首页 > 最新文献

2013 5th International Conference on Intelligent Networking and Collaborative Systems最新文献

英文 中文
Towards the Modeling of Atomic and Molecular Clusters Energy by Support Vector Regression 基于支持向量回归的原子和分子簇能量建模研究
A. Vítek, Martin Stachon, P. Krömer, V. Snás̃el
Simulations of molecular dynamics play an important role in computational chemistry and physics. Such simulations require accurate information about the state and properties of interacting systems. The computation of water cluster potential energy surface is a complex and computationally expensive operation. Therefore, machine learning methods such as Artificial Neural Networks have been recently employed to machine-learn and further approximate clusters potential energy surfaces. This works presents the application of another highly successful machine learning method, the Support Vector Regression, for the modeling and approximation of the potential energy of water clusters as representatives of more general molecular clusters.
分子动力学模拟在计算化学和物理中起着重要的作用。这样的模拟需要关于相互作用系统的状态和属性的准确信息。水团势能面计算是一项复杂且计算量大的工作。因此,人工神经网络等机器学习方法最近被用于机器学习和进一步逼近聚类势能面。这项工作展示了另一种非常成功的机器学习方法的应用,即支持向量回归,用于水簇的势能的建模和近似,作为更一般分子簇的代表。
{"title":"Towards the Modeling of Atomic and Molecular Clusters Energy by Support Vector Regression","authors":"A. Vítek, Martin Stachon, P. Krömer, V. Snás̃el","doi":"10.1109/INCOS.2013.26","DOIUrl":"https://doi.org/10.1109/INCOS.2013.26","url":null,"abstract":"Simulations of molecular dynamics play an important role in computational chemistry and physics. Such simulations require accurate information about the state and properties of interacting systems. The computation of water cluster potential energy surface is a complex and computationally expensive operation. Therefore, machine learning methods such as Artificial Neural Networks have been recently employed to machine-learn and further approximate clusters potential energy surfaces. This works presents the application of another highly successful machine learning method, the Support Vector Regression, for the modeling and approximation of the potential energy of water clusters as representatives of more general molecular clusters.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127490898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Facial Emotion Recognition Using PHOG and a Hierarchical Expression Model 基于PHOG和层次表达模型的面部情绪识别
Zhao Zhong, Gang Shen, Wenhu Chen
In this paper, we propose a fast approach to detecting human facial emotions, using a hierarchical multiple stage scheme and only the PHOG feature descriptors basing on frontal images of human faces. In this model, the facial expression is the composition of a set of expressive facial regions which can be evaluated with the trained emotional templates. Within this framework, the proposed algorithm is able to achieve acceptable detection accuracy for Cohn-Kanade dataset, with less time and space complexities compared with the approaches in other research literature, making it applicable to low cost hardware such as mobile device. In addition, the experiments illustrated that the approach presented in this paper has good robustness and extendibility.
在本文中,我们提出了一种基于人脸正面图像的快速检测人脸情绪的方法,该方法使用分层多阶段方案和仅PHOG特征描述符。在该模型中,面部表情是一组表情面部区域的组合,这些区域可以用训练好的情感模板进行评估。在此框架下,本文提出的算法能够对Cohn-Kanade数据集达到可接受的检测精度,与其他研究文献中的方法相比,具有更低的时间和空间复杂度,适用于移动设备等低成本硬件。实验结果表明,该方法具有良好的鲁棒性和可扩展性。
{"title":"Facial Emotion Recognition Using PHOG and a Hierarchical Expression Model","authors":"Zhao Zhong, Gang Shen, Wenhu Chen","doi":"10.1109/INCoS.2013.143","DOIUrl":"https://doi.org/10.1109/INCoS.2013.143","url":null,"abstract":"In this paper, we propose a fast approach to detecting human facial emotions, using a hierarchical multiple stage scheme and only the PHOG feature descriptors basing on frontal images of human faces. In this model, the facial expression is the composition of a set of expressive facial regions which can be evaluated with the trained emotional templates. Within this framework, the proposed algorithm is able to achieve acceptable detection accuracy for Cohn-Kanade dataset, with less time and space complexities compared with the approaches in other research literature, making it applicable to low cost hardware such as mobile device. In addition, the experiments illustrated that the approach presented in this paper has good robustness and extendibility.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121682976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Private Set Intersection via Public Key Encryption with Multiple Keywords Search 多关键字搜索下公钥加密私集交集
Zhiyi Shao, Bo Yang, Yong Yu
We introduce the technique of searchable encryption into the problem of secure two-party computation, and obtain a novel approach to accomplish Private Set Intersection (PSI), which uses the Public Key Encryption with Multiple Keywords Search (MPEKS) as the basic tool. We aim to achieve PSI in computationally asymmetric settings which can be instantiated by Cloud Computing. Our protocol satisfies the privacy with respect to semi-honest behaviors and the client only needs to compute m multiplications, m MapToPoint operations and one modular exponentiation to obtain the intersection, where m denotes the cardinality of the client's set.
将可搜索加密技术引入到安全两方计算问题中,提出了一种以多关键词搜索公钥加密为基本工具实现私集交叉的新方法。我们的目标是在计算不对称设置中实现PSI,这可以通过云计算实例化。我们的协议满足关于半诚实行为的隐私性,客户端只需要计算m个乘法,m个maptoppoint操作和一个模幂来获得交集,其中m表示客户端集合的基数。
{"title":"Private Set Intersection via Public Key Encryption with Multiple Keywords Search","authors":"Zhiyi Shao, Bo Yang, Yong Yu","doi":"10.1109/INCoS.2013.60","DOIUrl":"https://doi.org/10.1109/INCoS.2013.60","url":null,"abstract":"We introduce the technique of searchable encryption into the problem of secure two-party computation, and obtain a novel approach to accomplish Private Set Intersection (PSI), which uses the Public Key Encryption with Multiple Keywords Search (MPEKS) as the basic tool. We aim to achieve PSI in computationally asymmetric settings which can be instantiated by Cloud Computing. Our protocol satisfies the privacy with respect to semi-honest behaviors and the client only needs to compute m multiplications, m MapToPoint operations and one modular exponentiation to obtain the intersection, where m denotes the cardinality of the client's set.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"437 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124250899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Impact of Channel Estimation Error on Time Division Broadcast Protocol in Bidirectional Relaying Systems 双向中继系统中信道估计误差对时分广播协议的影响
Ming-Kai Wu, Jing Li, J. Ge, Chensi Zhang, Florin Pop
This study deals with the performance analysis of time division broadcast (TDBC) protocol with channel estimation errors. The tight lower bounds for individual and system outage probabilities are first presented in closed-form. It is shown that the presence of channel estimation error causes outage probability to maintain a fixed level even when a noiseless channel is adopted. Simulation results validate the accuracy of our analytical results. Furthermore, comparison of signal-to-noise ratio (SNR) gap ratio shows that TDBC protocol is less sensitive to the effect of channel estimate error than analog network coding (ANC) protocol.
研究了含信道估计误差的时分广播(TDBC)协议的性能分析。首先以封闭形式给出了个体和系统中断概率的紧下界。结果表明,即使采用无噪声信道,信道估计误差的存在也会导致中断概率保持在一个固定的水平。仿真结果验证了分析结果的准确性。此外,通过信噪比(SNR)间隙比的比较表明,TDBC协议对信道估计误差的影响比模拟网络编码(ANC)协议更不敏感。
{"title":"Impact of Channel Estimation Error on Time Division Broadcast Protocol in Bidirectional Relaying Systems","authors":"Ming-Kai Wu, Jing Li, J. Ge, Chensi Zhang, Florin Pop","doi":"10.1109/INCoS.2013.65","DOIUrl":"https://doi.org/10.1109/INCoS.2013.65","url":null,"abstract":"This study deals with the performance analysis of time division broadcast (TDBC) protocol with channel estimation errors. The tight lower bounds for individual and system outage probabilities are first presented in closed-form. It is shown that the presence of channel estimation error causes outage probability to maintain a fixed level even when a noiseless channel is adopted. Simulation results validate the accuracy of our analytical results. Furthermore, comparison of signal-to-noise ratio (SNR) gap ratio shows that TDBC protocol is less sensitive to the effect of channel estimate error than analog network coding (ANC) protocol.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114156285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Tensor Missing Value Recovery with Tucker Thresholding Method 基于Tucker阈值法的张量缺失值恢复
Junxiu Zhou, Shigang Liu, Guoyong Qiu, Fengmin Zhang, Jiancheng Sun
In this paper, a tensor missing value recovery method on the tensor Tucker decomposition is presented. The contribution of this paper is to extend matrix shrinkage operator to the tensor Tucker higher-order singular value decomposition operator to obtain the best low-n-rank automatic. To obtain the optimal approximation tensor which is the key factor in recovery missing value of tensors, a tensor Tucker higher-order orthogonal iteration decomposition is presented which can solve the tensor trace norm objective function directly. In order to avoid relaxing the tensor trace norm function, the augment Lagrange multiplier method is adapted to the solving process. Without turning it into the average of the trace norms of all matrices unfolded along each mode, our method has more recovery accuracy and robust than the off-the-shelf method.
本文提出了一种基于张量Tucker分解的张量缺失值恢复方法。本文的贡献在于将矩阵收缩算子推广到张量Tucker高阶奇异值分解算子中,从而得到最佳的低n秩自动分解算子。为了获得恢复张量缺失值的最优逼近张量,提出了一种直接求解张量迹范数目标函数的张量Tucker高阶正交迭代分解方法。为了避免张量迹范数函数的松弛,在求解过程中采用了增广拉格朗日乘子法。该方法无需将其转化为沿每个模态展开的所有矩阵的迹范数的平均值,具有比现有方法更高的恢复精度和鲁棒性。
{"title":"Tensor Missing Value Recovery with Tucker Thresholding Method","authors":"Junxiu Zhou, Shigang Liu, Guoyong Qiu, Fengmin Zhang, Jiancheng Sun","doi":"10.1109/INCoS.2013.138","DOIUrl":"https://doi.org/10.1109/INCoS.2013.138","url":null,"abstract":"In this paper, a tensor missing value recovery method on the tensor Tucker decomposition is presented. The contribution of this paper is to extend matrix shrinkage operator to the tensor Tucker higher-order singular value decomposition operator to obtain the best low-n-rank automatic. To obtain the optimal approximation tensor which is the key factor in recovery missing value of tensors, a tensor Tucker higher-order orthogonal iteration decomposition is presented which can solve the tensor trace norm objective function directly. In order to avoid relaxing the tensor trace norm function, the augment Lagrange multiplier method is adapted to the solving process. Without turning it into the average of the trace norms of all matrices unfolded along each mode, our method has more recovery accuracy and robust than the off-the-shelf method.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"36 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114408255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Finding Key Leakage in Hierarchical Distribution of Encrypted Data 加密数据分层分布中的密钥泄漏问题
Hua Deng, Bo Qin, Ruiying Du, Huanguo Zhang, Lina Wang, Jianwei Liu, Jian Mao
In distribution of data encrypted to multiple users, there is a problem that the system will become low efficient if a single key center has to generate keys for a large number of users. Besides, it is a risk that some users could deliberately disclose their keys for some benefits. We in this paper give a key leakage discovering scheme where users are partitioned into groups and groups are hierarchically organized. In our scheme, users in upper-level groups can delegate keys for users in lower-level groups, which alleviates the key generation burden of the trusted third party. As an interesting feature, our scheme provide a key leakage discovering measure that if some users in groups leaked their decryption keys then at least one of them can be found out. This enables the data owners to accuse the illegal users when they infringed the copyright. At last, we analyze the performance of our system.
在将加密数据分发给多个用户时,如果单个密钥中心必须为大量用户生成密钥,则存在系统效率低下的问题。此外,有些用户可能会为了某些利益而故意泄露自己的密钥,这是一种风险。本文提出了一种将用户分组并分层组织的密钥泄露发现方案。在我们的方案中,上级组的用户可以将密钥委托给下级组的用户,减轻了可信第三方生成密钥的负担。作为一个有趣的特性,我们的方案提供了一个密钥泄漏发现措施,如果组中的某些用户泄露了他们的解密密钥,那么至少可以发现其中一个用户。这使得数据所有者可以在非法用户侵犯版权时对其进行指控。最后,对系统的性能进行了分析。
{"title":"Finding Key Leakage in Hierarchical Distribution of Encrypted Data","authors":"Hua Deng, Bo Qin, Ruiying Du, Huanguo Zhang, Lina Wang, Jianwei Liu, Jian Mao","doi":"10.1109/INCoS.2013.149","DOIUrl":"https://doi.org/10.1109/INCoS.2013.149","url":null,"abstract":"In distribution of data encrypted to multiple users, there is a problem that the system will become low efficient if a single key center has to generate keys for a large number of users. Besides, it is a risk that some users could deliberately disclose their keys for some benefits. We in this paper give a key leakage discovering scheme where users are partitioned into groups and groups are hierarchically organized. In our scheme, users in upper-level groups can delegate keys for users in lower-level groups, which alleviates the key generation burden of the trusted third party. As an interesting feature, our scheme provide a key leakage discovering measure that if some users in groups leaked their decryption keys then at least one of them can be found out. This enables the data owners to accuse the illegal users when they infringed the copyright. At last, we analyze the performance of our system.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114778973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Short-Term Network Traffic Prediction with ACD and Particle Filter 基于ACD和粒子滤波的短期网络流量预测
Gaoyu Zhang, Duying Huang
Network traffic prediction is hot spot in recent years' research, which is of great significance in area such as congestion control, network management and diagnostic. Network traffic is non-linear, non-stationary, and uncertain, and its uncertainty increases rapidly when making short-term traffic flow prediction. After reviewing current network traffic prediction algorithms' merits and drawbacks based on Time-Series analysis, Artificial Neural Network here, a new network traffic prediction algorithms in short-term is proposed. The time interval when detecting that network data packet pass on certain section is treated as a stochastic process. In the ARCH (autoregressive conditional heteroskedasticity) framework, stochastic process is described by a marked point process that different point processes may generate different ACD (autoregressive conditional duration) model, then ACD model can be used to complete the description of time interval when network data packet passing. Based on this model, a particle filter is applied to non-stationary motion system for short-term network traffic prediction. At last, this algorithm is applied to real data for real-evidence analysis.
网络流量预测是近年来研究的热点,在拥塞控制、网络管理和诊断等领域具有重要意义。网络流量具有非线性、非平稳和不确定性,在进行短期流量预测时,其不确定性迅速增加。在回顾了当前基于时间序列分析的网络流量预测算法的优缺点后,本文提出了一种新的短期网络流量预测算法。将检测网络数据包通过某一路段的时间间隔看作是一个随机过程。在ARCH(自回归条件异方差)框架中,随机过程用标记点过程来描述,不同的点过程可以产生不同的ACD(自回归条件持续时间)模型,然后用ACD模型来完成对网络数据包通过时间间隔的描述。在此模型的基础上,将粒子滤波应用于非平稳运动系统中进行短时网络流量预测。最后,将该算法应用到实际数据中进行实证据分析。
{"title":"Short-Term Network Traffic Prediction with ACD and Particle Filter","authors":"Gaoyu Zhang, Duying Huang","doi":"10.1109/INCoS.2013.57","DOIUrl":"https://doi.org/10.1109/INCoS.2013.57","url":null,"abstract":"Network traffic prediction is hot spot in recent years' research, which is of great significance in area such as congestion control, network management and diagnostic. Network traffic is non-linear, non-stationary, and uncertain, and its uncertainty increases rapidly when making short-term traffic flow prediction. After reviewing current network traffic prediction algorithms' merits and drawbacks based on Time-Series analysis, Artificial Neural Network here, a new network traffic prediction algorithms in short-term is proposed. The time interval when detecting that network data packet pass on certain section is treated as a stochastic process. In the ARCH (autoregressive conditional heteroskedasticity) framework, stochastic process is described by a marked point process that different point processes may generate different ACD (autoregressive conditional duration) model, then ACD model can be used to complete the description of time interval when network data packet passing. Based on this model, a particle filter is applied to non-stationary motion system for short-term network traffic prediction. At last, this algorithm is applied to real data for real-evidence analysis.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116604283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance Evaluation of WMN-GA for Wireless Mesh Networks Considering Mobile Mesh Clients 考虑移动Mesh客户端的无线Mesh网络WMN-GA性能评价
Tetsuya Oda, Shinji Sakamoto, Evjola Spaho, Makoto Ikeda, F. Xhafa, L. Barolli
Wireless Mesh Networks (WMNs) are important networking infrastructure for providing cost-efficient broadband wireless connectivity. Mesh router node placement is important to achieve network connectivity and coverage in such networks. In this paper, we implement and evaluate the performance of Genetic Algorithm (GA) for mesh router node placement in WMNs. We consider Exponential and Weibull distributions of mobile mesh clients. As evaluation metrics we used size of giant component and number of covered mesh clients. Simulation results show that WMN-GA have a good performance when mesh clients are mobile.
无线网状网络(WMNs)是提供低成本宽带无线连接的重要网络基础设施。在这种网络中,网状路由器节点的放置对于实现网络连接和覆盖非常重要。在本文中,我们实现并评估了遗传算法(GA)在WMNs中网状路由器节点放置的性能。我们考虑了移动网格客户端的指数分布和威布尔分布。作为评估指标,我们使用了巨型组件的大小和覆盖网格客户端的数量。仿真结果表明,WMN-GA在网格客户端移动时具有良好的性能。
{"title":"Performance Evaluation of WMN-GA for Wireless Mesh Networks Considering Mobile Mesh Clients","authors":"Tetsuya Oda, Shinji Sakamoto, Evjola Spaho, Makoto Ikeda, F. Xhafa, L. Barolli","doi":"10.1109/INCOS.2013.50","DOIUrl":"https://doi.org/10.1109/INCOS.2013.50","url":null,"abstract":"Wireless Mesh Networks (WMNs) are important networking infrastructure for providing cost-efficient broadband wireless connectivity. Mesh router node placement is important to achieve network connectivity and coverage in such networks. In this paper, we implement and evaluate the performance of Genetic Algorithm (GA) for mesh router node placement in WMNs. We consider Exponential and Weibull distributions of mobile mesh clients. As evaluation metrics we used size of giant component and number of covered mesh clients. Simulation results show that WMN-GA have a good performance when mesh clients are mobile.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115460991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Framework for Real-Time Process Modeling of Supply Chains 供应链实时过程建模框架
P. Moynihan, W. Dai
In this paper, we introduce a real time process modeling framework for supply chains. The superior feature of this framework is that it draws a dynamically packaged process utilizing the existing available resources and supporting activities for supply chain management. The paper presents a top level rule based design that can handle heterogeneous networks and allows integration with key enabling technologies like RFID tracking and leverages the power of an inference engine to manage, monitor and optimize flow networks and supply chain entities. An extension of previous work by the authors, some details of the runtime examples are given and impacts for industries.
本文介绍了一个面向供应链的实时流程建模框架。该框架的优越特性是,它利用现有的可用资源和支持供应链管理的活动,绘制了一个动态打包的过程。本文提出了一种顶级的基于规则的设计,可以处理异构网络,并允许与RFID跟踪等关键使能技术集成,并利用推理引擎的功能来管理、监控和优化流网络和供应链实体。作为作者先前工作的扩展,给出了运行时示例的一些细节以及对行业的影响。
{"title":"Framework for Real-Time Process Modeling of Supply Chains","authors":"P. Moynihan, W. Dai","doi":"10.1109/INCoS.2013.146","DOIUrl":"https://doi.org/10.1109/INCoS.2013.146","url":null,"abstract":"In this paper, we introduce a real time process modeling framework for supply chains. The superior feature of this framework is that it draws a dynamically packaged process utilizing the existing available resources and supporting activities for supply chain management. The paper presents a top level rule based design that can handle heterogeneous networks and allows integration with key enabling technologies like RFID tracking and leverages the power of an inference engine to manage, monitor and optimize flow networks and supply chain entities. An extension of previous work by the authors, some details of the runtime examples are given and impacts for industries.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125054061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Numerical Approach for Automatic Theorem Proving in Plane Geometry 平面几何定理自动证明的数值方法
Siwen Guo
In this paper, we present a new numerical method which proves by computers a class of geometric inequalities in a real plane. The method use interval arithmetic and related techniques to constitute the computing procedures to verify the geometric inequalities. Some numerical examples of verification are illustrated and demonstrate the effectiveness of our method.
本文给出了用计算机证明实平面上一类几何不等式的一种新的数值方法。该方法利用区间算法及相关技术,编制了验证几何不等式的计算程序。通过数值算例验证了该方法的有效性。
{"title":"Numerical Approach for Automatic Theorem Proving in Plane Geometry","authors":"Siwen Guo","doi":"10.1109/INCoS.2013.38","DOIUrl":"https://doi.org/10.1109/INCoS.2013.38","url":null,"abstract":"In this paper, we present a new numerical method which proves by computers a class of geometric inequalities in a real plane. The method use interval arithmetic and related techniques to constitute the computing procedures to verify the geometric inequalities. Some numerical examples of verification are illustrated and demonstrate the effectiveness of our method.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130066696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2013 5th International Conference on Intelligent Networking and Collaborative Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1