经检索, 2010 年以浙江财经学院为作者单位发表论文被 EI 收 录 51 篇 具体论文如下: A novel model for dynamic multi-attributes group decision-making based on vague set and its TOPSIS solution Yang, Aiping1 Source: Proceedings of the 29th Chinese Control Conference, CCC'10, p 5539-5543, 2010, Proceedings of the 29th Chinese Control Conference, CCC'10; ISBN-13: 9787894631046; Article number: 5573390; Conference: 29th Chinese Control Conference, CCC'10, July 29, 2010 - July 31, 2010; Sponsor: IEEE Control Systems Society (CSS); The ICROS OF Korea; IEEE CSS Singapore Chapter; IEEE CSS Hong Kong Chapter; IEEE CSS Beijing Chapter; Publisher: IEEE Computer Society Author affiliation: 1 Zhejiang University of Finance and Economics, Hangzhou 310018, China Abstract: In view of the existing problem in four-dimensional decision-making consisting of alternative set, attribute set, time set and valuator set, a novel model for dynamic multi-attribute group decision-making based on vague set and its TOPSIS solution are put forward. Firstly, the relationship between vague set and linguistic variable set is defined. Secondly, a mathematical description of dynamic multi-attribute group decision-making problem based on vague set is presented. Thirdly, how to find the model's solution and its steps are given in detail. Finally, the proposed approach is applied and the result shows it effective and feasible. (11 refs.) Main Heading: Decision making Uncontrolled terms: Asessment Classification Code: - Goup decision-making - Multi-attributes - TOPSIS - Vgue set 912.2 Management Database: Compendex Multi-attribute decision making based on three-parameter vague sets Yang, Aiping1; Wang, Haixia2 Source: Proceedings of the 29th Chinese Control Conference, CCC'10, p 5544-5548, 2010, Proceedings of the 29th Chinese Control Conference, CCC'10; Language: Chinese; ISBN-13: 9787894631046; Article number: 5573407; Conference: 29th Chinese Control Conference, CCC'10, July 29, 2010 - July 31, 2010; Sponsor: IEEE Control Systems Society (CSS); The ICROS OF Korea; IEEE CSS Singapore Chapter; IEEE CSS Hong Kong Chapter; IEEE CSS Beijing Chapter; Publisher: IEEE Computer Society Author affiliation: 1 Zhejiang University of Finance and Economics, Hangzhou 310018, China 2 Department of Automatic Control, Zhejiang Sci-Tech. University, Hangzhou 310018, China Abstract: In view of the practical problems in multi-attribute decision-making, a method based on three-parameter vague sets is proposed. Firstly, three-parameter vague set is introduced to make up for the shortage of the original vague set in expressing fuzzy information, and the method for finding core is proposed. Secondly, the method that indicator value described by linguistic variables is transformed into three-parameter vague value is brought forward. Thirdly, a model of multi-attribute decision making based on three-parameter vague sets is put forward. Fourthly, a novel comprehensive evaluation index is proposed, by which the meaning of "which is closest to PIS (Positive Ideal Solution) and farthest from NIS (Negative Ideal Solution)" is expressed and the concrete steps are given. Finally, the proposed method is applied into a case study and the result proves the method is effective. (10 refs.) Main Heading: Decision making Uncontrolled terms: Comprehensive evaluation index - Fuzzy information - Ideal - Indicator values - Linguistic variable - Multi attribute decision making - Practical problems - Three-parameter vague values - TOPSIS - Vague sets solutions Classification Code: 912.2 Management Database: Compendex Nonlinear VaR model of options portfolio under multivariate mixture of normals distributions Chen, Rongda1; Cao, Dan1; Yu, Qingyang1 Source: Proceedings - 3rd International Conference on Business Intelligence and Financial Engineering, BIFE 2010, p 364-368, 2010, Proceedings - 3rd International Conference on Business Intelligence and Financial Engineering, BIFE 2010; ISBN-13: 9780769541167; DOI: 10.1109/BIFE.2010.91; Article number: 5621824; Conference: 3rd International Conference on Business Intelligence and Financial Engineering, BIFE 2010, August 13, 2010 - August 15, 2010; Sponsor: College of Business, City University of Hong Kong; Cent. Forecast. Sci. (CEFS) Chin. Acad. Sci. (CAS); Key Lab. Manage., Decis. Inf. Syst. (MADIS) CAS; Sch. Econ. Manage., Changsha Univ. Sci. Technol.; Tenly Software Incorporated; Publisher: IEEE Computer Society Author affiliation: 1 School of Finance, Zhejiang University of Finance and Economics, Hangzhou, 310018, China Abstract: The paper proposes a kind of nonlinear VaR model of options portfolio under heavy-tailed market risk factors. The paper depicts heavy-tailed market risk factors using multivariate mixture of normals distribution, and derives the moment generating function that reflects the change in options portfolio value. Moreover, to make use of the relationship between characteristic function and moment generating function, the paper develops Fourier-Inversion method and adaptive Simpson rule with iterative algorithm of numerical integration into nonlinear VaR model of options portfolio, and calculates the VaR values of portfolio. Numerical results show that the VaR values using Fourier-Inversion method is slight difference from the VaR values using Monte Carlo simulation method. However, the calculation speed using Fourier-Inversion method is obviously quicker than the speed using Monte Carlo simulation method. © 2010 IEEE. (13 refs.) Main Heading: Monte Carlo methods Controlled evaluation terms: Algorithms Computer simulation - Fourier transforms - Function - Integration - Mixtures - Numerical methods - Value engineering Uncontrolled functions - - terms: Calculation Fourier - Heavy-tailed - - speed Inversion methods - Characteristic Iterative algorithm - Market - Moment generating function - Monte Carlo simulation methods - Multivariate mixture of - Nonlinear VaR - Numerical integrations - Numerical results - Option portfolio - Portfolio value - Simpson rules risks normals distributions Classification Code: 723 Computer Software, Data Handling and Applications - 723.5 Computer Applications - 802.3 Chemical Operations - 911.5 Value Engineering - 921 Mathematics - 922.2 Mathematical Statistics Database: Compendex Internet acceptance, service dual-channel supply chain competition and channel profit in Chen, Yuan-Gao1 Source: Proceedings of the International Conference on E-Business and E-Government, ICEE 2010, p 3235-3238, 2010, Proceedings of the International Conference on E-Business and E-Government, ICEE 2010; ISBN-13: 9780769539973; DOI: 10.1109/ICEE.2010.814; Article number: 5591097; Conference: 1st International Conference on E-Business and E-Government, ICEE 2010, May 7, 2010 - May 9, 2010; Sponsor: South China University of Technology; Publisher: IEEE Computer Society Author affiliation: 1 School of Information, Zhejiang University of Finance and Economics, Hangzhou, China Abstract: A price and service competition model for dual-channel supply chain was established, then the optimal solutions including service level and channel profit were compared between single channel and dual-channel supply chain The results revealed that the competition between dual-channel supply chain leaded to zero demand segment of Internet direct channel and more profits for whole supply chain system when traditional retailer adopted service differentiation strategy. Through dual-channel strategy the manufacturer effectively motivated traditional retailer to improve its channel service for more profits. Furthermore, the customer acceptance of Internet direct channel made a significant impact on the profit of manufacturer and retailer in the dual-channel supply chain system. © 2010 IEEE. (9 refs.) Main Heading: Competition terms: Chains - Earnings Electronic commerce - Government data - Internet - Inventory control - Manufacture - Profitability - Sales - Supply chain management - Supply chains Controlled processing - Competition model - Customer acceptance - Direct Dual channel - Optimal solutions - Service competition - Service - Service levels - Significant impacts - Single channels - Stackelberg Uncontrolled terms: Channel acceptance channel - differentiation Games - Supply chain systems Classification Code: Handling and Communications 723.2 Data Processing and Image Processing - 723 Computer Software, Data Applications - 911 Cost - 718 and Telephone Value Systems Engineering; and Industrial Related Technologies; Economics - 717 Line Optical Communication - 602.1 Mechanical Drives - 537.1 Heat Treatment Processes - 716 Telecommunication; Radar, Radio and Television Database: Compendex Financing analysis patterns based on the hypothesis of Small and medium-sized Enterprises "development capacity gap" theory Zhang, Daijun1 Source: ICCASM 2010 - 2010 International Conference on Computer Application and System Modeling, Proceedings, v 9, p V9142-V9145, 2010, ICCASM 2010 - 2010 International Conference on Computer Application and System Modeling, Proceedings; ISBN-13: 9781424472369; DOI: 10.1109/ICCASM.2010.5623068; Article number: 5623068; Conference: 2010 International Conference on Computer Application and System Modeling, ICCASM 2010, October 22, 2010 - October 24, 2010; Sponsor: Shanxi University; Taiyuan University of Technology; Taiyuan University of Science and Technology; Shanxi Normal University; Publisher: IEEE Computer Society Author affiliation: 1 School of Finance, Zhejiang University of Finance and Economics, Hangzhou, China Abstract: In the light of the principle of Pareto Optimal State, the "the Role Theory" is put forward in this paper: In the situation that the social resources are optimally allocated, all the economic entity should play his role which is the right one in the entire social economic system; basing on the three main systems of enterprises' competition, innovation and controlling ability, the enterprises developing capacity assessing module is founded. Viewing from the Medium and Small Enterprises "banner, system, organization, mechanism, configuration and developing route", that is " five zone route", the " Development Capacity Shortage", which is the relative gap between the role that the medium and small enterprises play in the reality and realzing the expected role in "Pareto Optimal State" is detected; according to the detail situation of Medium and Small Enterprises "Development Capacity Shortage", this paper explores the analysis module of the financing policy's angle and vigor of which the government supports medium and small enterprises to make up the "Development Capacity Shortage". © 2010 IEEE. (5 refs.) Main Heading: Industry Controlled terms: Computer applications - Finance - Pareto principle - Financing policy - Government supports - Medium and small enterprise - Pareto-optimal - Policy making - Role theory - Small and medium -sized enterprise - Social economic system Uncontrolled terms: Capacity shortage Classification Code: 723.5 Computer Applications - 911 Cost and Value Engineering; Industrial Economics - 912 Industrial Engineering and Management Manufacturing Database: Compendex - 913 Production Planning and Control; Long memory macroeconomic model of the term structure of interest rates Yi, Zhi1; Jiang, Feng2 Source: Proceedings - 2010 6th International Conference on Natural Computation, ICNC 2010, v 6, p 2975-2979, 2010, Proceedings - 2010 6th International Conference on Natural Computation, ICNC 2010; ISBN-13: 9781424459612; DOI: 10.1109/ICNC.2010.5583966; Article number: 5583966; Conference: 2010 6th International Conference on Natural Computation, ICNC'10, August 10, 2010 - August 12, 2010; Sponsor: Yantai University; Publisher: IEEE Computer Society Author affiliation: 1 Zhejiang University of Finance and Economics, China 2 Shanghai Chinatop Institute of Economic Research, China Abstract: In this paper, we employ the Sowell (1989) multi-variate long memory model to describe the dynamic behaviors of our macro system. Moreover, we incorporate the partial seasonal adjustment operator into our macro model by which we significantly reduce the AR lag order lower to one,hence reducing a large amount of parameters. Empirically, we apply the estimation proceudre of Hualde and Robinson (2006). We found that 3 month short interest rate is fractionally cointegrated with the long term yield, implying a stable long run relationship between them. © 2010 IEEE. (8 refs.) Main Heading: Mathematical models Uncontrolled terms: Dynamic behaviors - Interest rates - Long memories - Long-term - Macro model - Macro systems - Macro-economic models - Robinson - Seasonal adjustments - Term structure of interest rates yields Classification Code: 921 Mathematics Database: Compendex Gray-level digital watermarking algorithm based on SVD Li, Xudong1 Source: Wuhan Daxue Xuebao (Xinxi Kexue Ban)/Geomatics and Information Science of Wuhan University, v 35, n 11, p 1305-1308+1359, November 2010; Language: Chinese; ISSN: 16718860; Publisher: Wuhan University Author affiliation: 1 School of Mathematics and Statistics, Zhejiang University of Finance and Economics, 18 Xueyuan Street, Hangzhou 310018, China Abstract: A novel SVD based gray-level digital watermarking algorithm is presented. In this algorithm, data from high bit to low bit of decomposed bit planes of the gray-level watermark image are embedded respectively into corresponding singular values from large to small obtained by SVD of sub blocks of the original image. And that the revision for resistance against brightness-and-contrast adjustment is adopted makes that this algorithm has the robustness against brightness-and-contrast adjustment attack. The experimental results show that this algorithm has fine transparency of the embedded watermark and has extremely strong robustness against brightness-and-contrast adjustment attack, and it has as well strong robustness against other common image-processing attacks such as image smoothing, noise adding, color dithering, and JPEG-compression. (13 refs.) Main Heading: Watermarking Controlled terms: Algorithms Uncontrolled protections smoothing values terms: Bit - Digital - - Copyrights - Digital watermarking planes - water-marks Noise Color - adding dithering Embedded - - Contrast watermarks Original - adjustment - Gray-level images - Copyright - Image Singular - Sub-blocks - SVD - Watermark images - Watermarking algorithms Classification Code: 723 Computer Software, Data Handling and Applications - 723.2 Data Processing and Image Processing - 811.1.1 Papermaking Processes - 903 Information Science - 921 Mathematics Database: Compendex A new model between stock valuation index and volatility of stock price He, Chengying1; Xu, Qinghzen2; Liu, Ying2 Source: Proceedings - 2010 International Conference on Intelligent Computing and Cognitive Informatics, ICICCI 2010, p 479-482, 2010, 2010 International Conference on Intelligent Computing and Cognitive Informatics, ICICCI 2010; ISBN-13: 9780769540146; DOI: 10.1109/ICICCI.2010.122; Article number: 5566054; Conference: 2010 International Conference on Intelligent Computing and Cognitive Informatics, ICICCI 2010, June 22, 2010 - June 23, 2010; Sponsor: Intelligent Inf. Technol. Appl. Res. Assoc.; Wuhan University of Science and Tecchnology, Zhongnan Branch; Publisher: IEEE Computer Society Author affiliation: 1 Institute of China Security Market, Zhejiang University of Finance and Economics, Hangzhou, 310018, China 2 11F-05, International Trust Building, Guosen Securities Co. Ltd., Shenzhen, 518001, China Abstract: Evaluation index are long been thought as very accurately reflect stock price by people in China. In this paper, we build theory models to study the raltionship between volume, P/B(Price-to-Book value Ratio), P/S(Price-to-Sale Ratio) and P/CF(Price-to-Cash Flow Ratio) and stock market volatility. In current China stock market, individual stock price volatility is a complicated function. The resulting stock price function has four variables as input: volume, PB, PS, PC. In this paper, we present a new mathematical model to simulate stock price volatility. We applied the new model to a stock through empirical analysis. Our conclusions are as follows: (1) The volatility of stock price is a function of parameters of PB, PS and PC. (2) Our new model can predict future stock price changes. (3) PB, PS and PC has positive effect on stock price. Moreover, this paper proposed some potential methods and system suggestions for the further improvement of stock price pridiction in China stock market. Overal, the empirical analysis results show that the new model can enhance the volatility forecasting ability of individual stock in china stock market. © 2010 IEEE. (12 refs.) Main Heading: Costs Controlled terms: Commerce - Information science - Intelligent computing - Mathematical models - Complicated functions - Empirical analysis - Evaluation index - New mathematical model - New model - Positive effects - Potential methods - Stock market - Stock market volatility - Stock price - Stock valuations - Theory model - Volatility - Volatility forecasting Uncontrolled terms: Cash flow Classification Code: 723.4 Artificial Intelligence - 903 Information Science - 911 Cost and Value Engineering; Industrial Economics - 921 Mathematics Database: Compendex Fast algorithm of output increment feedback predictive control with input constraints Aiping, Yang1 Source: Proceedings of the World Congress on Intelligent Control and Automation (WCICA), p 4851-4854, 2010, 2010 8th World Congress on Intelligent Control and Automation, WCICA 2010; ISBN-13: 9781424467129; DOI: 10.1109/WCICA.2010.5554847; Article number: 5554847; Conference: 2010 8th World Congress on Intelligent Control and Automation, WCICA 2010, July 7, 2010 - July 9, 2010; Publisher: Institute of Electrical and Electronics Engineers Inc. Author affiliation: 1 Zhejiang University of Finance and Economics, Hangzhou, 310018, China Abstract: Based on output increment feedback GPC and some algorithms to solve the problem of input constrains, a new output increment feedback GPC with input constraints is proposed. The operation of inverse matrix is avoided by approximately computing the future control increment sequence off line, so that the on-line computation burden is strongly reduced. Moreover, the algorithm can obtain the optimal control input by adjusting the set-value of max-output increment and guarantees that output close to the set-value. Simulation results show that the proposed algorithm is effective. © 2010 IEEE. (10 refs.) Main Heading: Algorithms Controlled terms: Intelligent control - Inverse problems - GPC - Input constrains - Input constraints - Inverse - Online computations - Optimal controls - Output increment feedback - Predictive control - Simulation result Uncontrolled terms: Fast algorithms matrix Classification Code: 731.1 Control Systems - 921 Mathematics Database: Compendex A Fast generalized predictive control algorithm with non-overshoot Yang, Aiping1 Source: Proceedings of the World Congress on Intelligent Control and Automation (WCICA), p 3572-3575, 2010, 2010 8th World Congress on Intelligent Control and Automation, WCICA 2010; ISBN-13: 9781424467129; DOI: 10.1109/WCICA.2010.5553879; Article number: 5553879; Conference: 2010 8th World Congress on Intelligent Control and Automation, WCICA 2010, July 7, 2010 - July 9, 2010; Publisher: Institute of Electrical and Electronics Engineers Inc. Author affiliation: 1 Zhejiang University of Finance and Economics, Hangzhou, 310018, China Abstract: A Fast generalized predictive control algorithm is proposed for a class of system requirement of non-overshoot based on integrating stair-like GPC and varying trend of control increments. The heavy on-line computation burden for computing inverse matrix is avoided by single-valued GPC, and current input increment is compensated by next step input to overcome potential overshoot. The steps of the algorithm is described in detail. Simulation results show the algorithm has good control performance in response speed, anti-interference, restricting the overshoot and robustness. © 2010 IEEE. (10 refs.) Main Heading: Predictive control systems Controlled terms: Algorithms - Intelligent control - Inverse problems Uncontrolled terms: Anti-interference predictive control algorithms speed - GPC - Control performance - Inverse matrix - - Simulation result - System requirements Classification Code: 731.1 Control Systems - 921 Mathematics Database: Compendex - Current input Online computations - Generalized - Response Singular integral operator, Hardy-Morrey space estimates for multilinear operators and Navier-Stokes equations Wang, Henggeng1, 2; Jia, Houyu3 Source: Mathematical Methods in the Applied Sciences, v 33, n 14, p 1661-1684, September 30, 2010; ISSN: 01704214, E-ISSN: 10991476; DOI: 10.1002/mma.1275; Publisher: John Wiley and Sons Ltd Author affiliation: 1 School of Mathematics and Statistics, Zhejiang University of Finance and Economics, Hangzhou 310018, China 2 Institute of Applied Physics and Computational Mathematics, Beijing 100088, China 3 Department of Mathematics, Zhejiang University, Hangzhou, Zhejiang 310027, China Abstract: After establishing the molecule characterization of the Hardy-Morrey space, we prove the boundedness of the singular integral operator and the Riesz potential. We also obtain the Hardy-Morrey space estimates for multilinear operators satisfying certain vanishing moments. As an application, we study the existence and the uniqueness of the solutions to the Navier-Stokes equations for the initial data in the Hardy-Morrey space H Mpq(p≥n) for q as small as possible. Here, the Hardy-Morrey space estimates for multilinear operators are important tools. Copyright © 2010 John Wiley & Sons, Ltd. (27 refs.) Main Heading: Navier Stokes equations Controlled terms: Mathematical operators Uncontrolled operator terms: Boundedness - - Viscous flow Div-curl theorem - Morrey spaces - Riesz potentials - Singular integral operators - Vanishing moment Classification Code: 631.1 Fluid Flow, General - 921 Mathematics Database: Compendex - Multilinear Study on design strategy of brand culture in art education Lili, Zhu1 Source: ICENT 2010 - 2010 International Conference on Educational and Network Technology, p 62-65, 2010, ICENT 2010 - 2010 International Conference on Educational and Network Technology; ISBN-13: 9781424476619; DOI: 10.1109/ICENT.2010.5532127; Article number: 5532127; Conference: 2010 International Conference on Educational and Network Technology, ICENT 2010, June 25, 2010 - June 27, 2010; Sponsor: Int. Assoc. Comput. Sci. Inf. Technol. (IACSIT); Institute of Electrical and Electronics Engineers (IEEE); Publisher: IEEE Computer Society Author affiliation: 1 College of Arts, Zhejiang University of Finance and Economics, Hangzhou, China Abstract: The education for design method of brand culture takes a very important position in art education. It's a great challenge for students to understand basic attributes of a brand's trademark, its role as an important mark for an enterprise and products to distinguish from competitors and its characteristics as an important carrier of market publicity for an enterpriser, and also design for a humanistic brand. In terms of principles for brand design, this article drafts the brand's design program and conducts in-depth analysis and investigation on specific schemes, such as whole design for a brand's image, packaging design and innovative design of advertisement. Besides, it proposes the point that in teaching process the students understand the principle for an enterprise devoting to humanistic brand design and taking culture as brand communication strategy. © 2010 IEEE. (10 refs.) Main Heading: Design Controlled terms: Competition - Uncontrolled terms: Art education strategy strategies - Communication In-depth analysis Classification Code: Students - strategy - Brand communication - Design Innovative design method - - Brand design Design Packaging designs - Brand-culture programs - Design Teaching process 408 Structural Design - 901.2 Education - 911.2 Industrial Economics Database: Compendex - A new manufacturing resource allocation method for supply chain optimization using extended genetic algorithm Zhang, W.Y.1; Zhang, Shuai1; Cai, Ming2; Huang, J.X.2 Source: International Journal of Advanced Manufacturing Technology, p 1-14, 2010; ISSN: 02683768, E-ISSN: 14333015; DOI: 10.1007/s00170-010-2900-3 Author affiliation: 1 School of Information, Zhejiang University of Finance and Economics, Hangzhou, 310018, China 2 School of Computer Science, Zhejiang University, Hangzhou, 310027, China Abstract: In distributed manufacturing environments, the real competitive edge of an enterprise is directly related to the optimization level of its supply chain deployment in general, and, in particular, to how it allocates diverse manufacturing resources optimally. This is faced with increasing challenges caused by the conflicting objectives in manufacturing integration over distributed manufacturing resources. This paper presents a new manufacturing resource allocation method using extended genetic algorithm (GA) to support the multi-objective decision-making optimization for supply chain deployment. A new multi-objective decision-making mathematical model is proposed to evaluate, select, and sequence the candidate manufacturing resources allocated to sub-tasks composing the supply chain, by dealing with the trade-offs among multiple objectives including similarity, time, cost, quality, and service. An extended GA approach with problem-specific two-dimensional representation scheme, selection operator, crossover operator, and mutation operator is proposed to solve the mathematical model optimally by designing a chromosome containing two kinds of information, i.e., resource selection and resource sequencing. A case study is carried out to demonstrate the effectiveness and efficiency of the proposed approach. © 2010 Springer-Verlag London Limited. (19 refs.) Main Heading: Mathematical operators Controlled terms: Decision making models - management Multiobjective - terms: Competitive - Enterprise IS resource allocation operators - operators - - Genetic algorithms - Resource Manufacture allocation - - Mathematical Supply chain Supply chains Uncontrolled manufacturing - optimization - Classification Code: - eXtended GA Multiobjective Optimization Subtasks - - edges levels decision - Crossover - operator Manufacturing resource - Multiple Resource - Manufacturing - objectives selection Distributed - Mutation Selection Supply chain optimization 912 Industrial Engineering and Management - 912.2 Management - 913 Production Planning and Control; Manufacturing - 913.4 Manufacturing - 921 Mathematics - 921.5 Optimization Techniques Database: Compendex A universal algorithm to generate pseudo-random numbers based on uniform mapping as homeomorphism Fu-Lai, Wang1 Source: Chinese Physics B, v 19, n 9, September 2010; ISSN: 16741056; DOI: 10.1088/1674-1056/19/9/090505; Article number: 090505; Publisher: Institute of Physics Publishing Author affiliation: 1 Department of Mathematics and Statistics, Zhejiang University of Finance and Economics, Hangzhou 310012, China Abstract: A specific uniform map is constructed as a homeomorphism mapping chaotic time series into [0,1] to obtain sequences of standard uniform distribution. With the uniform map, a chaotic orbit and a sequence orbit obtained are topologically equivalent to each other so the map can preserve the most dynamic properties of chaotic systems such as permutation entropy. Based on the uniform map, a universal algorithm to generate pseudo random numbers is proposed and the pseudo random series is tested to follow the standard 0-1 random distribution both theoretically and experimentally. The algorithm is not complex, which does not impose high requirement on computer hard ware and thus computation speed is fast. The method not only extends the parameter spaces but also avoids the drawback of small function space caused by constraints on chaotic maps used to generate pseudo random numbers. The algorithm can be applied to any chaotic system and can produce pseudo random sequence of high quality, thus can be a good universal pseudo random number generator. © 2010 Chinese Physical Society and IOP Publishing Ltd. (17 refs.) Main Heading: Chaotic systems - Controlled terms: Algorithms Uncontrolled - series quality - - terms: Chaos Computation speed Parameter spaces - - generators distribution Number theory - Chaotic - Classification Code: Random number generation Dynamic numbers - - Chaotic orbits property - Function map - Permutation entropy Pseudo-random Uniform distribution - - Uniform map Pseudorandom - - Time series Chaotic spaces - time High Pseudo random number sequences Universal algorithm 921 Mathematics - 922.2 Mathematical Statistics Database: Compendex - Pseudo random - - Random Image digital watermarking algorithm based on wavelet transform and relative quantization Li, Xu-Dong1 Source: Guangdianzi Jiguang/Journal of Optoelectronics Laser, v 21, n 9, p 1378-1382, September 2010; Language: Chinese; ISSN: 10050086; Publisher: Board of Optronics Lasers Author affiliation: 1 School of Mathematics and Statistics, Zhejiang University of Finance and Economics, Hangzhou 310018, China Abstract: An image digital watermarking algorithm is proposed, based on blocked wavelet transform and relative quantization which is simple, handy and easy to implement. For the using of quantization scheme, the algorithm can extract watermark without original image and original watermark. Experimental results show that the algorithm has a fine transparency of the embedded watermark image, and the algorithm is very robust against brightness and contrast attacks and is robust against attacks such as JPEG-compression, re-sampling, dithering, smoothing, and noise adding as well. (20 refs.) Main Heading: Watermarking Controlled processing - terms: Algorithms - quantization - Digital - watermarking Image Wavelet transforms Uncontrolled terms: Blind watermarking adding - Copyrights Original Resampling Classification Code: images - - - Copyright protection - Quantization Embedded watermarks schemes - - Noise Relative Watermarking algorithms 723 Computer Software, Data Handling and Applications - 723.2 Data Processing and Image Processing - 811.1.1 Papermaking Processes Mathematics - 921.3 Mathematical Transformations Database: Compendex - 903 Information Science - 921 Dynamic service selection with reputation management Surong, Yan1; Xiaolin, Zheng2; Deren, Chen2 Source: Proceedings - 2010 International Conference on Service Science, ICSS 2010, p 9-16, 2010, Proceedings - 2010 International Conference on Service Science, ICSS 2010; ISBN-13: 9780769540177; DOI: 10.1109/ICSS.2010.67; Article number: 5494369; Conference: 2010 International Conference on Service Sciences, ICSS 2010, May 12, 2010 - May 14, 2010; Sponsor: International Business Machines China Company Limited (IBM); Zhejiang University (ZJU); Institute of Software, Chinese Academy of Sciences (ISCAS); Publisher: IEEE Computer Society Author affiliation: 1 College of Computer Science and Technology, Zhejiang University, Zhejiang University of Finance and Economics, Hangzhou, China 2 College of Computer Science and Technology, Zhejiang University, Hangzhou, China Abstract: In open and dynamic internet environments, reputation-based trust is a key issue for service selection which is based on the prediction of services' performance. Typically, the trust and reputation evaluation is based on the feedback of the service quality from all service users. The crucial issue in this evaluation is to detect and deal with false or unfair feedback from dishonest providers and malicious users. In this paper, we first present a dynamic service selection framework then introduce a semantic matching and ranking algorithm to enable the automatic selection. Furthermore, we propose a trust and reputation assessment approach to address trust and reputation of service and service user in various realistic malicious behaviors. Finally, to the best of our knowledge, a set of empirical studies have been conducted to demonstrate that our solution gains good results under collaboration attacks of various malicious behaviors. © 2010 IEEE. (11 refs.) Uncontrolled terms: Assessment approaches - Automatic selection services - Empirical studies - Internet environment - Key issues behavior - Ranking algorithm - Reputation management - Semantic matching matching - Service Quality - Service selection - Trust and reputation Database: Compendex Dynamic Malicious Service A complexity measure approach based on forbidden patterns and correlation degree Fu-Lai, Wang1 Source: Chinese Physics B, v 19, n 6, 2010; ISSN: 16741056; DOI: 10.1088/1674-1056/19/6/060515; Article number: 060515; Publisher: Institute of Physics Publishing Author affiliation: 1 Department of Mathematics and Statistics, Zhejiang University of Finance and Economics, Hangzhou 310012, China Abstract: Based on forbidden patterns in symbolic dynamics, symbolic subsequences are classified and relations between forbidden patterns, correlation dimensions and complexity measures are studied. A complexity measure approach is proposed in order to separate deterministic (usually chaotic) series from random ones and measure the complexities of different dynamic systems. The complexity is related to the correlation dimensions, and the algorithm is simple and suitable for time series with noise. In the paper, the complexity measure method is used to study dynamic systems of the Logistic map and the He´non map with multi-parameters. © 2010 Chinese Physical Society and IOP Publishing Ltd. (18 refs.) Main Heading: Correlation methods - Controlled terms: Computational complexity Uncontrolled terms: Complexity measures dimensions maps - - Dynamic Multiparameters Classification Code: - - Dynamical systems Complexity theory Systems - - - Time series - Correlation degree Forbidden pattern - Correlation Logistic Symbolic Dynamics 721.1 Computer Theory, Includes Formal Logic, Automata Theory, Switching Theory, Programming Theory - 921 Mathematics - 922.2 Mathematical Statistics - 931 Classical Physics; Quantum Theory; Relativity Database: Compendex A modification of regularized newton-type method for nonlinear ill-posed problems Meng, Ze-Hong1; Zhao, Zhen-Yu2; He, Guo-Qiang3 Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 5938 LNCS, p 295-304, 2010, High Performance Computing and Applications - Second International Conference, HPCA 2009, Revised Selected Papers; ISSN: 03029743, E-ISSN: 16113349; ISBN-10: 3642118410, ISBN-13: 9783642118418; DOI: 10.1007/978-3-642-11842-5_40; Conference: 2nd International Conference on High-Performance Computing and Applications, HPCA 2009, August 10, 2009 - August 12, 2009; Sponsor: Shanghai Jiao Tong University; Xi'an Jiao Tong University; University of Calgary; Publisher: Springer Verlag Author affiliation: 1 School of Mathematics and Statistics, Zhejiang University of Finance and Economics, 310018, China 2 College of Science, Guangdong Ocean University, Zhanjiang, 524088, China 3 Department of Mathematics, Shanghai University, 200444, China Abstract: A Modification of regularized Newton-type method for nonlinear ill-posed problems is considered. Using an a posteriori stopping rule proposed by Kaltenbacher, the convergence of the method is proved under certain conditions on the nonlinear operator. Optimal convergence rates are also shown under appropriate closeness and smoothness assumptions on the difference of the starting value and the solution. Some special cases of the method are also given. Numerical results confirm the corresponding theoretical statements. © 2010 Springer-Verlag. (13 refs.) Main Heading: Problem solving Controlled terms: Numerical analysis Uncontrolled - operator values - terms: Newton-type Numerical results methods - - Optimal Nonlinear ill-posed convergence - problems Posteriori - Nonlinear - Stopping rule Classification Code: 723.4 Artificial Intelligence - 921 Mathematics - 921.6 Numerical Methods Database: Compendex Starting A new smoothing Newton-type algorithm for semi-infinite programming Ling, Chen1; Ni, Qin2; Qi, Liqun3; Wu, Soon-Yi4 Source: Journal of Global Optimization, v 47, n 1, p 133-159, May 2010; ISSN: 09255001, E-ISSN: 15732916; DOI: 10.1007/s10898-009-9462-7; Publisher: Springer Netherlands Author affiliation: 1 School of Mathematics and Statistics, Zhejiang University of Finance and Economics, 310018 Hangzhou, China 2 Department of Mathematics, Nanjing University of Aeronautics and Astronautics, 210016 Nanjing, China 3 Department of Applied Mathematics, Hong Kong Polytechnic University, Hung Hom, Kowloon, Hong Kong 4 Department of Mathematics, National Cheng Kung University, National Center for Theoretical Sciences, Tainan, Taiwan Abstract: We consider a semismooth reformulation of the KKT system arising from the semi-infinite programming (SIP) problem. Based upon this reformulation, we present a new smoothing Newton-type method for the solution of SIP problem. The main properties of this method are: (a) it is globally convergent at least to a stationary point of the SIP problem, (b) it is locally superlinearly convergent under a certain regularity condition, (c) the feasibility is ensured via the aggregated constraint, and (d) it has to solve just one linear system of equations at each iteration. Preliminary numerical results are reported. © Springer Science+Business Media, LLC. 2009. (39 refs.) Main Heading: Mathematical programming Controlled terms: Convergence of numerical methods - Internet protocols - Linear systems - Numerical analysis Uncontrolled terms: Globally algorithms Newton-type methods - convergent - - Linear system Nonsmooth equation - of equations - Newton-type Numerical results - Regularity condition - Semi infinite programming - Semismooth - Smoothing methods - Stationary points Classification Code: 961 Systems Science - 922 Statistical Methods - 921.6 Numerical Methods - 921.5 Optimization Techniques - 921 Mathematics - 731.1 Control Systems - 723.1 Computer Programming - 723 Computer Software, Data Handling and Applications Communication, Equipment and Techniques Database: Compendex - 722.3 Data Automatic transformation of HTML pages into relational database Deng, Xubin1 Source: Journal of Information and Computational Science, v 7, n 2, p 349-355, February 2010; ISSN: 15487741; Publisher: Binary Information Press Author affiliation: 1 School of Information, Zhejiang University of Finance and Economics, Hangzhou 310018, China Abstract: We present an approach for transformation of HTML pages into relational database. This approach first constructs a DOM-tree from a HTML page, then finds continually repeat structures in the DOM-tree and abstracts them into a set of generalized lists, and finally constructs a schema tree for an abstracted DOM-tree and simultaneously fills relation tables in the schema tree with data extracted from the DOM-tree. A prototype system has been developed, which forms the bases for a relational model-based platform of entity set finding, useful information extraction and analyses for HTML pages. Copyright © 2010 Binary Information Press. (8 refs.) Main Heading: Trees (mathematics) Controlled terms: Abstracting - Biological materials - Database systems - HTML - Markup languages Uncontrolled terms: Automatic transformations - Generalized list - HTML pages - Information Extraction - Prototype system - Relation tables - Relational Database - Relational Model Classification Code: 461.2 Biological Materials and Tissue Engineering - 723 Computer Software, Data Handling and Applications - 723.3 Database Systems - 903.1 Information Sources and Analysis - 921.4 Combinatorial Mathematics, Includes Graph Theory, Set Theory Database: Compendex A color recovering method for black-white facial image Li, Xudong1 Source: Wuhan Daxue Xuebao (Xinxi Kexue Ban)/ Geomatics and Information Science of Wuhan University, v 35, n 2, p 237-239, February 2010; Language: Chinese; ISSN: 16718860; Publisher: Wuhan University Author affiliation: 1 School of Mathematics and Statistics, Zhejiang University of Finance and Economics, 18 Xueyuan Street, Hangzhou 310018, China Abstract: A novel color recovering method for black-white facial image based on image warping and color-space transformation is presented. The basic idea of the method is referring a colorized facial image and then adding its tint into the black-white facial image. This method is simple to understand and can easily be implemented. Experimental results show that the method is very effective and can naturally and livelily realize color recovering of different black-white facial images including images of the males, the females, the elders, and the youngers. The facial details in the color recovered image obtained by this method is very realistic and convincing. (11 refs.) Main Heading: Color Controlled terms: Image enhancement - Recovery - Weaving Uncontrolled terms: Basic idea - Black-white images - Color space - Facial images - Image warping - Space transformations Classification Code: 531 Metallurgy and Metallography - 622.5 Radioactive Wastes - 723.2 Data Processing and Image Processing - 741 Light, Optics and Optical Devices - 741.1 Light/Optics - 819.5 Textile Products and Processing Database: Compendex A new semantic similarity measuring method based on web search engines Lu, Gang1; Huang, Peng2; He, Lijun1; Cu, Changyong3; Li, Xiaobo4 Source: WSEAS Transactions on Computers, v 9, n 1, p 1-10, January 2010; ISSN: 11092750; Publisher: World Scientific and Engineering Academy and Society Author affiliation: 1 School of Information, Zhejiang University of Finance and Economics, 18 Xueyuan Street, Hangzhou 310018, China 2 Zhejiang University, 1 Yugu road, Hangzhou 310018, China 3 School of Mechanical Engineering, Hangzhou Dianzi University, Xiasha, Hangzhou 310018, China 4 School of Information, Zhejiang Education Institute, 140 Wensan Road, Hangzhou 310012, China Abstract: Word semantic similarity measurement is a basic research area in the fields of natural language processing, intelligent retrieval, document clustering, document classification, automatic question answering, word sense disambiguation, machine translation, etc.. To address the issues existing in current approaches to word semantic similarity measurement, such as the low term coverage and difficult update, a novel word semantic similarity measurement method based on web search engines is proposed, which exploits the information, including page count and snippets, in retrieved results to do calculation. The proposed method can resolve the issues mentioned above due to the huge volumes of information in the Web. The experimental results demonstrate the effectiveness of the (26 refs.) proposed methods. Main Heading: World Wide Web Controlled terms: Computational linguistics - Industrial research - Information retrieval - Information retrieval systems - Information theory - Natural language processing systems - Ontology - Search engines - Semantic Web - Semantics - Speech transmission Uncontrolled terms: Intelligent retrieval - Semantic similarity - Web search engine - Web search engines - Wordnet Classification Speech - Dissemination Code: 901.3 - 912.1 Industrial Engineering Engineering Research 903.3 Information Retrieval - 903 - 723.5 Information and Use - Computer Science Applications - 903.2 - 751.5 Information 723.2 Data Processing and Image Processing - 721.1 Computer Theory, Includes Formal Logic, Automata Theory, Switching Theory, Programming Theory - 718 Telephone Systems and Related Technologies; Line Communications - 717 Optical Communication - 716.1 Information Theory and Signal Processing - 716 Telecommunication; Radar, Radio and Television - 723 Computer Software, Data Handling and Applications Database: Compendex Semiparametric estimation in transformation models with cure fraction Zhao, Xiaobing1; Zhou, Xian2 Source: Communications in Statistics - Theory and Methods, v 39, n 18, p 3371-3388, January 2010; ISSN: 03610926, E-ISSN: 1532415X; DOI: 10.1080/03610920903268840; Publisher: Taylor and Francis Inc. Author affiliation: 1 School of Management and Statistics, Zhejiang University of Finance and Economics, Hangzhou, China 2 Department of Actuarial Studies, Macquarie University, Balaclava Road, North Ryde, Sydney, NSW 2109, Australia Abstract: Semiparametric transformation model has been extensively investigated in the literature. The model, however, has little dealt with survival data with cure fraction. In this article, we consider a class of semi-parametric transformation models, where an unknown transformation of the survival times with cure fraction is assumed to be linearly related to the covariates and the error distributions are parametrically specified by an extreme value distribution with unknown parameters. Estimators for the coefficients of covariates are obtained from pseudo Z-estimator procedures allowing censored observations. We show that the estimators are consistent and asymptotically normal. The bootstrap estimation of the variances of the estimators is also investigated. Copyright © Taylor & Francis Group, LLC. (33 refs.) Main Heading: Parameter estimation Controlled terms: Curing - Linear transformations Uncontrolled terms: Bootstrap estimator - Censored observations - Covariates - Cure fraction - Error distributions - Extreme value distributions - Pseudo Z-estimator - Semi parametric estimation - Semiparametric - Survival data - Survival time - Transformation model - Unknown parameters Classification Code: Transformations Database: Compendex 731.1 Control Systems - 815.1 Polymeric Materials - 921.3 Mathematical Value safeguard mechanism in asymmetric interorganizational relationships Ye, Zhan1, 2 Source: 2010 International Conference on Management and Service Science, MASS 2010, 2010, 2010 International Conference on Management and Service Science, MASS 2010; ISBN-13: 9781424453269; DOI: 10.1109/ICMSS.2010.5576703; Article number: 5576703; Conference: 2010 International Conference on Management and Service Science, MASS 2010, August 24, 2010 - August 26, 2010; Sponsor: IEEE Wuhan Section; Sichuan University; Wuhan University; James Madison University; Publisher: IEEE Computer Society Author affiliation: 1 Shool of Management, Zhejiang University, Hangzhou, China 2 School of Accounting, Zhejiang University of Finance and Economics, Hangzhou, China Abstract: Network structure is recognized as an increasing important mechanism of value safeguard in interorganizational relationships. This paper employs social network approach to examine how smaller and vulnerable firms use their network structure as governance mechanisms in collaborations with stronger and prominent firms. We identify three distinctive types of tie-formation strategies and illustrate contingents that affect the choice of network strategies. © 2010 IEEE. (16 refs.) Main Heading: Management science Uncontrolled terms: Governance mechanism - Inter-organizational strategy - Network structures - Social Networks - Value safeguard Classification Code: 912.2 Management relationships - Network Improvement of background value and its application in non-equidistance GM (1, 1) modeling Wei, Xiong1; Yang, Aiping2; Dai, Wenzhan1 Source: Proceedings of the World Congress on Intelligent Control and Automation (WCICA), p 5919-5923, 2010, 2010 8th World Congress on Intelligent Control and Automation, WCICA 2010; ISBN-13: 9781424467129; DOI: 10.1109/WCICA.2010.5554504; Article number: 5554504; Conference: 2010 8th World Congress on Intelligent Control and Automation, WCICA 2010, July 7, 2010 - July 9, 2010; Publisher: Institute of Electrical and Electronics Engineers Inc. Author affiliation: 1 Department of Automatic Control, Zhejiang Sci.-Tech. University, Hangzhou, 310018, China 2 Zhejiang University of Finance and Economics, Hangzhou, 310018, China Abstract: Based on the geometric explanation of integral, a new construction method of GM(1,1)'s background value for non-equidistance sequence is put forward by using approach that actual area is substituted by summation of small rectangle area and small echelon area. Because the method is able to optimize the result of modeling, so the GM(1,1)'s fitting precision and prediction precision are advanced greatly The method is applied in building model of relation between titanium alloy fatigue strength and temperature change, the result proves its validity and enlarges the scope of GM(1,1) 's application wildly. © 2010 IEEE. (9 refs.) Main Heading: System theory Controlled terms: Intelligent control - Titanium - Titanium alloys Uncontrolled terms: Background value - Fatigue strength - Fitting precision - GM (1 , 1) - Grey Model - In-buildings - New constructions - Non-equidistance - Prediction precision - Rectangle areas - Temperature changes Classification Code: Database: Compendex 542.3 Titanium and Alloys - 731.1 Control Systems - 961 Systems Science An improved feature extraction method for individual offline handwritten digit recognition Qinghui, Wang1, 3; Aiping, Yang2; Wenzhan, Dai1 Source: Proceedings of the World Congress on Intelligent Control and Automation (WCICA), p 6327-6330, 2010, 2010 8th World Congress on Intelligent Control and Automation, WCICA 2010; ISBN-13: 9781424467129; DOI: 10.1109/WCICA.2010.5554355; Article number: 5554355; Conference: 2010 8th World Congress on Intelligent Control and Automation, WCICA 2010, July 7, 2010 - July 9, 2010; Publisher: Institute of Electrical and Electronics Engineers Inc. Author affiliation: 1 Department of Automatic Control, Zhejiang Sci.-Tech. University, Hangzhou, 310018, China 2 Zhejiang University of Finance and Economics, Hangzhou, 310018, China 3 Department of Electron and Electric, Longyan University, Longyan, 364000, China Abstract: Offline handwritten digit recognition (OHDR) is considered as one of difficult problems in the field of pattern recognition. Because it is a challenging computational problem mainly due to the vast differences associated with the handwritten patterns of different individuals. In this paper, a novel method of feature extraction is presented based on structural feature for OHDR by simulating the process of human recognizing handwritten digit. Firstly state and state value are introduced, then the steps of how to determine the eigenvalue is explained in detail, last the method is applied in OHDR, and the result show its effectiveness. © 2010 IEEE. (10 refs.) Main Heading: Feature extraction Controlled terms: Character recognition - Eigenvalues and eigenfunctions - Intelligent control Uncontrolled terms: Computational problem - Eigen-value - Feature extraction methods - Handwritten digit - Novel methods - Off-line handwritten - Structural feature Classification Code: 716 Telecommunication; Radar, Radio and Television - 723 Computer Software, Data Handling and Applications - 723.4.1 Expert Systems - 921.1 Algebra Database: Compendex GM (1,1)Model based on arccot(x) transformation and it's application Wei, Xiong1; Yang, Aiping2; Dai, Wenzhan1 Source: Proceedings of the World Congress on Intelligent Control and Automation (WCICA), p 5924-5928, 2010, 2010 8th World Congress on Intelligent Control and Automation, WCICA 2010; ISBN-13: 9781424467129; DOI: 10.1109/WCICA.2010.5554498; Article number: 5554498; Conference: 2010 8th World Congress on Intelligent Control and Automation, WCICA 2010, July 7, 2010 - July 9, 2010; Publisher: Institute of Electrical and Electronics Engineers Inc. Author affiliation: 1 Department of Automatic Control, Zhejiang Sci.-Tech. University, Hangzhou, 310018, China 2 Zhejiang University of Finance and Economics, Hangzhou, 310018, China Abstract: In this paper, the method of GM (1, 1) modeling based on arccot(x) transformation is put forward. It is proved that the series after this transformation can not only needs the condition of modeling GM (1,1), but the smooth degree is much better than that by other transformations, so the method can widen the range of application of grey mode1. The practical application shows the effectiveness of the proposed method. © 2010 IEEE. (7 refs.) Main Heading: System theory Controlled terms: Intelligent control Uncontrolled terms: Discrete data - GM (1 , 1) - Grey Model degree - The conditions of building model Classification Code: Database: Compendex 731.1 Control Systems - 961 Systems Science - Model-based - Smooth Hybrid multi-attribute decision making based on vague sets Wang, Haixia1; Yang, Aiping2; Dai, Wenzhan1 Source: Proceedings of the World Congress on Intelligent Control and Automation (WCICA), p 5140-5144, 2010, 2010 8th World Congress on Intelligent Control and Automation, WCICA 2010; ISBN-13: 9781424467129; DOI: 10.1109/WCICA.2010.5554924; Article number: 5554924; Conference: 2010 8th World Congress on Intelligent Control and Automation, WCICA 2010, July 7, 2010 - July 9, 2010; Publisher: Institute of Electrical and Electronics Engineers Inc. Author affiliation: 1 Department of Automatic Control, Zhejiang Sci.-Tech. University, Hangzhou, 310018, China 2 Zhejiang University of Finance and Economics, Hangzhou, 310018, China Abstract: In view of the practical problems in hybrid multi-attribute decision-making, a method based on vague sets is proposed. Firstly, the qualitative and quantitative indicator values described by linguistic variables and exact numbers respectively are transformed into vague values. Secondly, a model of hybrid multi-objective decision making based on vague sets is put forward. Thirdly a novel comprehensive evaluation index is proposed, by which the meaning of "which is closest to PIS (Positive Ideal Solution) and farthest from NIS (Negative Ideal Solution)" is expressed and the concrete steps of hybrid multi-attribute decision making on vague sets is given. Finally, the proposed method is applied into a case study and the result proves the method is effective. © 2010 IEEE. (10 refs.) Main Heading: Decision making Controlled terms: Intelligent control Uncontrolled terms: Comprehensive evaluation index - Hybrid multi-attribute decision making - Ideal solutions - Linguistic variable - Multi attribute decision making - Multi objective decision making - Practical problems - Quantitative indicators - TOPSIS - Vague sets - Vague values Classification Code: Database: Compendex 731.1 Control Systems - 912.2 Management Exploring injection prevention technologies for security-aware distributed collaborative manufacturing on the Semantic Web Yang, Xiaohu1; Chen, Yixi1; Zhang, Wenyu2; Zhang, Shuai2 Source: International Journal of Advanced Manufacturing Technology, p 1-11, 2010; ISSN: 02683768, E-ISSN: 14333015; DOI: 10.1007/s00170-010-2983-x Author affiliation: 1 School of Computer Science, Zhejiang University, Hangzhou, 310027, China 2 School of Information, Zhejiang University of Finance and Economics, Hangzhou, 310027, China Abstract: Security is one of the key challenges for the development of distributed collaborative manufacturing systems. Most of the access control models of collaborative systems cannot prevent illegal accesses to column/row levels of a database table, which could be caused by command injection. This paper firstly presents the possible injection attacks in RDBMS-based collaborative system on the Semantic Web and gives their classification. Based on this classification, the paper then describes an attempt at detecting command injections to the distributed collaborative manufacturing systems by comparing the inputs related nodes that are intended with the resulting parse tree in run time. To validate the proposed approach, a prototype system called "SemGuard" has been developed. By testing on two commonly used RDF databases and one real Semantic Web application, it shows that SemGuard is efficient, taking less than 10 ms overhead to protect the context information of a distributed collaborative manufacturing system. © 2010 Springer-Verlag London Limited. (23 refs.) Main Heading: Semantic Web Controlled terms: Access control - Computer aided manufacturing - Network security Uncontrolled terms: Access control models - Collaborative manufacturing - Collaborative manufacturing system - Collaborative systems - Commonly used - Context information - Database tables - Illegal Access - Parse trees - Prevention technologies - Prototype system - RDF database - Runtimes - Security-aware - Semantic web applications Classification Code: Applications Database: Compendex 723 Computer Software, Data Handling and Applications - 723.5 Computer Advances on stability for switched linear systems Zhang, Xia1, 2; Gao, Yan3; Xia, Zun-Quan1 Source: Kongzhi yu Juece/Control and Decision, v 25, n 10, p 1441-1450, October 2010; Language: Chinese; ISSN: 10010920; Publisher: Northeast University Author affiliation: 1 School of Mathematical Sciences, Dalian University of Technology, Dalian 116024, China 2 School of Mathematics and Statistics, Zhejiang University of Finance and Economics, Hangzhou 310018, China 3 School of Management, University of Shanghai for Science and Technology, Shanghai 200093, China Abstract: The study of the stability analysis and the switching stabilization for switched linear systems is a hot topic in recent years. The lately main results about this problem are reviewed in this paper. Firstly, the primary conclusions of the stability analysis are given for switched linear systems under two cases such that the arbitrary switching and the restricted switching. Then the main methods for switching stabilization are presented. Finally, the current results of the practical stability and the finite-time stability problems for switched systems are outlined, and the development of this research field is forecasted. (87 refs.) Main Heading: System stability Controlled terms: Differential equations - Electric grounding - Hybrid computers - Hybrid systems - Linear systems - Lyapunov functions - Stabilization - Switching - Switching systems Uncontrolled function - terms: Arbitrary Non-smooth - switching Practical stability - Finite - time stability Research fields - - Multiple Slow switching Lyapunov - Stability analysis - Switched linear system - Switched system - Switching stabilization Classification Code: 951 Materials Science - 921.2 Calculus - 921 Mathematics - 961 Systems Science - 722.5 Analog and Hybrid Computers - 706 Electric Transmission and Distribution - 704 Electric Components and Equipment - 721.1 Computer Theory, Includes Formal Logic, Automata Theory, Switching Theory, Programming Theory Database: Compendex Numerical differentiation for periodic functions Zhao, Zhenyu1, 3; Meng, Zehong2 Source: Inverse Problems in Science and Engineering, v 18, n 7, p 957-969, 2010; ISSN: 17415977, E-ISSN: 17415985; DOI: 10.1080/17415977.2010.492517; Publisher: Taylor and Francis Ltd. Author affiliation: 1 College of Science, Guangdong Ocean University, Zhanjiang, 524088, China 2 School of Mathematics and Statistics, Zhejiang University of Finance and Economics, Hangzhou, 310018, China 3 School of Mathematical Sciences, Fudan University, Shanghai, 200433, China Abstract: In this article we consider the numerical differentiation of periodic functions specified by noisy data. A new method, which is based on the truncated singular value decomposition (TSVD) regularization technique of a suitable compact operator, is presented and analysed. It turns out the new method coincides with some type of truncated Fourier series approach. Numerical examples are also given to show the efficiency of the method. © 2010 Taylor & Francis. (14 refs.) Main Heading: Differentiation (calculus) Controlled terms: Dynamic loads - Fourier analysis - Fourier series - Harmonic analysis - Problem solving - Singular value decomposition Uncontrolled terms: Ill posed problem - Numerical differentiation methods - Truncated Fourier series - TSVD method Classification Code: Database: Compendex 408.1 Structural Design, General - 921 Mathematics - Regularization Analysis of baldder tumor recurrence data with the ternimal event and cure fraction Xiao, Cuiliu1; Bing, Yang1; Zhao, Xiaobing2 Source: 2010 4th International Conference on Bioinformatics and Biomedical Engineering, iCBBE 2010, 2010, 2010 4th International Conference on Bioinformatics and Biomedical Engineering, iCBBE 2010; ISBN-13: 9781424447138; DOI: 10.1109/ICBBE.2010.5517919; Article number: 5517919; Conference: 4th International Conference on Bioinformatics and Biomedical Engineering, iCBBE 2010, June 18, 2010 - June 20, 2010; Sponsor: IEEE Engineering in Medicine and Biology Society; Sichuan University; Wuhan University; Publisher: IEEE Computer Society Author affiliation: 1 School of Science, Jiangnan University, 1800 Lihu Road, Wuxi, Jiangsu Province, 214122, China 2 School of Mathematics and Statistics, Zhejiang University of Finance and Economics, Hangzhou, China Abstract: Complete observation of the recurrent events may not be available, since some subjects might drop out or fail before the endpoint of observation. However, the assumption of independency of the recurrent events and the censoring is not realistic in many situations. In this paper, we develop an innovative model based on the Clayton-Oakes copula function to fit the correlation of these variables. The joint survival function of the recurrent event times can be obtained through the marginal hazard functions with copula parameters which measure the degree of dependence and control the association between these variables. The cure fraction can be concluded into the proposed model as well. An example of application on bladder tumor recurrence data is re-analyzed to assess the proposed models and methodologies. © 2010 IEEE. (15 refs.) Main Heading: Bioinformatics Controlled terms: Curing - Tumors Uncontrolled terms: Bladder tumor - Clayton - Copula functions - Drop-out - Hazard function - Innovative models - Joint survival functions - Recurrent events Classification Code: 461.2 Biological Materials - 903 Information Science Database: Compendex Materials and Tissue Engineering - 815.1 Polymeric Interval-censored data analysis of gaps between recurrent events with cure fraction Yang, Bing1; Xiao, Cuiliu1; Zhao, Xiaobing2 Source: 2010 4th International Conference on Bioinformatics and Biomedical Engineering, iCBBE 2010, 2010, 2010 4th International Conference on Bioinformatics and Biomedical Engineering, iCBBE 2010; ISBN-13: 9781424447138; DOI: 10.1109/ICBBE.2010.5518094; Article number: 5518094; Conference: 4th International Conference on Bioinformatics and Biomedical Engineering, iCBBE 2010, June 18, 2010 - June 20, 2010; Sponsor: IEEE Engineering in Medicine and Biology Society; Sichuan University; Wuhan University; Publisher: IEEE Computer Society Author affiliation: 1 School of Science, Jiangnan University, 1800 Lihu Road, Wuxi, Jiangsu Province, 214122, China 2 School of Mathematics and Statistics, Zhejiang University of Finance and Economics, Hangzhou, China Abstract: Interval-censored data of gaps between recurrent events arise as the exact gaps can not be available but only know, such as whether the event time of interest is no later than the examination time. The recurrent event times subject to this interval censoring are often encountered in epidemiological studies and clinical trials. In this paper we propose a gaps model which is a derivative of the marginal rate function of the recurrent events processes. This model can accommodate the cure fraction as well. The proposed model can be easily extended to the general case, however, for an easy representation, parametric model is assumed in this paper. As an example of application, the bladder tumor recurrent event data are reanalyzed by using the proposed model. ©2010 IEEE. (18 refs.) Main Heading: Bioinformatics Controlled terms: Curing - Data reduction Uncontrolled terms: Bladder tumor - Censored data - Clinical trial - Epidemiological studies - Interval censoring - Marginal rates - Parametric models - Recurrent events Classification Code: Information Science Database: Compendex 723.2 Data Processing and Image Processing - 815.1 Polymeric Materials - 903 On the culture integration and innovation of Chinese multi-campus universities Hong, Wu1, 2 Source: ICETC 2010 - 2010 2nd International Conference on Education Technology and Computer, v 2, p V2537-V2540, 2010, ICETC 2010 - 2010 2nd International Conference on Education Technology and Computer; ISBN-13: 9781424463688; DOI: 10.1109/ICETC.2010.5529326; Article number: 5529326; Conference: 2010 2nd International Conference on Education Technology and Computer, ICETC 2010, June 22, 2010 - June 24, 2010; Sponsor: Int. Assoc. Comput. Sci. Inf. Technol. (IACSIT); Publisher: IEEE Computer Society Author affiliation: 1 Economic Development Research Center, Wuhan University, Wu Han, China 2 Zhejiang University of Finance and Economics, Hang Zhou, China Abstract: The multi-campus culture construction is a process of absorption and abandonment. The old campus culture is the foundation of the new one and the new one is the succession and development of the old one. The campus culture construction is a long-term, difficult task, which can not be completed in a short time. It is necessary to be ready for a long effort and mobile the enthusiasm of all teachers, staff, students, make full use of the advantages of the new campus, add new contents to the existing campus culture to create harmonious, consistent, first-class campus culture of the multi-campus university. © 2010 IEEE. (5 refs.) Main Heading: Education Controlled terms: Competition - Social sciences Uncontrolled terms: Campus culture - College competitiveness - Multi-campus university Classification Code: Database: Compendex 901.2 Education - 911.2 Industrial Economics The p-maxian problem on block graphs Kang, Liying1; Cheng, Yukun1, 2 Source: Journal of Combinatorial Optimization, v 20, n 2, p 131-141, August 2010; ISSN: 13826905, E-ISSN: 15732886; DOI: 10.1007/s10878-008-9198-1; Publisher: Springer Netherlands Author affiliation: 1 Department of Mathematics, Shanghai University, Shanghai 200444, China 2 School of Mathematics and Statistics, Zhejiang University of Finance and Economics, Hangzhou 310018, China Abstract: This paper deals with the p-maxian problem on block graphs with unit edge length. It is shown that the two points with maximum distance provide an optimal solution for the 2-maxian problem of block graphs except for K3. It can easily be extended to the p-maxian problem of block graphs. So we solve the p-maxian problem on block graphs in linear time. © Springer Science+Business Media, LLC 2008. (11 refs.) Main Heading: Graphic methods Uncontrolled terms: Block graphs - Edge length - Linear time - Location theory distance - Obnoxious facilities - Optimal solutions - P-maxian problem - Two-point Classification Code: Database: Compendex 902.1 Engineering Graphics - Maximum Improved-grey Verhulst model and its application Dai, Wenzhan1; Xiong, Wei1; Yang, Aiping2 Source: Huagong Xuebao/CIESC Journal, v 61, n 8, p 2097-2100, August 2010; Language: Chinese; ISSN: 04381157; Publisher: Chemical Industry Press Author affiliation: 1 Institute of Automatic Control, Zhejiang Sci-Tech University, Hangzhou 310018, Zhejiang, China 2 Zhejiang University of Finance and Economics, Hangzhou 310018, Zhejiang, China Abstract: The accuracy of grey Verhulst model greatly depends on background value and model structure parameter. In this paper, an improved-grey Verhulst model is proposed. Firstly, the cause of grey Verhulst model's inaccuracy is analyzed. Secondly, the background value is rebuilt by using original data sequence. Thirdly, model structure parameter is obtained by optimization based on the principle about information overlap of grey system. Finally, the improved-grey Verhulst modeling is applied for building the model of national production of crude oil and results show its effectiveness. © All Rights Reserved. (15 refs.) Main Heading: Crude oil Uncontrolled terms: Background value - Data sequences - Forecast Verhulst - Grey Verhulst model - Information overlap - Structure parameter Classification Code: Database: Compendex 523 Liquid Fuels - Grey systems - Grey Sunny-shady slope effect on the thermal and deformation stability of the highway embankment in warm permafrost regions Chou, Yaling1; Sheng, Yu2; Li, Yuwen3; Wei, Zhenming4; Zhu, Yanpeng1; Li, Jinping5 Source: Cold Regions Science and Technology, v 63, n 1-2, p 78-86, August 2010; ISSN: 0165232X; DOI: 10.1016/j.coldregions.2010.05.001; Publisher: Elsevier Author affiliation: 1 School of Civil Engineering, Lanzhou University of Technology, Lanzhou 730000, China 2 State key Laboratory of Frozen Soil Engineering, Cold and Arid Regions Environmental and Engineering Research Institute, Chinese Academy of Sciences, Lanzhou 730000, China 3 School of Business Administration, Zhejiang University of Finance and Economics, Hangzhou 310018, China 4 Gansu Non-Ferrous Metal Geological Exploration Bureau, Lanzhou 730000, China 5 CCCC First Highway Consultants Co., LTD Xi'an Shaan Xi 710068, China Abstract: The aim of this study was to investigate how the sunny-shady slope impacts on the thermal and deformation stability of the highway embankment in warm permafrost region. The investigation was done by analyzing both the observational geo-temperature and deformation data of the embankment in the experimental section K369+100 along the National Highway 214 on Qinghai-Tibet Plateau. Also, the fundamental cause of the embankment transverse asymmetrical thermal regime and asymmetrical deformation was discussed. The observation data indicates (1) for embankment in warm permafrost regions, the deformation stability is highly correlated with the thermal stability, and the embankment transverse deformation is mainly controlled by the ground temperature and its change; (2) the absorbed solar radiation difference between sunny and shady slopes results in the embankment's transverse thermal difference, which leads to asymmetrical deformation; and (3) the time of the highest settlement deformation does not coincide with that of the maximum thaw depth, which means that the development of the embankment deformation lags behind the development of embankment temperature. For the embankment with differential deformation in transverse section, the times of the highest settlement deformation on two sides of embankment are different. This difference lies in that the time of the highest settlement deformation on the sunny side is later than that on the shady side of the embankment. The differential deformation will be magnified over time, and finally the embankment stability is engulfed by the longitudinal cracks caused by asymmetric settlement of permafrost. © 2010 Elsevier B.V. (19 refs.) Main Heading: Permafrost Controlled terms: Deformation - Embankments - Highway engineering - Hydraulic structures - Slope stability - Soil mechanics - Soils - Solar radiation - Sun - Temperature Uncontrolled soils - terms: Deformation Embankment stability stability - Differential - Experimental deformation - Embankment section - Ground temperature - Highly-correlated - Highway embankments - Longitudinal cracks - Maximum thaw depth - Observation data - Qinghai Tibet plateau - Settlement deformation - Sunny-shady slope - Temperature field - Thermal differences - Thermal regimes - Thermal stability - Transverse deformation - Transverse section - Warm permafrost Classification Code: 483 Soil Mechanics and Foundations - 483.1 Soils and Soil Mechanics - 483.2 Foundations - 611 Hydroelectric and Tidal Power Plants - 641.1 Thermodynamics - 657.1 Solar Energy and Phenomena - 657.2 Extraterrestrial Physics and Stellar Phenomena - 446.2 Related Hydraulic Structures - 405 Construction Equipment and Methods; Surveying - 406 Highway Engineering - 406.2 Roads and Streets - 407.2 Waterways - 421 Strength of Building Materials; Mechanical Properties - 422 Strength of Building Materials; Test Equipment and Methods Development Database: Compendex - 441 Dams and Reservoirs; Hydro Grey modeling based on cot (xα) transformation and background value optimization Dai, Wen-Zhan1; Xiong, Wei1; Yang, Ai-Ping2 Source: Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), v 44, n 7, p 1368-1372, July 2010; Language: Chinese; ISSN: 1008973X; DOI: 10.3785/j.issn.1008-973X.2010.07.024; Publisher: Zhejiang University Press Author affiliation: 1 Department of Automatic Control, Zhejiang Sci.-Tech. University, Hangzhou 310018, China 2 School of Foreign Language, Zhejiang University of Finance and Economics, Hangzhou 310018, China Abstract: The precision of grey model greatly depends on the smooth degree of discrete-time sequence, and the need of stepwise ratio of discrete sequence must be met. A method of grey modeling based on cot (xα)(α > 0) transformation and its background value optimization was proposed in case that original discrete-time sequence can not meet the condition for grey modeling. The discrete-time sequence F(k)=f(x(k)) transformed by f(x)=cot (xα) can meet the requirements of grey modeling under the condition of 0.2125 &le f(x) &le π/2, and the smooth degree of F(k) was greatly improved compared with other transformation functions. Then the background value was rebuilt based on the monotonic rise of accumulated generating sequence. The sum of the rectangle area and the trapezium area was used to realize that the negative error was balanced off by the positive error. The rebuilt background value was more close to the practical value, and the model accuracy was improved. Finally, the step of grey modeling was given, and the application results showed that it is effective. (10 refs.) Main Heading: Models Controlled terms: Optimization Uncontrolled terms: Background value - Discrete data - Discrete-time sequences Model - Model accuracy - Rectangle areas - Smooth degree - Transformation functions - Grey Classification Code: Techniques 902.1 Engineering Graphics - 921.5 Optimization Database: Compendex A new method of training sample selection in text classification Liao, Yixing1, 2; Pan, Xuezeng1 Source: 2nd International Workshop on Education Technology and Computer Science, ETCS 2010, v 1, p 211-214, 2010, 2nd International Workshop on Education Technology and Computer Science, ETCS 2010; ISBN-13: 9780769539874; DOI: 10.1109/ETCS.2010.621; Article number: 5458972; Conference: 2nd International Workshop on Education Technology and Computer Science, ETCS 2010, March 6, 2010 - March 7, 2010; Sponsor: Huazhong Normal University; Huazhong University of Science and Technology; Research Association of Modern Education and Computer Science; Columbia University; Wuhan University; Publisher: IEEE Computer Society Author affiliation: 1 Department of Computer Science and Technology, Zhejiang University, Hangzhou, China 2 Department of Information, Zhejiang University of Finance and Economics, Hangzhou, China Abstract: Aiming to noise samples in the training dataset, a new method for reducing the amount of training dataset is proposed in the paper which is applicable to text classification. This method describes the distribution of training dataset according to the representativeness score of samples in the class they belong to, so as to show representative samples and noise samples in each class. The new method is applied on Chinese text dataset provided by Fudan Database Center. The experiments show that the proposed method can reduce noise samples effectively, improve the performance of classification and decrease the computational cost. © 2010 IEEE. (11 refs.) Main Heading: Classification (of information) Controlled terms: Computational methods - Computer science - Cost reduction - Education computing - Engineering education - Text processing Uncontrolled terms: Chinese text - Computational costs - Data sets - Representative sample - Text classification - Training dataset - Training sample selection Classification Code: 921 Mathematics - 912.2 Management - 911.2 Industrial Economics - 903.3 Information Retrieval and Use - 903.1 Information Sources and Analysis - 901.2 Education - 723.5 Computer Applications - 723.2 Data Processing and Image Processing - 723 Computer Software, Data Handling and Applications - 722 Computer Systems and Equipment - 721.1 Computer Theory, Includes Formal Logic, Automata Theory, Switching Theory, Programming Theory - 721 Computer Circuits and Logic Elements - 716.1 Information Theory and Signal Processing Database: Compendex Image quality assessment based on the contourlet transform Li, Junfeng1; Dai, Wenzhan1; Wang, Huijiao1; Yang, Aiping2 Source: CAR 2010 - 2010 2nd International Asia Conference on Informatics in Control, Automation and Robotics, v 1, p 13-16, 2010, CAR 2010 - 2010 2nd International Asia Conference on Informatics in Control, Automation and Robotics; ISBN-13: 9781424451937; DOI: 10.1109/CAR.2010.5456888; Article number: 5456888; Conference: 2010 2nd International Asia Conference on Informatics in Control, Automation and Robotics, CAR 2010, March 6, 2010 - March 7, 2010; Sponsor: Hubei University of Education; Huazhong Normal University; Wuhan University; Huazhong Univ. Sci. Technol., China Intelligent Inf.; Technology Application Research Association; Publisher: IEEE Computer Society Author affiliation: 1 Department of Automatic Control, Zhejiang Sci-Tech University, HangZhou, China 2 Foreign Languages School, Zhejiang University of Finance and Economics, HangZhou, China Abstract: Contourlet transform has excellent properties for image representation, such as multiresolution, localization and directionality, which are the key characteristics of human vision system. In this paper, a novel image quality assessment metric based on the characteristics of contourlet coefficients of images is proposed. Firstly, the original image and the distorted images are decomposed into several levels by means of contourlet transform respectively. The contourlet coefficients of the original image and the distorted images are as the referenced matrixes and the comparative matrixes respectively. Secondly, calculate the correlativity indexes between the referenced matrixes and the comparative matrixes respectively. Moreover, image quality assessment vector of every distorted image can be constructed based on the correlativity indexes values and image quality can be assessed. Performance experiments are made on image quality database with four different distortion types. Experimental results show that the proposed method improves accuracy and robustness of image quality prediction. ©2010 IEEE. (13 refs.) Main Heading: Image quality Controlled terms: Fuzzy logic - Information science - Robotics Uncontrolled terms: Contourlet coefficients - Contourlet transform - Distorted images - Fuzzy similarity - Human vision systems - Image quality assessment - Image representations - Included angle cosine - Key characteristics - matrix - Multi-resolutions - Original images - Performance experiment Classification Code: 721.1 Computer Theory, Includes Formal Logic, Automata Theory, Switching Theory, Programming Theory - 731.5 Robotics - 741 Light, Optics and Optical Devices - 903 Information Science Database: Compendex The improvement of PHP algorithm for association rules Yang, Huansong1; Qin, Suntao2 Source: CAR 2010 - 2010 2nd International Asia Conference on Informatics in Control, Automation and Robotics, v 3, p 404-407, 2010, CAR 2010 - 2010 2nd International Asia Conference on Informatics in Control, Automation and Robotics; ISBN-13: 9781424451937; DOI: 10.1109/CAR.2010.5456721; Article number: 5456721; Conference: 2010 2nd International Asia Conference on Informatics in Control, Automation and Robotics, CAR 2010, March 6, 2010 - March 7, 2010; Sponsor: Hubei University of Education; Huazhong Normal University; Wuhan University; Huazhong Univ. Sci. Technol., China Intelligent Inf.; Technology Application Research Association; Publisher: IEEE Computer Society Author affiliation: 1 Hangzhou Institute of Service Engineering, Hangzhou Normal University, Hangzhou, Zhejiang, China 2 Information School, Zhejiang University of Finance and Economics, Hangzhou , Zhejiang, China Abstract: The first step of detecting relating rule is a process at the cost of much system resource, so the total performance of detecting relating rule is determined by this step. The main goal of existing algorithms at present is focused on the efficiency of this step. DHP and PHP are included in those algorithms and these two algorithms are the transmutations of Apriori algorithm to improve its validity. PHP is developed based on DHP and it saves the CPU running time of DHP effectively. It is useful in improving the efficiency of detecting relating rule in commercial database by developing PHP algorithms to reduce the CPU calculating time. ©2010 IEEE. (8 refs.) Main Heading: Algorithms Controlled terms: Associative processing - Information science - Robotics Uncontrolled terms: Apriori algorithms - Calculating time - Data digging - Running time - System resources - Total performance Classification Code: 723 Computer Software, Data Handling and Applications - 723.2 Data Processing and Image Processing - 731.5 Robotics - 903 Information Science - 921 Mathematics Database: Compendex Construction of process-oriented industrial design knowledge map Liu, Zheng1; Sun, Lingyun1; Lu, Na2 Source: Jixie Gongcheng Xuebao/Journal of Mechanical Engineering, v 46, n 8, p 181-187, April 20, 2010; Language: Chinese; ISSN: 05776686; DOI: 10.3901/JME.2010.08.181; Publisher: Editorial Office of Chinese Journal of Mechanical Author affiliation: 1 Modern Industrial Design Institution, Zhejiang University, Hangzhou 310027, China 2 Collage of Arts, Zhejiang University of Finance and Economics, Hangzhou 310028, China Abstract: The method of building knowledge map for industrial design process is proposed to organize the industrial design knowledge, which can add innovations of product concept design. By the investigation on the industrial design process, the design process descriptive model with different abstract granularity levels is established, which forms the frame of knowledge map. Based on the concepts system of knowledge node, the structure of input and output are defined. The design knowledge can be acquired, saved and reused in the uniform by the operation of combination, decomposition, derivation, insertion and trim. On the one hand, knowledge can be organized by knowledge map with the operation procedure, which can reduce the chaos of knowledge complexity, distraction and obscurity, and help to make the design decisions and ideas. On the other hand, visible knowledge map can be adapted to some kinds of design projects, and integrated with the design knowledge scenario information of condition, object, procedure, cause and effect, which can reduce the blindness of design activities with single knowledge area. An application case is introduced to prove the method. © 2010 Journal of Mechanical Engineering. (19 refs.) Main Heading: Structural design Controlled terms: Industry - Product design Uncontrolled terms: Descriptive Model - Design activity - Design decisions - Design knowledge - Design process - Design projects - Granularity levels - Industrial design - Input and outputs - Knowledge areas - Knowledge map - Knowledge nodes - Operation procedure - Process-oriented - Product concept design Classification Code: 408.1 Structural Design, General - 911 Cost and Value Engineering; Industrial Economics - 912 Industrial Engineering and Management Manufacturing - 913.1 Production Engineering Database: Compendex - 913 Production Planning and Control; Semidefinite relaxation bounds for bi-quadratic optimization problems with quadratic constraints Zhang, Xinzhen1; Ling, Chen2, 3; Qi, Liqun1 Source: Journal of Global Optimization, p 1-19, 2010; ISSN: 09255001, E-ISSN: 15732916; DOI: 10.1007/s10898-010-9545-5 Author affiliation: 1 Department of Applied Mathematics, The Hong Kong Polytechnic University, Hung Hom, Kowloon, Hong Kong 2 School of Science, Hangzhou Dianzi University, Hangzhou, 310018, China 3 School of Mathematics and Statistics, Zhejiang University of Finance and Economics, Hangzhou, China Abstract: This paper studies the relationship between the so-called bi-quadratic optimization problem and its semidefinite programming (SDP) relaxation. It is shown that each r-bound approximation solution of the relaxed bi-linear SDP can be used to generate in randomized polynomial time an {Mathematical expression}-approximation solution of the original bi-quadratic optimization problem, where the constant in {Mathematical expression} does not involve the dimension of variables and the data of problems. For special cases of maximization model, we provide an approximation algorithm for the considered problems. © 2010 Springer Science+Business Media, LLC. (33 refs.) Main Heading: Polynomial approximation Controlled terms: Approximation algorithms - Mathematical programming Uncontrolled terms: Approximation solution - Mathematical expressions - Polynomial-time - Quadratic constraint - Quadratic optimization problems - Semi-definite programming - Semidefinite relaxation Classification Code: Database: Compendex 921 Mathematics - 921.6 Numerical Methods - 922 Statistical Methods A preemptive-resume stochastic scheduling model with disruption Tang, Heng-Yong1; Tang, Chun-Hui2; Zhao, Chuan-Li1 Source: Xitong Gongcheng Lilun yu Shijian/System Engineering Theory and Practice, v 30, n 4, p 751-757, April 2010; Language: Chinese; ISSN: 10006788; Publisher: Systems Engineering Society of China Author affiliation: 1 College of Mathematics and Systems Science, Shenyang Normal University, Shenyang 110034, China 2 Business Administration College, Zhejiang University of Finance and Economics, Hangzhou 310018, China Abstract: We gave a preemptive-resume stochastic scheduling model with disruption, in witch the starting time and the duration of the disruption are both stochastic. Minimized objective functions are the sum of the expected weighted completion times, the sum of the expected weighted tardiness and the expected weighted number of the tardy jobs. For the problem minimizing the sum of the expected weighted completion times we showed that under an agreeable condition the problem can be polynomially solved, if the starting time of disruption is uniformly distributed, the WSPT rule is an optimal static policy for the problem. A dynamic programminalgorithm is given for a special case in witch the starting time of the disruption is deterministic. or the problem minimizing the sum of the expected weighted tardiness and the expected weighted number of the tardy jobs we proved that under an agreeable condition the problem can be polynomially solved. (16 refs.) Main Heading: Stochastic models Controlled terms: Optimization - Scheduling - Stochastic systems Uncontrolled terms: Objective functions - Stochastic scheduling - Tardy jobs - Weighted completion - Weighted number - Weighted tardiness Classification Code: 731.1 Control Systems - 912.2 Techniques - 922.1 Probability Theory - 961 Systems Science Database: Compendex Management - 921.5 Optimization The pos/neg-weighted 1-median problem on tree graphs with subtree-shaped customers Cheng, Yukun1, 2; Kang, Liying1; Lu, Changhong3 Source: Theoretical Computer Science, v 411, n 7-9, p 1038-1044, February 28, 2010; ISSN: 03043975; DOI: 10.1016/j.tcs.2009.11.009; Publisher: Elsevier Author affiliation: 1 Department of Mathematics, Shanghai University, Shanghai, 200444, China 2 School of Mathematics and Statistics, Zhejiang University of Finance and Economics, Hangzhou, 310018, China 3 Department of Mathematics, East China Normal University, Shanghai, 200241, China Abstract: In this paper we consider the pos/neg-weighted median problem on a tree graph where the customers are modeled as continua subtrees. We address the discrete and continuous models, i.e., the subtrees' boundary points are all vertices, or possibly inner points of an edge, respectively. We consider two different objective functions. If we minimize the overall sum of the minimum weighted distances of the subtrees from the facilities, there exists an optimal solution satisfying a generalized vertex optimality property, e.g., there is an optimal solution such that all facilities are located at vertices or the boundary points of the subtrees. Based on this property we devise a polynomial time algorithm for the pos/neg-weighted 1-median problem on a tree with subtree-shaped customers. © 2009 Elsevier B.V. All rights reserved. (13 refs.) Main Heading: Customer satisfaction Controlled terms: Optimal systems - Polynomial approximation - Sales Uncontrolled vertex solutions - terms: 1-Median Location theory Optimality - - Boundary points - Median problem Polynomial-time algorithms - Continuous - - Objective Subtrees - models - Generalized functions - Optimal Tree graph - Weighted distance - Weighted median Classification Code: 731.1 Control Systems - 911.4 Marketing - 912 Industrial Engineering and Management - 921.5 Optimization Techniques - 921.6 Numerical Methods - 961 Systems Science Database: Compendex Nonlinear VaR model of FX options portfolio based on multivariate Laplace distributions Chen, Rong-Da1, 2; Wang, Chun-Fa2 Source: Xitong Gongcheng Lilun yu Shijian/System Engineering Theory and Practice, v 30, n 2, p 315-323, February 2010; Language: Chinese; ISSN: 10006788; Publisher: Systems Engineering Society of China Author affiliation: 1 School of Management, Zhejiang University, Hangzhou 310058, China 2 School of Finance, Zhejiang University of Finance and Economics, Hangzhou 310018, China Abstract: To overcome the difficulty in non-linear VaR calculation under heavy-tailed exchange rate returns, the paper depicts heavy-tailed exchange rate returns using multivariate Laplace distribution, and settles the moment generating function that reflects the change in FX option portfolio value using the hazard function transformation technique and the result of approximate calculation about multidimension Laplace type integral. Moreover, the paper proposes that importance samping technique is developed up to non-linear VaR model of FX option portfolio when exchange rate returns have multivariate Laplace distribution. This makes the state not be rare event simulation. Accordingly, this decreases calculating effort in Monte Carlo simulation. Moreover, the loss probability of portfolio is estimated precisely. The simulation result shows the algorithm has more much effectiveness of computational efficiency than the standard Monte Carlo simulation, and can lead to large variance reductions when estimating the loss (13 refs.) probability of portfolio. Main Heading: Monte Carlo methods Controlled terms: Computational efficiency - Computer simulation - Cosmic ray detectors - Function evaluation - Laplace transforms - Linear transformations - Value engineering Uncontrolled terms: Approximate calculations - Exchange rates - Hazard function - Heavy-tailed - Laplace distributions - Laplace-type integrals - Loss probability - Moment generating function - Monte Carlo Simulation - Multidimension - Non-linear - Portfolio value - Rare event simulation - Simulation result - Variance reductions Classification Code: Numerical Methods 944.7 Radiation Measuring Instruments - 922.2 Mathematical Statistics - 921.6 - 921.3 Mathematical Transformations - 921 Mathematics - 911.5 Value Engineering - 723.5 Computer Applications - 723.1 Computer Programming - 657 Space Physics Database: Compendex A text classification model based on training sample selection and feature weight adjustement Pang, Xuezeng1; Liao, Yixing1, 2 Source: Proceedings - 2nd IEEE International Conference on Advanced Computer Control, ICACC 2010, v 3, p 294-297, 2010, Proceedings - 2nd IEEE International Conference on Advanced Computer Control, ICACC 2010; ISBN-13: 9781424458462; DOI: 10.1109/ICACC.2010.5486615; Article number: 5486615; Conference: 2010 IEEE International Conference on Advanced Computer Control, ICACC 2010, March 27, 2010 - March 29, 2010; Sponsor: Int. Assoc. Comput. Sci. Inf. Technol. (IACSIT); Institute of Electrical and Electronics Engineers (IEEE); Publisher: IEEE Computer Society Author affiliation: 1 Department of Computer Science and Technology, Zhejiang University, Hangzhou, China 2 Department of Information, Zhejiang University of Finance and Economics, Hangzhou, China Abstract: A new text classification model based on training samples selection and feature weight adjustment is presented. First it computes representativeness score of samples so as to distinguish noise samples from original training samples. Then a feature weight adjustment taking inter-class distribution and intra-class distribution into consideration is used to further improve the performance of text classification. The presented text classification model is applied on Chinese text dataset provided by Fudan Database Center. The experiments show that the proposed model can improve the performance of text classification to some extent with fewer training samples and fewer feature dimensions. © 2010 IEEE. (13 refs.) Main Heading: Text processing Controlled terms: Classification (of information) - Feature extraction Uncontrolled terms: Chinese text - Class distributions - Data sets - Feature dimensions - Feature weight - Representativeness score - Text classification models - Textclassification - Training dataset - Training sample - Training sample selection Classification Code: 716 Telecommunication; Radar, Radio and Television - 716.1 Information Theory and Signal Processing - 723.5 Computer Applications Database: Compendex SWMRD: A Semantic Web-based manufacturing resource discovery system for cross-enterprise collaboration Cai, M.1; Zhang, W.Y.2; Chen, G.1; Zhang, K.1; Li, S.T.1 Source: International Journal of Production Research, v 48, n 12, p 3445-3460, January 2010; ISSN: 00207543, E-ISSN: 1366588X; DOI: 10.1080/00207540902814330; Publisher: Taylor and Francis Ltd. Author affiliation: 1 School of Computer Science, Zhejiang University, Hangzhou 310027, China 2 School of Information, Zhejiang University of Finance and Economics, Hangzhou 310018, China Abstract: As supply chains are becoming ever more global and agile in the modern manufacturing era, enterprises are increasingly dependent upon the efficient and effective discovery of shared manufacturing resources provided by their partners, wherever they are. Enterprises are thus faced with increasing challenges caused by the technical difficulties and ontological issues in manufacturing interoperability and integration over heterogeneous computing platforms. This paper presents a prototype intelligent system SWMRD (Semantic Web-based manufacturing resource discovery) for distributed manufacturing collaboration across ubiquitous virtual enterprises. Ontology-based annotation to the distributed manufacturing resources via a new, multidisciplinary manufacturing ontology is proposed on the semantic web to convert resources into machine understandable knowledge, which is a prelude to the meaningful resource discovery for cross-enterprise multidisciplinary collaboration. An ontology-based multi-level knowledge retrieval model is devised to extend the traditional information retrieval approaches based on keyword search, with integrated capabilities of graph search, semantic search, fuzzy search and automated reasoning to realise the intelligent discovery of manufacturing resources, e.g. to facilitate more flexible, meaningful, accurate and automated resource discovery. A case study for intelligent discovery of manufacturing resources is used to demonstrate the practicality of the developed system. © 2010 Taylor & Francis. (17 refs.) Main Heading: Semantic Web Controlled systems terms: Automata - Interoperability - theory Natural - Flexible manufacturing language processing systems - systems Ontology - - Intelligent Semantics - Supply chains - Virtual corporation Uncontrolled terms: Automated reasoning search retrieval - Heterogeneous - computing Manufacturing ontology - - Distributed manufacturing Information - retrieval Manufacturing - Enterprise collaboration approach resource - Keyword search Multi-level - - - Graph Knowledge Multidisciplinary collaboration - Ontology-based - Ontology-based annotation - Resource discovery - Resource sharing - Semantic search - Technical difficulties - Virtual enterprise Classification Code: 913.4.1 Flexible Manufacturing Systems - 903 Information Science - 903.2 Information Dissemination - 911.3 Inventory Control - 912 Industrial Engineering and Management - 912.2 Management - 913 Production Planning and Control; Manufacturing - 723.4 Artificial Intelligence - 723 Computer Software, Data Handling and Applications - 721.1 Computer Theory, Includes Formal Logic, Automata Theory, Switching Theory, Programming Theory - 718 Telephone Systems and Related Technologies; Line Communications - 717 Optical Communication - 716 Telecommunication; Radar, Radio and Television - 723.2 Data Processing and Image Processing Database: Compendex Weaving an agent-based Semantic Grid for distributed collaborative manufacturing Yin, J.W.1; Zhang, W.Y.2; Cai, M.1 Source: International Journal of Production Research, v 48, n 7, p 2109-2126, January 2010; ISSN: 00207543, E-ISSN: 1366588X; DOI: 10.1080/00207540802582870; Publisher: Taylor and Francis Ltd. Author affiliation: 1 School of Computer Science, Zhejiang University, Hangzhou, China 2 School of Information, Zhejiang University of Finance and Economics, Hangzhou, China Abstract: The development and maintenance of distributed collaborative manufacturing systems is faced with increasing challenges caused by the technical difficulties and ontological issues in distributed computing, resource integration and knowledge sharing over heterogeneous computing platforms. This paper presents an agent-based Semantic Grid for distributed manufacturing collaboration across ubiquitous virtual enterprises. A hierarchy of autonomous, adaptive agents forming a 'super peer' based peer-to-peer network is laid out in the Semantic Grid to provide, in an open, dynamic, loosely coupled and scalable manner, the service publication, discovery and reuse for management of applications that need to utilise Grid resources. The operation and experimental evaluation of the system are presented to (29 refs.) validate the implementation of the proposed approach. © 2010 Taylor & Francis. Main Heading: Peer to peer networks Controlled terms: Autonomous agents - Computer aided manufacturing - Distributed computer systems - Knowledge acquisition - Ontology - Semantics - Virtual corporation Uncontrolled terms: Adaptive agents - Agent based - Collaborative manufacturing - Collaborative manufacturing system evaluation Grid - - Distributed resource - Computing Heterogeneous - Distributed computing - manufacturing - Knowledge-sharing Experimental - Resource integration - Semantic Grid - Service publication - Super-peer - Technical difficulties - Virtual enterprise Classification Code: Science - 731.5 912.2 Management Robotics - 913.4.2 - 903.2 Information Dissemination Computer Aided Manufacturing - 903 Information 723.5 Computer Applications - 723 Computer Software, Data Handling and Applications - 722.4 Digital Computers and Systems - 722 Computer Systems and Equipment - 723.4 Artificial Intelligence Database: Compendex The p-maxian problem on interval graphs Cheng, Yukun1, 2; Kang, Liying1 Source: Discrete Applied Mathematics, v 158, n 18, p 1986-1993, 2010; ISSN: 0166218X; DOI: 10.1016/j.dam.2010.08.021; Publisher: Elsevier Author affiliation: 1 Department of Mathematics, Shanghai University, Shanghai 200444, China 2 School of Mathematics and Statistics, Zhejiang University of Finance and Economics, Hangzhou 310018, China Abstract: This paper deals with the p-maxian problem on interval graphs where each interval has a positive weight. First we propose a linear time algorithm which is similar to the algorithm of Bespamyatnikh for the unweighted 1-median problem on interval graphs to solve the weighted 1-maxian problem. For a 2-maxian problem, we show that two intervals with the minimum right endpoint and the maximum left endpoint, respectively, are an optimal solution. It can be easily extended to the p-maxian problem (p<3). © 2010 Elsevier B.V. All rights reserved. Uncontrolled terms: 1-Median - Interval graph (19 refs.) - Linear-time theory - Obnoxious facilities - Optimal solutions - p-maxian problem Database: Compendex algorithms - Location A multi-watermarking method for 3D meshes Feng, Xiaoqing1, 2; Pan, Zhigeng1; Li, Li3 Source: Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of Computer-Aided Design and Computer Graphics, v 22, n 1, p 17-23+29, January 2010; Language: Chinese; ISSN: 10039775; Publisher: Institute of Computing Technology Author affiliation: 1 State Key Laboratory of CAD and CG, Zhejiang University, Hangzhou 310058, China 2 Institute of Computer Application Techniques, College of Information, Zhejiang University of Finance and Economics, Hangzhou 310018, China 3 Hangzhou Institute of Electronic Engineering, Hangzhou 310018, China Abstract: Since single blind watermarking scheme is difficult to resist against various attacks, a robust multi-watermarking is proposed based on 3D mesh model in this paper. In this scheme, two kinds of watermarks are embedded respectively into vertexes coordinates and topological information of 3D mesh, which enables the model to resist against not only large scaled cropping operation but also high strong noising. During the extraction of the watermark, the original model is not necessary. Experimental results show that the multi-watermark method can effectively increase the ability of resisting attacks, such as translation, rotating, scaling, un-scaling, cutting, noising, re-ordering etc. (21 refs.) Main Heading: Three dimensional Controlled terms: Coordinate measuring machines - Watermarking Uncontrolled terms: 3-D mesh models - 3D meshes - Blind watermarking scheme - Original model - Polar coordinate systems - Topological information - Various attacks Classification Code: 723.5 Computer Applications - Engineering Graphics - 943.3 Special Purpose Instruments Database: Compendex 811.1.1 Papermaking Processes - 902.1