首页 > 最新文献

6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)最新文献

英文 中文
IDSX: A Cluster Based Collaborative Intrusion Detection Algorithm for Mobile Ad-Hoc Network 一种基于集群的移动Ad-Hoc网络协同入侵检测算法
R. Chaki, N. Chaki
Ad hoc mobile networks (MANET) vary greatly depending on their application area and environment in which they work. We have presented a brief review of the state of the art security scenario for MANETs and also pinpointed some of the loopholes of the existing intrusion detection systems (IDS) before we proposed a new collaborative algorithm called IDSX. The proposed IDSX offers an extended architecture and is compatible with heterogeneous IDS already deployed in the participating nodes. While maintaining a high level of intrusion detection, the proposed solution virtually eliminates the problem of phantom intrusion detection to a great extent by aggregating the locally generated alerts to keep or discard a suspected intruder in a two step process.
自组织移动网络(MANET)根据其应用领域和工作环境的不同而变化很大。在我们提出一种新的称为IDSX的协作算法之前,我们简要回顾了manet的最新安全方案,并指出了现有入侵检测系统(IDS)的一些漏洞。提议的IDSX提供了一个扩展的体系结构,并且与已经部署在参与节点中的异构IDS兼容。在保持高水平入侵检测的同时,提出的解决方案通过聚合本地生成的警报,在两步过程中保留或丢弃可疑的入侵者,从而在很大程度上消除了虚拟入侵检测的问题。
{"title":"IDSX: A Cluster Based Collaborative Intrusion Detection Algorithm for Mobile Ad-Hoc Network","authors":"R. Chaki, N. Chaki","doi":"10.1109/CISIM.2007.38","DOIUrl":"https://doi.org/10.1109/CISIM.2007.38","url":null,"abstract":"Ad hoc mobile networks (MANET) vary greatly depending on their application area and environment in which they work. We have presented a brief review of the state of the art security scenario for MANETs and also pinpointed some of the loopholes of the existing intrusion detection systems (IDS) before we proposed a new collaborative algorithm called IDSX. The proposed IDSX offers an extended architecture and is compatible with heterogeneous IDS already deployed in the participating nodes. While maintaining a high level of intrusion detection, the proposed solution virtually eliminates the problem of phantom intrusion detection to a great extent by aggregating the locally generated alerts to keep or discard a suspected intruder in a two step process.","PeriodicalId":350490,"journal":{"name":"6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126581424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Hybrid Intelligent Diagnosis Systems 混合智能诊断系统
A. Chohra, N. Kanaoui, K. Madani
In this paper, the main objective is to give a methodology to design hybrid intelligent diagnosis systems for a large field of biomedicine and industrial applications. At first, a brief description on diagnosis tasks in such applications is presented. Second, diagnosis systems are presented. Third, the main steps of hybrid intelligent diagnosis systems are developed, for each step emphasizing problems and suggesting solutions able to ensure the design of hybrid intelligent diagnosis systems with a satisfactory reliability degree. In fact, the main steps discussed are knowledge representation, classification, classifier issued information fusion, and decision-making. Finally, a discussion is given with regard to the suggested methodology.
本文的主要目标是给出一种用于生物医学和工业应用的混合智能诊断系统的设计方法。首先,简要介绍了此类应用中的诊断任务。其次,介绍了诊断系统。第三,制定了混合智能诊断系统的主要步骤,针对每个步骤强调问题并提出解决方案,确保混合智能诊断系统的设计具有满意的可靠性。实际上,讨论的主要步骤是知识表示、分类、分类器发布的信息融合和决策。最后,对所建议的方法进行了讨论。
{"title":"Hybrid Intelligent Diagnosis Systems","authors":"A. Chohra, N. Kanaoui, K. Madani","doi":"10.1109/CISIM.2007.36","DOIUrl":"https://doi.org/10.1109/CISIM.2007.36","url":null,"abstract":"In this paper, the main objective is to give a methodology to design hybrid intelligent diagnosis systems for a large field of biomedicine and industrial applications. At first, a brief description on diagnosis tasks in such applications is presented. Second, diagnosis systems are presented. Third, the main steps of hybrid intelligent diagnosis systems are developed, for each step emphasizing problems and suggesting solutions able to ensure the design of hybrid intelligent diagnosis systems with a satisfactory reliability degree. In fact, the main steps discussed are knowledge representation, classification, classifier issued information fusion, and decision-making. Finally, a discussion is given with regard to the suggested methodology.","PeriodicalId":350490,"journal":{"name":"6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126326639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Spread Spectrum Signals Classification Based on the Wigner-Ville Distribution and Neural Network Probability Density Function Estimation 基于Wigner-Ville分布和神经网络概率密度函数估计的扩频信号分类
Y. Grishin
A spread spectrum signal recognition can be accomplished by exploiting the particular features of modulation presented in a received signal observed in presence of noise. These modulation features are the result of slight transmitter component variations and acts as an individual signature of a transmitter. The paper describes a spread spectrum signal classification algorithm based on using the Wigner-Ville distribution (WVD), noise reduction procedure with using a two- dimensional filter and the RBF neural network probability density function estimator which extracts the features vector used for the final signal classification. The numerical simulation results for the P4-coded signals are presented.
扩频信号识别可以通过利用在存在噪声时观察到的接收信号中呈现的调制的特定特征来完成。这些调制特性是发射机部件轻微变化的结果,并作为发射机的单个特征。本文介绍了一种基于Wigner-Ville分布(WVD)的扩频信号分类算法,采用二维滤波器和RBF神经网络概率密度函数估计方法提取特征向量用于最终的信号分类。给出了p4编码信号的数值模拟结果。
{"title":"Spread Spectrum Signals Classification Based on the Wigner-Ville Distribution and Neural Network Probability Density Function Estimation","authors":"Y. Grishin","doi":"10.1109/CISIM.2007.62","DOIUrl":"https://doi.org/10.1109/CISIM.2007.62","url":null,"abstract":"A spread spectrum signal recognition can be accomplished by exploiting the particular features of modulation presented in a received signal observed in presence of noise. These modulation features are the result of slight transmitter component variations and acts as an individual signature of a transmitter. The paper describes a spread spectrum signal classification algorithm based on using the Wigner-Ville distribution (WVD), noise reduction procedure with using a two- dimensional filter and the RBF neural network probability density function estimator which extracts the features vector used for the final signal classification. The numerical simulation results for the P4-coded signals are presented.","PeriodicalId":350490,"journal":{"name":"6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133027117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ICA Based on KPCA and Hybrid Flexible Neural Tree to Face Recognition 基于KPCA和混合柔性神经树的ICA人脸识别
Jin Zhou, Yang Liu, Yuehui Chen
In this paper, a new approach using independent component analysis (ica) and hybrid Flexible Neural Tree (FNT) is put forward for face recognition. To improve the quality of the face images, a series of image pre-processing techniques, which include histogram equalization, edge detection and geometrical transformation are used. The ICA based on Kernel principal component analysis (KPCA) and FastICA is employed to extract features, and the Hybrid FNT is used to identify the faces. To accelerate the convergence of the FNT and improve the quality of the solutions, the extended compact genetic programming (ECGP) and particle swarm optimization (PSO) are applied to optimize the FNT structure and parameters. The experimental results show that the proposed framework is efficient for face recognition.
提出了一种基于独立分量分析(ica)和混合柔性神经树(FNT)的人脸识别方法。为了提高人脸图像的质量,采用了直方图均衡化、边缘检测和几何变换等一系列图像预处理技术。采用基于核主成分分析(KPCA)和FastICA的ICA提取特征,混合FNT进行人脸识别。为了加快FNT的收敛速度和提高解的质量,采用扩展紧凑遗传规划(ECGP)和粒子群优化(PSO)对FNT的结构和参数进行优化。实验结果表明,该框架对人脸识别是有效的。
{"title":"ICA Based on KPCA and Hybrid Flexible Neural Tree to Face Recognition","authors":"Jin Zhou, Yang Liu, Yuehui Chen","doi":"10.1109/CISIM.2007.37","DOIUrl":"https://doi.org/10.1109/CISIM.2007.37","url":null,"abstract":"In this paper, a new approach using independent component analysis (ica) and hybrid Flexible Neural Tree (FNT) is put forward for face recognition. To improve the quality of the face images, a series of image pre-processing techniques, which include histogram equalization, edge detection and geometrical transformation are used. The ICA based on Kernel principal component analysis (KPCA) and FastICA is employed to extract features, and the Hybrid FNT is used to identify the faces. To accelerate the convergence of the FNT and improve the quality of the solutions, the extended compact genetic programming (ECGP) and particle swarm optimization (PSO) are applied to optimize the FNT structure and parameters. The experimental results show that the proposed framework is efficient for face recognition.","PeriodicalId":350490,"journal":{"name":"6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122766571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
UBMSS (Understanding Based Managing Support Systems) as an Example of the Application of Cognitive Analysis in Data Analysis 基于理解的管理支持系统(UBMSS)作为认知分析在数据分析中的应用实例
L. Ogiela
This paper discusses a general method of applying UBMSS (understanding based managing support systems) in data analysis. The method proposed is based on the analysis of economic data, especially data that is essential for a company's strategic decisions. The general method of applying UBMSS as sub-systems of a more general class of cognitive categorization systems is presented as a theoretical example of economic data analysis and interpretation.
本文讨论了在数据分析中应用基于理解的管理支持系统(UBMSS)的一般方法。所提出的方法是基于对经济数据的分析,特别是对公司战略决策至关重要的数据。作为经济数据分析和解释的理论实例,提出了将ubms作为更一般的认知分类系统的子系统的一般方法。
{"title":"UBMSS (Understanding Based Managing Support Systems) as an Example of the Application of Cognitive Analysis in Data Analysis","authors":"L. Ogiela","doi":"10.1109/CISIM.2007.69","DOIUrl":"https://doi.org/10.1109/CISIM.2007.69","url":null,"abstract":"This paper discusses a general method of applying UBMSS (understanding based managing support systems) in data analysis. The method proposed is based on the analysis of economic data, especially data that is essential for a company's strategic decisions. The general method of applying UBMSS as sub-systems of a more general class of cognitive categorization systems is presented as a theoretical example of economic data analysis and interpretation.","PeriodicalId":350490,"journal":{"name":"6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122621988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Image Feature Extraction Methods for Ear Biometrics--A Survey 耳生物特征图像特征提取方法综述
M. Choraś
The human ear is a perfect source of data for passive person identification in many applications. In a growing need for security in various public places, ear biometrics seems to be a good solution, since ears are visible and their images can be easily taken, even without the examined person's knowledge. Then the robust feature extraction method can be applied to determine personality of individuals, for instance users of access control system or terrorists at the airports and stations. The growing interest in ear biometrics is best evidenced by the growth of publications over the last few years. More importantly research groups developed different approaches to a problem of feature selection and extraction for ear biometrics. In the article we overview the proposed algorithms of feature extraction from 2D and 3D ear images.
在许多应用中,人耳是被动身份识别的完美数据来源。在各种公共场所日益增长的安全需求中,耳朵生物识别技术似乎是一个很好的解决方案,因为耳朵是可见的,即使在被检查人不知情的情况下,耳朵的图像也很容易被拍摄下来。然后应用鲁棒特征提取方法来确定个体的个性,例如门禁系统的用户或机场、车站的恐怖分子。对耳朵生物识别技术日益增长的兴趣最好的证明是在过去几年中出版物的增长。更重要的是,研究小组开发了不同的方法来解决耳朵生物识别的特征选择和提取问题。在本文中,我们概述了提出的二维和三维耳图像特征提取算法。
{"title":"Image Feature Extraction Methods for Ear Biometrics--A Survey","authors":"M. Choraś","doi":"10.1109/CISIM.2007.40","DOIUrl":"https://doi.org/10.1109/CISIM.2007.40","url":null,"abstract":"The human ear is a perfect source of data for passive person identification in many applications. In a growing need for security in various public places, ear biometrics seems to be a good solution, since ears are visible and their images can be easily taken, even without the examined person's knowledge. Then the robust feature extraction method can be applied to determine personality of individuals, for instance users of access control system or terrorists at the airports and stations. The growing interest in ear biometrics is best evidenced by the growth of publications over the last few years. More importantly research groups developed different approaches to a problem of feature selection and extraction for ear biometrics. In the article we overview the proposed algorithms of feature extraction from 2D and 3D ear images.","PeriodicalId":350490,"journal":{"name":"6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125308344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
GUI Patterns and Web Semantics GUI模式和Web语义
V. Snás̃el
In this paper, we introduce a new approach to semantic analysis of Web pages. To prove this approach we designed method for analysis and evaluation of Web pages. The method is built on a silent agreement between Web designers and users. The key aspects of this agreement are Web patterns which are used by Web designers in their Web page implementations. With our method we can find out whether the pattern is presented on the page with high level of relevance. Key feature of our method is independence on the page HTML code. In this lecture we explain essentials of our approach as well as key features of our method and context for proper usage. We present experiments which prove efficiency of the method and usefulness of the approach.
本文介绍了一种新的网页语义分析方法。为了证明这种方法,我们设计了一种对网页进行分析和评估的方法。该方法建立在Web设计人员和用户之间的无声协议之上。该协议的关键方面是Web设计人员在其Web页面实现中使用的Web模式。通过我们的方法,我们可以发现模式是否呈现在具有高相关性的页面上。我们的方法的主要特点是独立于页面的HTML代码。在这个讲座中,我们将解释我们的方法的要点,以及我们的方法的关键特征和正确使用的上下文。实验证明了该方法的有效性和实用性。
{"title":"GUI Patterns and Web Semantics","authors":"V. Snás̃el","doi":"10.1109/CISIM.2007.34","DOIUrl":"https://doi.org/10.1109/CISIM.2007.34","url":null,"abstract":"In this paper, we introduce a new approach to semantic analysis of Web pages. To prove this approach we designed method for analysis and evaluation of Web pages. The method is built on a silent agreement between Web designers and users. The key aspects of this agreement are Web patterns which are used by Web designers in their Web page implementations. With our method we can find out whether the pattern is presented on the page with high level of relevance. Key feature of our method is independence on the page HTML code. In this lecture we explain essentials of our approach as well as key features of our method and context for proper usage. We present experiments which prove efficiency of the method and usefulness of the approach.","PeriodicalId":350490,"journal":{"name":"6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117224908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Ants and Multiple Knapsack Problem 蚂蚁与多重背包问题
U. Boryczka
In this paper a new optimization algorithm based on ant colony metaphor (ACO)and a new approach for the Multiple Knapsack Problem is presented. The MKP is the problem of assigning a subset of n items to m distinct knapsacks, such that the total profit sum of the selected items is maximized, without exceeding the capacity of each of the knapsacks. The problem has several difficulties in adaptation as well as the trail representation of the solutions of MKP or a dynamically changed heuristic function applied in this approach. Presented results show the power of the ACO approach for solving this type of subset problems.
本文提出了一种新的基于蚁群隐喻的优化算法和一种求解多背包问题的新方法。MKP问题是将n个物品的子集分配给m个不同的背包,使所选物品的总利润最大化,而不超过每个背包的容量。该问题在自适应以及MKP解的轨迹表示或该方法中应用的动态变化的启发式函数方面存在一些困难。给出的结果显示了蚁群算法解决这类子集问题的能力。
{"title":"Ants and Multiple Knapsack Problem","authors":"U. Boryczka","doi":"10.1109/CISIM.2007.12","DOIUrl":"https://doi.org/10.1109/CISIM.2007.12","url":null,"abstract":"In this paper a new optimization algorithm based on ant colony metaphor (ACO)and a new approach for the Multiple Knapsack Problem is presented. The MKP is the problem of assigning a subset of n items to m distinct knapsacks, such that the total profit sum of the selected items is maximized, without exceeding the capacity of each of the knapsacks. The problem has several difficulties in adaptation as well as the trail representation of the solutions of MKP or a dynamically changed heuristic function applied in this approach. Presented results show the power of the ACO approach for solving this type of subset problems.","PeriodicalId":350490,"journal":{"name":"6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122154233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Address Sequences Generation for Multiple Run Memory Testing 多运行内存测试的地址序列生成
S. Yarmolik, I. Mrozek, B. Sokol
This paper deals with address generation for multiple run memory tests. It presents the algorithms for address sequences generation and proposes the new method for address sequences generation. The experimental results with the proposed address sequence are also shown.
本文讨论了多运行内存测试的地址生成问题。介绍了地址序列生成算法,提出了一种新的地址序列生成方法。最后给出了该地址序列的实验结果。
{"title":"Address Sequences Generation for Multiple Run Memory Testing","authors":"S. Yarmolik, I. Mrozek, B. Sokol","doi":"10.1109/CISIM.2007.9","DOIUrl":"https://doi.org/10.1109/CISIM.2007.9","url":null,"abstract":"This paper deals with address generation for multiple run memory tests. It presents the algorithms for address sequences generation and proposes the new method for address sequences generation. The experimental results with the proposed address sequence are also shown.","PeriodicalId":350490,"journal":{"name":"6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114329406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Theoretical Framework of the Optimization of Public Transport Travel 公共交通出行优化的理论框架
J. Koszelew
With the increase of cars on the streets, more and more people in big cities, decide to move from one place to another by public transport, such as tram, metro or bus. Public transport users need detail informations about network connections. Therefore, some urban portals offer to use systems of optimization of public transport travel. However, finding one or several optimal routes, according to user preferences, is a difficult problem. This paper presents an original method for determining optimal paths in public transportation network. Author describes a network model with time- dependent and bi-modal links, defines the problem of finding optimal routes with users' preferences and proposes algorithm, which can be a solution of this problem.
随着街道上汽车的增加,越来越多的人在大城市,决定从一个地方移动到另一个公共交通工具,如电车,地铁或公共汽车。公共交通用户需要网络连接的详细信息。因此,一些城市门户网站提供公共交通出行优化使用系统。然而,根据用户偏好找到一条或多条最优路线是一个难题。本文提出了一种确定公共交通网络最优路径的新颖方法。本文描述了一个具有时变双峰链路的网络模型,定义了基于用户偏好的最优路由问题,并提出了求解该问题的算法。
{"title":"The Theoretical Framework of the Optimization of Public Transport Travel","authors":"J. Koszelew","doi":"10.1109/CISIM.2007.66","DOIUrl":"https://doi.org/10.1109/CISIM.2007.66","url":null,"abstract":"With the increase of cars on the streets, more and more people in big cities, decide to move from one place to another by public transport, such as tram, metro or bus. Public transport users need detail informations about network connections. Therefore, some urban portals offer to use systems of optimization of public transport travel. However, finding one or several optimal routes, according to user preferences, is a difficult problem. This paper presents an original method for determining optimal paths in public transportation network. Author describes a network model with time- dependent and bi-modal links, defines the problem of finding optimal routes with users' preferences and proposes algorithm, which can be a solution of this problem.","PeriodicalId":350490,"journal":{"name":"6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)","volume":"57 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132081779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1