Pub Date : 2009-09-22DOI: 10.1109/GRC.2009.5255001
Chi Zhang
Software component interface description is one of the most important problems in Component-Based software development, and formal description methods are considered to be a promising approach for component interface. Presently the typical Interface Description Languages (IDLs) initially were designed for Client/Server applications in closure environment and only provided the syntax level information that needed by the components interaction without containing any dynamic behavioral protocol information. So it can not guarantee the correct interaction and usage of the software component in the open environment. The paper first defined the signature view and the behavior view of the software component then designed the modeling method that transfer the component behavior into π calculus process expression and proposed the algorithm that makes the transfer automatically. At last use one Electronic Commerce application as example and with the help of operational and transitional semantics and formal deduction we can check whether two components are behavior compatible when their composition.
{"title":"Software components composition compatibility checking based on behavior description","authors":"Chi Zhang","doi":"10.1109/GRC.2009.5255001","DOIUrl":"https://doi.org/10.1109/GRC.2009.5255001","url":null,"abstract":"Software component interface description is one of the most important problems in Component-Based software development, and formal description methods are considered to be a promising approach for component interface. Presently the typical Interface Description Languages (IDLs) initially were designed for Client/Server applications in closure environment and only provided the syntax level information that needed by the components interaction without containing any dynamic behavioral protocol information. So it can not guarantee the correct interaction and usage of the software component in the open environment. The paper first defined the signature view and the behavior view of the software component then designed the modeling method that transfer the component behavior into π calculus process expression and proposed the algorithm that makes the transfer automatically. At last use one Electronic Commerce application as example and with the help of operational and transitional semantics and formal deduction we can check whether two components are behavior compatible when their composition.","PeriodicalId":388774,"journal":{"name":"2009 IEEE International Conference on Granular Computing","volume":"10 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133076603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-22DOI: 10.1109/GRC.2009.5255037
Ji-hui Yang
In this paper, firstly, we present fuzzy relation linear programming with fuzzy objective coefficients, it is expanded to conventional fuzzy relation linear programming with crisp objective coefficients. Secondly, a solution procedure is given based on a norm of trapezoid fuzzy number. And finally, A numerical example is given for illustration purpose.
{"title":"Fuzzy relation linear programming","authors":"Ji-hui Yang","doi":"10.1109/GRC.2009.5255037","DOIUrl":"https://doi.org/10.1109/GRC.2009.5255037","url":null,"abstract":"In this paper, firstly, we present fuzzy relation linear programming with fuzzy objective coefficients, it is expanded to conventional fuzzy relation linear programming with crisp objective coefficients. Secondly, a solution procedure is given based on a norm of trapezoid fuzzy number. And finally, A numerical example is given for illustration purpose.","PeriodicalId":388774,"journal":{"name":"2009 IEEE International Conference on Granular Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133814946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-22DOI: 10.1109/GRC.2009.5255005
Yuan-Yuan Li, Yun Jun
This paper sets up a new comprehensive evaluation method based on extenics and rough set, combining the advantages of indicator system screening method and objective weight method based on rough set into traditional extension evaluation, and the new method is of strict process, strong feasibility and objectivity. Through the application in the evaluation of company's core competence, we testify the new method scientific.
{"title":"A comprehensive evaluation method based on extenics and rough set","authors":"Yuan-Yuan Li, Yun Jun","doi":"10.1109/GRC.2009.5255005","DOIUrl":"https://doi.org/10.1109/GRC.2009.5255005","url":null,"abstract":"This paper sets up a new comprehensive evaluation method based on extenics and rough set, combining the advantages of indicator system screening method and objective weight method based on rough set into traditional extension evaluation, and the new method is of strict process, strong feasibility and objectivity. Through the application in the evaluation of company's core competence, we testify the new method scientific.","PeriodicalId":388774,"journal":{"name":"2009 IEEE International Conference on Granular Computing","volume":" 24","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113951495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a Biomedical Semantic-based Association Rule method that significantly reduces irrelevant connections through semantic filtering. The experiment result shows that compared to traditional association rule-based approach, our approach generates much fewer rules and a lot of these rules represent relevant connections among biological concepts.
{"title":"A text mining method for discovering hidden links","authors":"Guangrong Li, Xiaodan Zhang, Illhoi Yoo, Xiaohua Zhou","doi":"10.1109/GRC.2009.5255095","DOIUrl":"https://doi.org/10.1109/GRC.2009.5255095","url":null,"abstract":"This paper presents a Biomedical Semantic-based Association Rule method that significantly reduces irrelevant connections through semantic filtering. The experiment result shows that compared to traditional association rule-based approach, our approach generates much fewer rules and a lot of these rules represent relevant connections among biological concepts.","PeriodicalId":388774,"journal":{"name":"2009 IEEE International Conference on Granular Computing","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117080101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-22DOI: 10.1109/GRC.2009.5255050
Jiali Xia, Ze-yu Han, Hui Chen, Chengying Mao
By analyzing the relationships of preemption and abortion among the jobs of the real-time tasks, the overload management strategy (OMS) divides the jobs into two types: steady-finished-jobs and absolute-aborted-jobs. While scheduling the jobs, the steady-finished-jobs are released and the absolute-aborted-jobs are rejected. In this way, the cascaded preemption among the jobs could be avoided. Also, the system resource could be efficiently utilized. The results of the simulation show that, the OMS could adaptively deal with the static or dynamic task set. Additionally, by applying OMS, the scheduling algorithms can obviously improve the performance of the real-time system.
{"title":"An adaptive overload management strategy for periodic real-time tasks","authors":"Jiali Xia, Ze-yu Han, Hui Chen, Chengying Mao","doi":"10.1109/GRC.2009.5255050","DOIUrl":"https://doi.org/10.1109/GRC.2009.5255050","url":null,"abstract":"By analyzing the relationships of preemption and abortion among the jobs of the real-time tasks, the overload management strategy (OMS) divides the jobs into two types: steady-finished-jobs and absolute-aborted-jobs. While scheduling the jobs, the steady-finished-jobs are released and the absolute-aborted-jobs are rejected. In this way, the cascaded preemption among the jobs could be avoided. Also, the system resource could be efficiently utilized. The results of the simulation show that, the OMS could adaptively deal with the static or dynamic task set. Additionally, by applying OMS, the scheduling algorithms can obviously improve the performance of the real-time system.","PeriodicalId":388774,"journal":{"name":"2009 IEEE International Conference on Granular Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117088673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-22DOI: 10.1109/GRC.2009.5255161
Yiming Chen, Zhoujun Li, Xiaohua Hu, Hongxiang Diao, Junwan Liu
Predicting gene function is usually formulated as binary classification problem. However, we only know which gene has some function while we are not sure that it doesn't belong to a function class, which means that only positive examples are given. Therefore, selecting a good training example set becomes a key step. In this paper, we cluster the genes on integrated weighted graph by generalizing the cluster coefficient of unweighted graph to weighted one, and identify the reliable negative samples based on distance between a gene and centroid of positive clusters. Then, the tri-training algorithm is used to learn three classifiers from labeled and unlabeled examples to predict the gene function by combining three prediction result. The experiment results show that our approach outperforms several classic prediction methods.
{"title":"Predicting gene function with positive and unlabeled examples","authors":"Yiming Chen, Zhoujun Li, Xiaohua Hu, Hongxiang Diao, Junwan Liu","doi":"10.1109/GRC.2009.5255161","DOIUrl":"https://doi.org/10.1109/GRC.2009.5255161","url":null,"abstract":"Predicting gene function is usually formulated as binary classification problem. However, we only know which gene has some function while we are not sure that it doesn't belong to a function class, which means that only positive examples are given. Therefore, selecting a good training example set becomes a key step. In this paper, we cluster the genes on integrated weighted graph by generalizing the cluster coefficient of unweighted graph to weighted one, and identify the reliable negative samples based on distance between a gene and centroid of positive clusters. Then, the tri-training algorithm is used to learn three classifiers from labeled and unlabeled examples to predict the gene function by combining three prediction result. The experiment results show that our approach outperforms several classic prediction methods.","PeriodicalId":388774,"journal":{"name":"2009 IEEE International Conference on Granular Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115431331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-22DOI: 10.1109/GRC.2009.5255083
Chengying Mao
As a rapidly emerging technology, Web services offer a brand-new mechanism for program-to-program interactions over the Internet. Inevitably, this programming pattern brings great challenge to the improvement of the quality and reliability of Web services. In the paper, a two-level testing framework for WSBS is proposed through deeply analyzing the architecture of WSBS and black-box character of Web service unit. In service unit level, combinatorial testing method is used to ensure single service's reliability through extracting interface information from WSDL file. In system level, BPEL specification is converted into state diagram at first, and then state transition-based test cases generation algorithm is presented. In addition, the feasibility and effectiveness of our approach is validated by some examples.
{"title":"A specification-based testing framework for Web service-based software","authors":"Chengying Mao","doi":"10.1109/GRC.2009.5255083","DOIUrl":"https://doi.org/10.1109/GRC.2009.5255083","url":null,"abstract":"As a rapidly emerging technology, Web services offer a brand-new mechanism for program-to-program interactions over the Internet. Inevitably, this programming pattern brings great challenge to the improvement of the quality and reliability of Web services. In the paper, a two-level testing framework for WSBS is proposed through deeply analyzing the architecture of WSBS and black-box character of Web service unit. In service unit level, combinatorial testing method is used to ensure single service's reliability through extracting interface information from WSDL file. In system level, BPEL specification is converted into state diagram at first, and then state transition-based test cases generation algorithm is presented. In addition, the feasibility and effectiveness of our approach is validated by some examples.","PeriodicalId":388774,"journal":{"name":"2009 IEEE International Conference on Granular Computing","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114887445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-22DOI: 10.1109/GRC.2009.5255143
Lihua Feng, G. Luo
The possibility level α is dependent on technical conditions and knowledge. Calculation of the fuzzy expected value of landfall hurricane risk along the east coast of the United States has been performed based on the interior-outer set model. Selection of an α value depends on the confidence in different groups of people, while selection of a conservative risk value or venture risk value depends on the risk preference of these people.
{"title":"Study on landfall hurricane using the fuzzy risk analysis along the east coast of the United States","authors":"Lihua Feng, G. Luo","doi":"10.1109/GRC.2009.5255143","DOIUrl":"https://doi.org/10.1109/GRC.2009.5255143","url":null,"abstract":"The possibility level α is dependent on technical conditions and knowledge. Calculation of the fuzzy expected value of landfall hurricane risk along the east coast of the United States has been performed based on the interior-outer set model. Selection of an α value depends on the confidence in different groups of people, while selection of a conservative risk value or venture risk value depends on the risk preference of these people.","PeriodicalId":388774,"journal":{"name":"2009 IEEE International Conference on Granular Computing","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125431239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-22DOI: 10.1109/GRC.2009.5255107
B. Li, Wei Li, Yuan-Yuan Chen, Dong Jiang, Ying-Zhi Cui
In this paper, we put forward a website integrity Authentication scheme based on fragile digital watermarking technique. Firstly, using the one-way hash function (SHA-1) to compute digital fingerprint of the document and then inserts the hash value to the webpage. When a user visits the web page, the system extracts the watermark and comparing with the generated watermark automatically. This scheme can satisfy the basic needs of website's security integrity.
{"title":"HTML integrity authentication based on fragile digital watermarking","authors":"B. Li, Wei Li, Yuan-Yuan Chen, Dong Jiang, Ying-Zhi Cui","doi":"10.1109/GRC.2009.5255107","DOIUrl":"https://doi.org/10.1109/GRC.2009.5255107","url":null,"abstract":"In this paper, we put forward a website integrity Authentication scheme based on fragile digital watermarking technique. Firstly, using the one-way hash function (SHA-1) to compute digital fingerprint of the document and then inserts the hash value to the webpage. When a user visits the web page, the system extracts the watermark and comparing with the generated watermark automatically. This scheme can satisfy the basic needs of website's security integrity.","PeriodicalId":388774,"journal":{"name":"2009 IEEE International Conference on Granular Computing","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126160322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-22DOI: 10.1109/GRC.2009.5255048
S. Xiao, Jiu-ju Cai, Ruo-hui Wang, Fei Liu
Along with the development of society, traffic jams are becoming the major issue in cities traffic system, since they are not only consuming much more fuel but also polluting air of cities. In this paper, we take into account the models which totally asymmetric simple exclusion processes (TASEPs) with single-lane with a double-lane section in the middle in the case of parallel-sequential update. Using mean-field theory to calculate currents, density profiles and a phase diagram of stationary vehicles and analyses the conclusions.
{"title":"Totally asymmetric simple exclusion processes apply in traffic system","authors":"S. Xiao, Jiu-ju Cai, Ruo-hui Wang, Fei Liu","doi":"10.1109/GRC.2009.5255048","DOIUrl":"https://doi.org/10.1109/GRC.2009.5255048","url":null,"abstract":"Along with the development of society, traffic jams are becoming the major issue in cities traffic system, since they are not only consuming much more fuel but also polluting air of cities. In this paper, we take into account the models which totally asymmetric simple exclusion processes (TASEPs) with single-lane with a double-lane section in the middle in the case of parallel-sequential update. Using mean-field theory to calculate currents, density profiles and a phase diagram of stationary vehicles and analyses the conclusions.","PeriodicalId":388774,"journal":{"name":"2009 IEEE International Conference on Granular Computing","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126195937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}