Shuang Wang, Guoren Wang, Xiaoxing Gao, Zhenhua Tan
There is an increasing interest in uncertain and probabilistics databases arising in application domains such as sensor networks, information retrieval, mobile object data management, information extraction, and data integration. A range of different approaches have been proposed to find the frequent items in uncertain database. But there is little work on processing such query in distributed, in-network inference, such as sensor network. In sensor network, communication is the primary problem because of limited batteries. In this paper, a synopsis with minimum amount tuples is proposed, which sufficient for answering the top-k query. And this synopsis can be dynamic maintained with new tuples been added. A novel communication efficient algorithm is presented in taking advantage of this synopsis. The test results confirm the effectiveness and efficiency of our approaches.
{"title":"Frequent Items Computation over Uncertain Wireless Sensor Network","authors":"Shuang Wang, Guoren Wang, Xiaoxing Gao, Zhenhua Tan","doi":"10.1109/HIS.2009.156","DOIUrl":"https://doi.org/10.1109/HIS.2009.156","url":null,"abstract":"There is an increasing interest in uncertain and probabilistics databases arising in application domains such as sensor networks, information retrieval, mobile object data management, information extraction, and data integration. A range of different approaches have been proposed to find the frequent items in uncertain database. But there is little work on processing such query in distributed, in-network inference, such as sensor network. In sensor network, communication is the primary problem because of limited batteries. In this paper, a synopsis with minimum amount tuples is proposed, which sufficient for answering the top-k query. And this synopsis can be dynamic maintained with new tuples been added. A novel communication efficient algorithm is presented in taking advantage of this synopsis. The test results confirm the effectiveness and efficiency of our approaches.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133636509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Due to the proliferation of the IPTV market and content providers, Electronic programming guide (EPG) list provided for the consumers becomes enormous. Therefore, EPG recommender systems are proposed to make IPTV users more familiar with the programs. To obtain better EPG service, there is a need for the users to communicate with other users. A novel EPG recommender framework with information exchange between users is proposed. The framework provides an EPG recommender engine and an approach to exchanging EPG recommender list between users.
{"title":"An EPG Recommender Framework with Information Exchange between Users","authors":"Chunguang Tan, Chuan Zhu, Xingwei Wang, G. Chang","doi":"10.1109/HIS.2009.207","DOIUrl":"https://doi.org/10.1109/HIS.2009.207","url":null,"abstract":"Due to the proliferation of the IPTV market and content providers, Electronic programming guide (EPG) list provided for the consumers becomes enormous. Therefore, EPG recommender systems are proposed to make IPTV users more familiar with the programs. To obtain better EPG service, there is a need for the users to communicate with other users. A novel EPG recommender framework with information exchange between users is proposed. The framework provides an EPG recommender engine and an approach to exchanging EPG recommender list between users.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"227 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132122715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To recover link failure on resilient packet ring (RPR) networks, IEEE 802.17 working group defines two protection mechanisms, steering and wrapping, which can restore a failed network in less than 50ms. In this study, we focus on the RPR protection mechanisms and the properties of the three different traffic classes defined in RPR for the two mechanisms by simulation. We find that the frame delay caused by protection in comparison with the normal condition is much higher. In the steering mechanism, the head nodes of protected ringlet sections can seize more bandwidth than their downstream nodes. In the wrapping mechanism, the frame delay of unwrapped frames may be influenced by the wrapped frames. In the simulation, we can disclose the pro and con of the two protection mechanisms and show some points to achieve further improvement.
{"title":"Simulative Performance Analysis of Resilient Packet Ring in Protection Modes","authors":"Wen-Fong Wang, Ching-Sung Lu","doi":"10.1109/HIS.2009.40","DOIUrl":"https://doi.org/10.1109/HIS.2009.40","url":null,"abstract":"To recover link failure on resilient packet ring (RPR) networks, IEEE 802.17 working group defines two protection mechanisms, steering and wrapping, which can restore a failed network in less than 50ms. In this study, we focus on the RPR protection mechanisms and the properties of the three different traffic classes defined in RPR for the two mechanisms by simulation. We find that the frame delay caused by protection in comparison with the normal condition is much higher. In the steering mechanism, the head nodes of protected ringlet sections can seize more bandwidth than their downstream nodes. In the wrapping mechanism, the frame delay of unwrapped frames may be influenced by the wrapped frames. In the simulation, we can disclose the pro and con of the two protection mechanisms and show some points to achieve further improvement.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134608774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aviation subcontract production (SP), the particular manufacturing mode of aeronautical manufacturing, is an important instrumentality participated in market competition, but the key step formed the SP alliance is the partner selection and evaluation. In order to improve the ability to solve partner selection and evaluation problems, such as increasing alternatives, increasing info fuzziness, and unconsidering the characteristic of the total task and the idiographic sub-task of each partner in the process on evaluating target system and decision-making approach of partner selection and evaluation for aeronautical SP, as well as to solve the inconsistence of differ judgment matrix set up in similar multi-alternative evaluation problems caused by AHP or other fuzzy AHP approaches. An evaluating targets system and multiple objects decision-making model in partner selection were put forward. An extended fuzzy AHP model based on the combination of the fuzzy AHP and the trigonometrical fuzzy number (TFN) was proposed. Compared with the AHP, the proposed model combines subjective analysis with quantitative analysis more reasonably, synthesizes group opinions more adequately.
{"title":"An Extended Fuzzy AHP Based Partner Selection and Evaluation for Aeronautical Subcontract Production","authors":"Zhiqiang Jiang, Xi-lan Feng, Jin-fa Shi","doi":"10.1109/HIS.2009.78","DOIUrl":"https://doi.org/10.1109/HIS.2009.78","url":null,"abstract":"Aviation subcontract production (SP), the particular manufacturing mode of aeronautical manufacturing, is an important instrumentality participated in market competition, but the key step formed the SP alliance is the partner selection and evaluation. In order to improve the ability to solve partner selection and evaluation problems, such as increasing alternatives, increasing info fuzziness, and unconsidering the characteristic of the total task and the idiographic sub-task of each partner in the process on evaluating target system and decision-making approach of partner selection and evaluation for aeronautical SP, as well as to solve the inconsistence of differ judgment matrix set up in similar multi-alternative evaluation problems caused by AHP or other fuzzy AHP approaches. An evaluating targets system and multiple objects decision-making model in partner selection were put forward. An extended fuzzy AHP model based on the combination of the fuzzy AHP and the trigonometrical fuzzy number (TFN) was proposed. Compared with the AHP, the proposed model combines subjective analysis with quantitative analysis more reasonably, synthesizes group opinions more adequately.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133027983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Normalization theory is necessary for designing a good XML document. A good document means that it has minimal redundancy. The research on XML functional dependency and normalization is still an open problem. This paper first presents a path language of XML model, then proposes a new kind of XML functional dependency (XFD) that has stronger expression ability to XML functional dependency that can result in redundancies. In this paper, the problems of XFD logical implication and XFD closure are studied and a group of the corresponding inference rules is proposed. Based on the XFD, a kind of XML normal form (XNF) and an algorithm converting into XNF are also proposed in this paper.
{"title":"XML Functional Dependency and Schema Normalization","authors":"Xiangguo Zhao, Junchang Xin, Ende Zhang","doi":"10.1109/HIS.2009.276","DOIUrl":"https://doi.org/10.1109/HIS.2009.276","url":null,"abstract":"Normalization theory is necessary for designing a good XML document. A good document means that it has minimal redundancy. The research on XML functional dependency and normalization is still an open problem. This paper first presents a path language of XML model, then proposes a new kind of XML functional dependency (XFD) that has stronger expression ability to XML functional dependency that can result in redundancies. In this paper, the problems of XFD logical implication and XFD closure are studied and a group of the corresponding inference rules is proposed. Based on the XFD, a kind of XML normal form (XNF) and an algorithm converting into XNF are also proposed in this paper.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"571 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124213638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The automatic testing tools of component security bring great effect on component-based software engineering, and they can effectively ensure the security of component-based software. A prototype tool named CSTS (component security testing system) is designed and implemented to test the security of the widely-used COTS (Commercial-off-the-Shelf) Microsoft COM (component object model) component. CSTS, a GUI (graphical user interface) software, adopts both static and dynamic testing based on fault injection and dynamic monitoring. Firstly, CSTS analyzes component type information and statically injects parameter faults into interface methods. Secondly, environment faults such as memory fault, file fault and process fault are injected into the tested component when the component is driven. Dynamic monitoring mechanism can monitor the running process of component and analyze the component security exceptions. Some commercial components were tested in the CSTS. The experimental results show that CSTS is effective and operable.
组件安全自动化测试工具对基于组件的软件工程产生了巨大的影响,它们可以有效地保证基于组件的软件的安全性。设计并实现了一个原型工具CSTS(组件安全性测试系统),用于测试广泛使用的COTS (commercial -off- shelf) Microsoft COM(组件对象模型)组件的安全性。CSTS是一个GUI(图形用户界面)软件,采用基于故障注入和动态监控的静态和动态测试。CSTS首先对组件类型信息进行分析,并在接口方法中静态注入参数故障。其次,在驱动被测组件时,将内存故障、文件故障和进程故障等环境故障注入被测组件;动态监控机制可以监控组件的运行过程,分析组件的安全异常。一些商业部件在CSTS中进行了测试。实验结果表明,CSTS是有效的、可操作的。
{"title":"CSTS: A Prototype Tool for Testing COM Component Security","authors":"Jinfu Chen, Yansheng Lu, Xiaodong Xie","doi":"10.1109/HIS.2009.229","DOIUrl":"https://doi.org/10.1109/HIS.2009.229","url":null,"abstract":"The automatic testing tools of component security bring great effect on component-based software engineering, and they can effectively ensure the security of component-based software. A prototype tool named CSTS (component security testing system) is designed and implemented to test the security of the widely-used COTS (Commercial-off-the-Shelf) Microsoft COM (component object model) component. CSTS, a GUI (graphical user interface) software, adopts both static and dynamic testing based on fault injection and dynamic monitoring. Firstly, CSTS analyzes component type information and statically injects parameter faults into interface methods. Secondly, environment faults such as memory fault, file fault and process fault are injected into the tested component when the component is driven. Dynamic monitoring mechanism can monitor the running process of component and analyze the component security exceptions. Some commercial components were tested in the CSTS. The experimental results show that CSTS is effective and operable.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"255 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131731098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ant Colony Optimization (ACO) is a popular-based, artificial agent, general-search technique for the solution of difficult combinatorial problems. This paper presents a solution to the Resource-Constraint Project Scheduling Problem based on ACO algorithm. The method considers the quantified duration and resource as the heuristic information to calculate the accurate state transition probability and finally reaches the scheduling optimization. The described ACO algorithm is tested on a sample case taken from the literature and the parameters in ACO are determined by tests. The computational results validate the effectiveness of the proposed algorithm.
{"title":"A Solution to Resource-Constrained Project Scheduling Problem: Based on Ant Colony Optimization Algorithm","authors":"Yongbo Yuan, Kai Wang, Le Ding","doi":"10.1109/HIS.2009.92","DOIUrl":"https://doi.org/10.1109/HIS.2009.92","url":null,"abstract":"Ant Colony Optimization (ACO) is a popular-based, artificial agent, general-search technique for the solution of difficult combinatorial problems. This paper presents a solution to the Resource-Constraint Project Scheduling Problem based on ACO algorithm. The method considers the quantified duration and resource as the heuristic information to calculate the accurate state transition probability and finally reaches the scheduling optimization. The described ACO algorithm is tested on a sample case taken from the literature and the parameters in ACO are determined by tests. The computational results validate the effectiveness of the proposed algorithm.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131449471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The User-based Security Model and its replay protection principium are firstly introduced and then a replay protection scheme based on random number is proposed to avoid baleful replay attack because of the inefficacy of the USM. A random number is used as the authentication between manager and agent in this scheme, and the number is changed on each message exchange to ensure the agent can identify the response message. The scheme is tested in the simulation platform by using snmp4j and Jpcap. Test result shows that the performance of the network management system based on this scheme is affected a little under replay attack.
{"title":"A SNMPv3 Replay Protection Scheme Used in Space Network Based on Random Number","authors":"Yueqiu Jiang, Kun Sun, Wenbo Zhang, Daozhu Zhang","doi":"10.1109/HIS.2009.189","DOIUrl":"https://doi.org/10.1109/HIS.2009.189","url":null,"abstract":"The User-based Security Model and its replay protection principium are firstly introduced and then a replay protection scheme based on random number is proposed to avoid baleful replay attack because of the inefficacy of the USM. A random number is used as the authentication between manager and agent in this scheme, and the number is changed on each message exchange to ensure the agent can identify the response message. The scheme is tested in the simulation platform by using snmp4j and Jpcap. Test result shows that the performance of the network management system based on this scheme is affected a little under replay attack.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132503634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The main purpose of this paper is to explore the resistive line loss reduction by upgrading the primary feeder from radial to normally closed-loop arrangement. First, the resistive line loss formulations that were function of incremental current and correlatively parameters were derived, and the loss reduction by primary feeder upgrading from radial to normally closed-loop arrangement was investigated according to the loss formulation. Next, a numerical example with two radial feeders, which were thermally limited and voltage-drop-limited types, was designed for simulation and analysis under the reasonable and qualified constrains of the feeder length, loadings, as well as voltage drop. Finally, the loss reduction by upgrading the primary feeder from radial to normally closed-loop arrangement was explored concretely and adequately by the theoretical discussed and numerical results.
{"title":"Line Loss Reduction by Distribution System Upgrading from Radial to Normally Closed-Loop Arrangement","authors":"Wei-Tzer Huang, Shiuan-Tai Chen","doi":"10.1109/HIS.2009.281","DOIUrl":"https://doi.org/10.1109/HIS.2009.281","url":null,"abstract":"The main purpose of this paper is to explore the resistive line loss reduction by upgrading the primary feeder from radial to normally closed-loop arrangement. First, the resistive line loss formulations that were function of incremental current and correlatively parameters were derived, and the loss reduction by primary feeder upgrading from radial to normally closed-loop arrangement was investigated according to the loss formulation. Next, a numerical example with two radial feeders, which were thermally limited and voltage-drop-limited types, was designed for simulation and analysis under the reasonable and qualified constrains of the feeder length, loadings, as well as voltage drop. Finally, the loss reduction by upgrading the primary feeder from radial to normally closed-loop arrangement was explored concretely and adequately by the theoretical discussed and numerical results.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"387 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115221905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this research, the structure and design of virtual spectrum analyzer is studied. The construction process is also described and introduced. This programmable virtual spectrum analyzers is achieved by software part, LabVIEW hardware part, DAQ card and some external circuits. The designed measurement functions include five pallettes: (1) spectrum analyzer design and implementation (2) one signal time-domain analyze (3) one signal frequency-domain analyze (4) two signals time-domain overlapping analyze (5) two signals frequency-domain overlapping analyze. In the illustrations, demonstrate the design of front panels and also proceed the measurement test of designed virtual spectrum analyzer to show the capabilities.
{"title":"Virtual Spectrum Analyzer Design and Implementation","authors":"Kai-chao Yao, Tai-li Chen, Yu-te Lian","doi":"10.1109/HIS.2009.284","DOIUrl":"https://doi.org/10.1109/HIS.2009.284","url":null,"abstract":"In this research, the structure and design of virtual spectrum analyzer is studied. The construction process is also described and introduced. This programmable virtual spectrum analyzers is achieved by software part, LabVIEW hardware part, DAQ card and some external circuits. The designed measurement functions include five pallettes: (1) spectrum analyzer design and implementation (2) one signal time-domain analyze (3) one signal frequency-domain analyze (4) two signals time-domain overlapping analyze (5) two signals frequency-domain overlapping analyze. In the illustrations, demonstrate the design of front panels and also proceed the measurement test of designed virtual spectrum analyzer to show the capabilities.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115434045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}