A Dynamic System for Gas Well Production","authors":"Zhi-bin Liu, Chao Min, Yan Yang","doi":"10.1109/WCSE.2009.123","DOIUrl":"https://doi.org/10.1109/WCSE.2009.123","url":null,"abstract":"Dynamic simulation for the producting process of gas well is the foundation of optimizing allocation. We designed DSOAS to do this job which is able to calculate the basic parameters and predict the output of gas well and pools. Several new methods are used in this system to simulate the gas well production such as differential simulation and neural networks. Finally, the optimal allocation of single gas well is achieved with the accuracy above 80%.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115806690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a new kind of multi-axis electro-discharge machining (EDM) computer numerical control (CNC) system which is based on RT Linux platform. Dual-kernel structure of EDM CNC System is proposed to realize real-time task and timesharing task separately. The whole system consists of Real-time Control Module, Drive Module, CNC User Module and Communications among them. The Realtime Control Module implements Real-time control to the EDM CNC machine. Drive Module implements driving of EDM special hardwares. CNC User Module is user manage procedure. Communications among them implement data and signal transfer. Processing of Turbine Blisk is experimentalized to validate the performance of the system. The process and the result simply that the system is Real-time, stable and reliable.
{"title":"Development of a CNC System for Multi-axis EDM Based on RT-Linux","authors":"H. Huang, G. Chi, Zhenlong Wang","doi":"10.1109/WCSE.2009.139","DOIUrl":"https://doi.org/10.1109/WCSE.2009.139","url":null,"abstract":"This paper presents a new kind of multi-axis electro-discharge machining (EDM) computer numerical control (CNC) system which is based on RT Linux platform. Dual-kernel structure of EDM CNC System is proposed to realize real-time task and timesharing task separately. The whole system consists of Real-time Control Module, Drive Module, CNC User Module and Communications among them. The Realtime Control Module implements Real-time control to the EDM CNC machine. Drive Module implements driving of EDM special hardwares. CNC User Module is user manage procedure. Communications among them implement data and signal transfer. Processing of Turbine Blisk is experimentalized to validate the performance of the system. The process and the result simply that the system is Real-time, stable and reliable.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131543623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper explores the use of ontology based methods to determine the geographic locations of Chinese offset addresses. Offset addresses are those addresses which contain a natural language location description reference to another location. The study has two parts, 1) the definition of a geo-spatial ontology for Chinese addresses, and 2) the design of spatial computation rules to enable spatial reasoning and location computation. Web Ontology Language(OWL) is used in the first part to describe domain concepts, relationship between them. Semantic Web Rule Language (SWRL) is used in the second part to describe the rules that enable the process of spatial computation and reasoning. The computed result after reasoning can be saved to the knowledge base and employed as new knowledge. A prototype is built to verify the model and the algorithm. The results demonstrate the feasibility of approach. They also revealed potential problems for spatial computations based on ontology.
{"title":"An Ontology Based Prototype for Geocoding Offset Addresses","authors":"L. Ding, Xuehu Zhang, Ran Wei, Haoming Ma, Qi Li","doi":"10.1109/WCSE.2009.90","DOIUrl":"https://doi.org/10.1109/WCSE.2009.90","url":null,"abstract":"This paper explores the use of ontology based methods to determine the geographic locations of Chinese offset addresses. Offset addresses are those addresses which contain a natural language location description reference to another location. The study has two parts, 1) the definition of a geo-spatial ontology for Chinese addresses, and 2) the design of spatial computation rules to enable spatial reasoning and location computation. Web Ontology Language(OWL) is used in the first part to describe domain concepts, relationship between them. Semantic Web Rule Language (SWRL) is used in the second part to describe the rules that enable the process of spatial computation and reasoning. The computed result after reasoning can be saved to the knowledge base and employed as new knowledge. A prototype is built to verify the model and the algorithm. The results demonstrate the feasibility of approach. They also revealed potential problems for spatial computations based on ontology.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134513206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we provide a quantum determined key distribution protocol using quantum telportation. Unlike the previous protocols which produce a random string in the key distribution process as the key, in our protocol the two parties can share a predetermined binary string as the key with the help of quantum teleportation. The principles of quantum mechanics guarantees that no other people can get the key. So the protocol is unconditionally secure.
{"title":"Quantum Determined Key Distribution Scheme Using Quantum Teleportation","authors":"Xiaoyu Li, Nianqing Wan, Dexi Zhang","doi":"10.1109/WCSE.2009.52","DOIUrl":"https://doi.org/10.1109/WCSE.2009.52","url":null,"abstract":"In this paper we provide a quantum determined key distribution protocol using quantum telportation. Unlike the previous protocols which produce a random string in the key distribution process as the key, in our protocol the two parties can share a predetermined binary string as the key with the help of quantum teleportation. The principles of quantum mechanics guarantees that no other people can get the key. So the protocol is unconditionally secure.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132269575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The eDonkey servers implement a number of protective mechanisms against observation and attacks in order to maintain stability of eDonkey network. we introduce a new crawling technique which can breakthrough these restrictions to gather information. On the basis of the technique, we collect data from the edonkey network by using an experimental client. Based on collected information, the paper analyze the data from the edonkey network and summarize the server distribution characteristics and the distribution characteristics of shared files.
{"title":"A Study on Resource Distribution of the Edonkey","authors":"Qi Wu, Xingshu Chen, Wenxian Wang, Q. Lv","doi":"10.1109/WCSE.2009.37","DOIUrl":"https://doi.org/10.1109/WCSE.2009.37","url":null,"abstract":"The eDonkey servers implement a number of protective mechanisms against observation and attacks in order to maintain stability of eDonkey network. we introduce a new crawling technique which can breakthrough these restrictions to gather information. On the basis of the technique, we collect data from the edonkey network by using an experimental client. Based on collected information, the paper analyze the data from the edonkey network and summarize the server distribution characteristics and the distribution characteristics of shared files.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132303419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}