Pub Date : 2012-05-29DOI: 10.1109/FSKD.2012.6234095
Duan Geng, Weichang Shen, J. Cui, Lin Quan
KMP algorithm is a common method of string matching. In view of the characteristics of the string matching and cluster, this article uses MPI + OpenMP hybrid programming model; and KMP algorithm was improved to statistics the number of target words appearing in parallel. Experiments show that the parallel algorithm improves effectively the matching speed, and is higher utilization with memory and less communication time than pure MPI.
{"title":"The implementation of KMP algorithm based on MPI + OpenMP","authors":"Duan Geng, Weichang Shen, J. Cui, Lin Quan","doi":"10.1109/FSKD.2012.6234095","DOIUrl":"https://doi.org/10.1109/FSKD.2012.6234095","url":null,"abstract":"KMP algorithm is a common method of string matching. In view of the characteristics of the string matching and cluster, this article uses MPI + OpenMP hybrid programming model; and KMP algorithm was improved to statistics the number of target words appearing in parallel. Experiments show that the parallel algorithm improves effectively the matching speed, and is higher utilization with memory and less communication time than pure MPI.","PeriodicalId":337941,"journal":{"name":"International Conference on Fuzzy Systems and Knowledge Discovery","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115716437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-05-29DOI: 10.1109/FSKD.2012.6233759
Hu-sheng Liao, Guangyuan Dai, Ruoyun Chen
Uncoordinated agents in society usually assumed to take their own optimal strategies do not always achieve the social optimum. In transportation network, travelers are assumed to choose the route that minimizes their own travel costs, which will form a Nash Equilibrium called user equilibrium where no one could be better off by changing routes in the network. This type of routing strategy named self-routing is socially suboptimal. Consequently the society has to pay a price of anarchy for the lack of coordination among travelers. In this paper we revisit the definition of price of anarchy (POA) and analyze its upper bound under different latency functions. We review some simulation results of several major cities and investigate the difference between optimum and actual system performance in the real transportation network. A numerical simulation of Sioux network is conducted based on the classical computational procedures. The results indicate that the shape of POA as a function of input flow is not diatonic but rather fluctuating. Then we propose some more insights of POA.
{"title":"Research and simulation on the upper bound of the price of network anarchy","authors":"Hu-sheng Liao, Guangyuan Dai, Ruoyun Chen","doi":"10.1109/FSKD.2012.6233759","DOIUrl":"https://doi.org/10.1109/FSKD.2012.6233759","url":null,"abstract":"Uncoordinated agents in society usually assumed to take their own optimal strategies do not always achieve the social optimum. In transportation network, travelers are assumed to choose the route that minimizes their own travel costs, which will form a Nash Equilibrium called user equilibrium where no one could be better off by changing routes in the network. This type of routing strategy named self-routing is socially suboptimal. Consequently the society has to pay a price of anarchy for the lack of coordination among travelers. In this paper we revisit the definition of price of anarchy (POA) and analyze its upper bound under different latency functions. We review some simulation results of several major cities and investigate the difference between optimum and actual system performance in the real transportation network. A numerical simulation of Sioux network is conducted based on the classical computational procedures. The results indicate that the shape of POA as a function of input flow is not diatonic but rather fluctuating. Then we propose some more insights of POA.","PeriodicalId":337941,"journal":{"name":"International Conference on Fuzzy Systems and Knowledge Discovery","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115731773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-05-29DOI: 10.1109/FSKD.2012.6234118
Bing Zhang, Jiyou Xiong, Zhikun Liu, Yanwei Bai, Qi Li
The drilling engineering design of a well needs collaborative work of designers from multidisciplinary fields such as geology, reservoir engineering and drilling engineering, or designers distributed in different departments. Because there is closely data relevance among every parts of the drilling engineering design which needs the designers in different departments to exchange a lot of data and documents according to a certain design process, any delay in parts of design process will affect the timeliness and accuracy of the whole drilling engineering design. The authors integrated workflow theory into process management of drilling engineering collaborative design system, built workflow management model of Drilling Engineering Collaborative Design System. The paper analyses function of the five sub-modules in this model in detail combining realization process of the system. So it provides an effective method for process management of Drilling Engineering Collaborative Design System, and improved actual operating efficiency of the system.
{"title":"Research of process management on drilling engineering collaborative design system based on workflow","authors":"Bing Zhang, Jiyou Xiong, Zhikun Liu, Yanwei Bai, Qi Li","doi":"10.1109/FSKD.2012.6234118","DOIUrl":"https://doi.org/10.1109/FSKD.2012.6234118","url":null,"abstract":"The drilling engineering design of a well needs collaborative work of designers from multidisciplinary fields such as geology, reservoir engineering and drilling engineering, or designers distributed in different departments. Because there is closely data relevance among every parts of the drilling engineering design which needs the designers in different departments to exchange a lot of data and documents according to a certain design process, any delay in parts of design process will affect the timeliness and accuracy of the whole drilling engineering design. The authors integrated workflow theory into process management of drilling engineering collaborative design system, built workflow management model of Drilling Engineering Collaborative Design System. The paper analyses function of the five sub-modules in this model in detail combining realization process of the system. So it provides an effective method for process management of Drilling Engineering Collaborative Design System, and improved actual operating efficiency of the system.","PeriodicalId":337941,"journal":{"name":"International Conference on Fuzzy Systems and Knowledge Discovery","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123902295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-05-29DOI: 10.1109/FSKD.2012.6233940
C. Chen, Jia Tang
Classifier is the important content in the face recognition system. This paper uses PCA to extract the face image feature and then compares the recognition performance of several classifiers. Based on ORL and YALE face database, the paper carries out simulation experiment by using minimum distance classifier, nearest-neighbor classifier and K-neighbor classifier respectively. Besides, this paper researches different distance measures' effects on the recognition result of the classifiers, Euclidean distance, Minkowski distance, cosine distance and absolute distance.
{"title":"Simulation study on the performance of several classifiers in face recognition","authors":"C. Chen, Jia Tang","doi":"10.1109/FSKD.2012.6233940","DOIUrl":"https://doi.org/10.1109/FSKD.2012.6233940","url":null,"abstract":"Classifier is the important content in the face recognition system. This paper uses PCA to extract the face image feature and then compares the recognition performance of several classifiers. Based on ORL and YALE face database, the paper carries out simulation experiment by using minimum distance classifier, nearest-neighbor classifier and K-neighbor classifier respectively. Besides, this paper researches different distance measures' effects on the recognition result of the classifiers, Euclidean distance, Minkowski distance, cosine distance and absolute distance.","PeriodicalId":337941,"journal":{"name":"International Conference on Fuzzy Systems and Knowledge Discovery","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129280713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-05-29DOI: 10.1109/FSKD.2012.6233744
Dan Wang, Haifeng Jia
This paper investigated the traditional method to determine Physical Downlink Control Channel (PDCCH) format and Control Format Indicator (CFI) value in LTE (Long Term Evolution) system. A modified method to calculate CFI value and the PDCCH format was proposed. Firstly, this method determined the PDCCH format based on the channel conditions, and then calculated the number of Resource Elements (RE) occupied by all the downlink control channels and reference signals. Finally, determined the CFI value based on the calculated number. The simulation results show that this modified method can effectively eliminate the average number of PDCCH blind detection.
{"title":"Research of calculating CFI value used in LTE system","authors":"Dan Wang, Haifeng Jia","doi":"10.1109/FSKD.2012.6233744","DOIUrl":"https://doi.org/10.1109/FSKD.2012.6233744","url":null,"abstract":"This paper investigated the traditional method to determine Physical Downlink Control Channel (PDCCH) format and Control Format Indicator (CFI) value in LTE (Long Term Evolution) system. A modified method to calculate CFI value and the PDCCH format was proposed. Firstly, this method determined the PDCCH format based on the channel conditions, and then calculated the number of Resource Elements (RE) occupied by all the downlink control channels and reference signals. Finally, determined the CFI value based on the calculated number. The simulation results show that this modified method can effectively eliminate the average number of PDCCH blind detection.","PeriodicalId":337941,"journal":{"name":"International Conference on Fuzzy Systems and Knowledge Discovery","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129394898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-05-29DOI: 10.1109/FSKD.2012.6233839
Zheng Yang, Jie Sheng, Liangrui Tang
Since existing call admission control (CAC) algorithms designed for heterogeneous wireless networks have failed to consider different characteristics of mobile users and the network load sufficiently, a CAC algorithm based on triangle module operator is proposed. First, proper utility functions are formed with consideration of user satisfaction and mobility as well as the network performance, and then fused by the use of triangle module operator to select the candidate network with the highest trustworthy as the optimal access network. Simulation results demonstrate that the proposed CAC scheme can benefit both users and networks by handling the uncertainty and time-varying information appropriately on finally fuzzy decision.
{"title":"A novel call admission control scheme based on triangle module operator for heterogeneous wireless networks","authors":"Zheng Yang, Jie Sheng, Liangrui Tang","doi":"10.1109/FSKD.2012.6233839","DOIUrl":"https://doi.org/10.1109/FSKD.2012.6233839","url":null,"abstract":"Since existing call admission control (CAC) algorithms designed for heterogeneous wireless networks have failed to consider different characteristics of mobile users and the network load sufficiently, a CAC algorithm based on triangle module operator is proposed. First, proper utility functions are formed with consideration of user satisfaction and mobility as well as the network performance, and then fused by the use of triangle module operator to select the candidate network with the highest trustworthy as the optimal access network. Simulation results demonstrate that the proposed CAC scheme can benefit both users and networks by handling the uncertainty and time-varying information appropriately on finally fuzzy decision.","PeriodicalId":337941,"journal":{"name":"International Conference on Fuzzy Systems and Knowledge Discovery","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122663421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-05-29DOI: 10.1109/FSKD.2012.6234092
Lin Quan, Weichang Shen, J. Cui, Duan Geng
The paper aims at the problem that is 0–1 knapsack algorithm used to MH method, analyzes several kinds of method of the 0–1 knapsack, and puts forward the MPI + OpenMP optimal hybrid programming model which is used to this application. The experimental results show that the hybrid programming model is an effective method to solve this problem.
{"title":"Application of 0-1 knapsack MPI + OpenMP hybrid programming algorithm at MH method","authors":"Lin Quan, Weichang Shen, J. Cui, Duan Geng","doi":"10.1109/FSKD.2012.6234092","DOIUrl":"https://doi.org/10.1109/FSKD.2012.6234092","url":null,"abstract":"The paper aims at the problem that is 0–1 knapsack algorithm used to MH method, analyzes several kinds of method of the 0–1 knapsack, and puts forward the MPI + OpenMP optimal hybrid programming model which is used to this application. The experimental results show that the hybrid programming model is an effective method to solve this problem.","PeriodicalId":337941,"journal":{"name":"International Conference on Fuzzy Systems and Knowledge Discovery","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127658370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-05-29DOI: 10.1109/FSKD.2012.6233767
Jia-yang Wang, Shuang-ying Xue, Sirui Chen
The paper analyses the deficiencies of traditional generalized dynamic reduct algorithm and proposes a fast algorithm based on the validity of reduct. The algorithm only needs to calculate part of the subtable to get the generalized dynamic reduct. It decreases the number of subtables that need to calculate the reduct by using the stability threshold, and filters the reduct of subtables that are not to be the generalized dynamic reduct by utilizing the optimal stability coefficient. The result shows that the fast method is more effective than the traditional algorithm.
{"title":"The research on optimization method for dynamic reduct","authors":"Jia-yang Wang, Shuang-ying Xue, Sirui Chen","doi":"10.1109/FSKD.2012.6233767","DOIUrl":"https://doi.org/10.1109/FSKD.2012.6233767","url":null,"abstract":"The paper analyses the deficiencies of traditional generalized dynamic reduct algorithm and proposes a fast algorithm based on the validity of reduct. The algorithm only needs to calculate part of the subtable to get the generalized dynamic reduct. It decreases the number of subtables that need to calculate the reduct by using the stability threshold, and filters the reduct of subtables that are not to be the generalized dynamic reduct by utilizing the optimal stability coefficient. The result shows that the fast method is more effective than the traditional algorithm.","PeriodicalId":337941,"journal":{"name":"International Conference on Fuzzy Systems and Knowledge Discovery","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121395583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-05-29DOI: 10.1109/FSKD.2012.6234237
Mei-li Huang, Zongtian Liu
Event plays an important role in the field of semantic understanding that associates entities. Although traditional ontology is an effective model to represent domain concept hierarchies and semantics, it simply considers event same as static concept or describes it as relationship. This paper proposes a layered event ontology model which emphasis on event and layered the traditional ontology by excluding events from concepts have the static characterization, describing them at different levels respectively, meanwhile tie them by element relationship. It finally suggests the method to construct layered event ontology from existent ontology which is under the traditional model, and provides an example to explain it.
{"title":"Layered event ontology model","authors":"Mei-li Huang, Zongtian Liu","doi":"10.1109/FSKD.2012.6234237","DOIUrl":"https://doi.org/10.1109/FSKD.2012.6234237","url":null,"abstract":"Event plays an important role in the field of semantic understanding that associates entities. Although traditional ontology is an effective model to represent domain concept hierarchies and semantics, it simply considers event same as static concept or describes it as relationship. This paper proposes a layered event ontology model which emphasis on event and layered the traditional ontology by excluding events from concepts have the static characterization, describing them at different levels respectively, meanwhile tie them by element relationship. It finally suggests the method to construct layered event ontology from existent ontology which is under the traditional model, and provides an example to explain it.","PeriodicalId":337941,"journal":{"name":"International Conference on Fuzzy Systems and Knowledge Discovery","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114770134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-05-29DOI: 10.1109/FSKD.2012.6234219
Su-Hong He, Lei Chen
The complex network theory provides the new ways to explore warfare law. The precondition of network-centric warfare is the construction of warfare network topology models. Studying the impact of network topology on military combat performance based on complex networks theory. A good warfare network needs small average path length, great cluster coefficient and scale-free degree distribution. The experimental results show that traditional tree network can not reflect the characteristics of the information warfare. We give some proposals to improve tree network and select random Apollonian network as the best representation of combat network.
{"title":"Research on complex network topology model based information warfare system","authors":"Su-Hong He, Lei Chen","doi":"10.1109/FSKD.2012.6234219","DOIUrl":"https://doi.org/10.1109/FSKD.2012.6234219","url":null,"abstract":"The complex network theory provides the new ways to explore warfare law. The precondition of network-centric warfare is the construction of warfare network topology models. Studying the impact of network topology on military combat performance based on complex networks theory. A good warfare network needs small average path length, great cluster coefficient and scale-free degree distribution. The experimental results show that traditional tree network can not reflect the characteristics of the information warfare. We give some proposals to improve tree network and select random Apollonian network as the best representation of combat network.","PeriodicalId":337941,"journal":{"name":"International Conference on Fuzzy Systems and Knowledge Discovery","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130105854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}