经检索, 2010年以浙江财经学院为作者单位发表论文被EI收录51篇

经检索, 2010 年以浙江财经学院为作者单位发表论文被 EI 收
录 51 篇
具体论文如下:
A novel model for dynamic multi-attributes group decision-making based
on vague set and its TOPSIS solution
Yang, Aiping1 Source: Proceedings of the 29th Chinese Control Conference, CCC'10, p 5539-5543, 2010,
Proceedings of the 29th Chinese Control Conference, CCC'10; ISBN-13: 9787894631046; Article number:
5573390; Conference: 29th Chinese Control Conference, CCC'10, July 29, 2010 - July 31, 2010; Sponsor:
IEEE Control Systems Society (CSS); The ICROS OF Korea; IEEE CSS Singapore Chapter; IEEE CSS Hong
Kong Chapter; IEEE CSS Beijing Chapter; Publisher: IEEE Computer Society
Author affiliation:
1
Zhejiang University of Finance and Economics, Hangzhou 310018, China
Abstract: In view of the existing problem in four-dimensional decision-making consisting of alternative
set, attribute set, time set and valuator set, a novel model for dynamic multi-attribute group
decision-making based on vague set and its TOPSIS solution are put forward. Firstly, the relationship
between vague set and linguistic variable set is defined. Secondly, a mathematical description of
dynamic multi-attribute group decision-making problem based on vague set is presented. Thirdly, how to
find the model's solution and its steps are given in detail. Finally, the proposed approach is applied and
the result shows it effective and feasible.
(11 refs.)
Main Heading: Decision making
Uncontrolled terms: Asessment
Classification Code:
- Goup decision-making - Multi-attributes - TOPSIS - Vgue set
912.2 Management
Database: Compendex
Multi-attribute decision making based on three-parameter vague sets
Yang, Aiping1; Wang, Haixia2 Source: Proceedings of the 29th Chinese Control Conference, CCC'10,
p
5544-5548, 2010, Proceedings of the 29th Chinese Control Conference, CCC'10; Language: Chinese;
ISBN-13: 9787894631046; Article number: 5573407; Conference: 29th Chinese Control Conference,
CCC'10, July 29, 2010 - July 31, 2010; Sponsor: IEEE Control Systems Society (CSS); The ICROS OF Korea;
IEEE CSS Singapore Chapter; IEEE CSS Hong Kong Chapter; IEEE CSS Beijing Chapter; Publisher: IEEE
Computer Society
Author affiliation:
1
Zhejiang University of Finance and Economics, Hangzhou 310018, China
2
Department of Automatic Control, Zhejiang Sci-Tech. University, Hangzhou 310018, China
Abstract: In view of the practical problems in multi-attribute decision-making, a method based on
three-parameter vague sets is proposed. Firstly, three-parameter vague set is introduced to make up for
the shortage of the original vague set in expressing fuzzy information, and the method for finding core is
proposed. Secondly, the method that indicator value described by linguistic variables is transformed into
three-parameter vague value is brought forward. Thirdly, a model of multi-attribute decision making
based on three-parameter vague sets is put forward. Fourthly, a novel comprehensive evaluation index is
proposed, by which the meaning of "which is closest to PIS (Positive Ideal Solution) and farthest from
NIS (Negative Ideal Solution)" is expressed and the concrete steps are given. Finally, the proposed
method is applied into a case study and the result proves the method is effective.
(10 refs.)
Main Heading: Decision making
Uncontrolled
terms: Comprehensive
evaluation
index
-
Fuzzy
information
-
Ideal
- Indicator values - Linguistic variable - Multi attribute decision making - Practical
problems - Three-parameter vague values - TOPSIS - Vague sets
solutions
Classification Code:
912.2 Management
Database: Compendex
Nonlinear VaR model of options portfolio under multivariate mixture of
normals distributions
Chen, Rongda1; Cao, Dan1; Yu, Qingyang1 Source: Proceedings - 3rd International Conference on Business
Intelligence and Financial Engineering, BIFE 2010, p 364-368, 2010, Proceedings - 3rd International
Conference on Business Intelligence and Financial Engineering, BIFE 2010; ISBN-13: 9780769541167; DOI:
10.1109/BIFE.2010.91; Article number: 5621824; Conference: 3rd International Conference on Business
Intelligence and Financial Engineering, BIFE 2010, August 13, 2010 - August 15, 2010; Sponsor: College of
Business, City University of Hong Kong; Cent. Forecast. Sci. (CEFS) Chin. Acad. Sci. (CAS); Key Lab.
Manage., Decis. Inf. Syst. (MADIS) CAS; Sch. Econ. Manage., Changsha Univ. Sci. Technol.; Tenly Software
Incorporated; Publisher: IEEE Computer Society
Author affiliation:
1
School of Finance, Zhejiang University of Finance and Economics, Hangzhou, 310018, China
Abstract: The paper proposes a kind of nonlinear VaR model of options portfolio under heavy-tailed
market risk factors. The paper depicts heavy-tailed market risk factors using multivariate mixture of
normals distribution, and derives the moment generating function that reflects the change in options
portfolio value. Moreover, to make use of the relationship between characteristic function and moment
generating function, the paper develops Fourier-Inversion method and adaptive Simpson rule with
iterative algorithm of numerical integration into nonlinear VaR model of options portfolio, and calculates
the VaR values of portfolio. Numerical results show that the VaR values using Fourier-Inversion method
is slight difference from the VaR values using Monte Carlo simulation method. However, the calculation
speed using Fourier-Inversion method is obviously quicker than the speed using Monte Carlo simulation
method. © 2010 IEEE.
(13 refs.)
Main Heading: Monte Carlo methods
Controlled
evaluation
terms: Algorithms
Computer
simulation
-
Fourier
transforms
-
Function
- Integration - Mixtures - Numerical methods - Value engineering
Uncontrolled
functions
-
-
terms: Calculation
Fourier
-
Heavy-tailed
-
-
speed
Inversion methods
-
Characteristic
Iterative algorithm
-
Market
- Moment generating function - Monte Carlo simulation methods - Multivariate mixture of
- Nonlinear VaR - Numerical integrations - Numerical results - Option
portfolio - Portfolio value - Simpson rules
risks
normals distributions
Classification Code:
723 Computer Software, Data Handling and Applications
- 723.5 Computer
Applications - 802.3 Chemical Operations - 911.5 Value Engineering - 921 Mathematics - 922.2
Mathematical Statistics
Database: Compendex
Internet acceptance, service
dual-channel supply chain
competition
and
channel
profit
in
Chen, Yuan-Gao1 Source: Proceedings of the International Conference on E-Business and E-Government,
ICEE 2010, p 3235-3238, 2010, Proceedings of the International Conference on E-Business and
E-Government, ICEE 2010; ISBN-13: 9780769539973; DOI: 10.1109/ICEE.2010.814; Article number:
5591097; Conference: 1st International Conference on E-Business and E-Government, ICEE 2010, May 7,
2010 - May 9, 2010; Sponsor: South China University of Technology; Publisher: IEEE Computer Society
Author affiliation:
1
School of Information, Zhejiang University of Finance and Economics, Hangzhou, China
Abstract: A price and service competition model for dual-channel supply chain was established, then the
optimal solutions including service level and channel profit were compared between single channel and
dual-channel supply chain The results revealed that the competition between dual-channel supply chain
leaded to zero demand segment of Internet direct channel and more profits for whole supply chain
system when traditional retailer adopted service differentiation strategy. Through dual-channel strategy
the manufacturer effectively motivated traditional retailer to improve its channel service for more profits.
Furthermore, the customer acceptance of Internet direct channel made a significant impact on the profit
of manufacturer and retailer in the dual-channel supply chain system. © 2010 IEEE.
(9 refs.)
Main Heading: Competition
terms: Chains
- Earnings
Electronic commerce
- Government data
- Internet - Inventory control - Manufacture - Profitability - Sales - Supply chain
management - Supply chains
Controlled
processing
- Competition model - Customer acceptance - Direct
Dual channel
- Optimal solutions - Service competition - Service
- Service levels - Significant impacts - Single channels - Stackelberg
Uncontrolled terms: Channel acceptance
channel
-
differentiation
Games
- Supply chain systems
Classification Code:
Handling
and
Communications
723.2 Data Processing and Image Processing - 723 Computer Software, Data
Applications
-
911
Cost
-
718
and
Telephone
Value
Systems
Engineering;
and
Industrial
Related
Technologies;
Economics
-
717
Line
Optical
Communication - 602.1 Mechanical Drives - 537.1 Heat Treatment Processes - 716 Telecommunication;
Radar, Radio and Television
Database: Compendex
Financing analysis patterns based on the hypothesis of Small and
medium-sized Enterprises "development capacity gap" theory
Zhang, Daijun1 Source: ICCASM 2010 - 2010 International Conference on Computer Application and System
Modeling, Proceedings, v 9, p V9142-V9145, 2010, ICCASM 2010 - 2010 International Conference on
Computer
Application
and
System
Modeling,
Proceedings;
ISBN-13:
9781424472369;
DOI:
10.1109/ICCASM.2010.5623068; Article number: 5623068; Conference: 2010 International Conference on
Computer Application and System Modeling, ICCASM 2010, October 22, 2010 - October 24, 2010; Sponsor:
Shanxi University; Taiyuan University of Technology; Taiyuan University of Science and Technology; Shanxi
Normal University; Publisher: IEEE Computer Society
Author affiliation:
1
School of Finance, Zhejiang University of Finance and Economics, Hangzhou, China
Abstract: In the light of the principle of Pareto Optimal State, the "the Role Theory" is put forward in this
paper: In the situation that the social resources are optimally allocated, all the economic entity should
play his role which is the right one in the entire social economic system; basing on the three main
systems of enterprises' competition, innovation and controlling ability, the enterprises developing
capacity assessing module is founded. Viewing from the Medium and Small Enterprises "banner, system,
organization, mechanism, configuration and developing route", that is " five zone route", the "
Development Capacity Shortage", which is the relative gap between the role that the medium and small
enterprises play in the reality and realzing the expected role in "Pareto Optimal State" is detected;
according to the detail situation of Medium and Small Enterprises "Development Capacity Shortage", this
paper explores the analysis module of the financing policy's angle and vigor of which the government
supports medium and small enterprises to make up the "Development Capacity Shortage". © 2010 IEEE.
(5 refs.)
Main Heading: Industry
Controlled terms: Computer applications
- Finance - Pareto principle
- Financing policy - Government supports - Medium and
small enterprise - Pareto-optimal - Policy making - Role theory - Small and medium -sized
enterprise - Social economic system
Uncontrolled terms: Capacity shortage
Classification Code:
723.5 Computer Applications
-
911 Cost and Value Engineering; Industrial
Economics - 912 Industrial Engineering and Management
Manufacturing
Database: Compendex
- 913 Production Planning and Control;
Long memory macroeconomic model of the term structure of interest
rates
Yi, Zhi1; Jiang, Feng2 Source: Proceedings - 2010 6th International Conference on Natural Computation,
ICNC 2010, v 6, p 2975-2979, 2010, Proceedings - 2010 6th International Conference on Natural Computation,
ICNC 2010; ISBN-13: 9781424459612; DOI: 10.1109/ICNC.2010.5583966; Article number: 5583966;
Conference: 2010 6th International Conference on Natural Computation, ICNC'10, August 10, 2010 - August
12, 2010; Sponsor: Yantai University; Publisher: IEEE Computer Society
Author affiliation:
1
Zhejiang University of Finance and Economics, China
2
Shanghai Chinatop Institute of Economic Research, China
Abstract: In this paper, we employ the Sowell (1989) multi-variate long memory model to describe the
dynamic behaviors of our macro system. Moreover, we incorporate the partial seasonal adjustment
operator into our macro model by which we significantly reduce the AR lag order lower to one,hence
reducing a large amount of parameters. Empirically, we apply the estimation proceudre of Hualde and
Robinson (2006). We found that 3 month short interest rate is fractionally cointegrated with the long term
yield, implying a stable long run relationship between them. © 2010 IEEE.
(8 refs.)
Main Heading: Mathematical models
Uncontrolled
terms: Dynamic
behaviors
-
Interest
rates
-
Long
memories
-
Long-term
- Macro model - Macro systems - Macro-economic models - Robinson - Seasonal
adjustments - Term structure of interest rates
yields
Classification Code:
921 Mathematics
Database: Compendex
Gray-level digital watermarking algorithm based on SVD
Li, Xudong1 Source: Wuhan Daxue Xuebao (Xinxi Kexue Ban)/Geomatics and Information Science of Wuhan
University, v 35, n 11, p 1305-1308+1359, November 2010; Language: Chinese; ISSN: 16718860; Publisher:
Wuhan University
Author affiliation:
1
School of Mathematics and Statistics, Zhejiang University of Finance and Economics, 18 Xueyuan Street,
Hangzhou 310018, China
Abstract: A novel SVD based gray-level digital watermarking algorithm is presented. In this algorithm,
data from high bit to low bit of decomposed bit planes of the gray-level watermark image are embedded
respectively into corresponding singular values from large to small obtained by SVD of sub blocks of the
original image. And that the revision for resistance against brightness-and-contrast adjustment is
adopted makes that this algorithm has the robustness against brightness-and-contrast adjustment attack.
The experimental results show that this algorithm has fine transparency of the embedded watermark and
has extremely strong robustness against brightness-and-contrast adjustment attack, and it has as well
strong robustness against other common image-processing attacks such as image smoothing, noise
adding, color dithering, and JPEG-compression.
(13 refs.)
Main Heading: Watermarking
Controlled terms: Algorithms
Uncontrolled
protections
smoothing
values
terms: Bit
-
Digital
-
- Copyrights - Digital watermarking
planes
-
water-marks
Noise
Color
-
adding
dithering
Embedded
-
-
Contrast
watermarks
Original
-
adjustment
-
Gray-level
images
-
Copyright
-
Image
Singular
- Sub-blocks - SVD - Watermark images - Watermarking algorithms
Classification Code:
723 Computer Software, Data Handling and Applications - 723.2 Data Processing
and Image Processing - 811.1.1 Papermaking Processes - 903 Information Science - 921 Mathematics
Database: Compendex
A new model between stock valuation index and volatility of stock price
He, Chengying1; Xu, Qinghzen2; Liu, Ying2 Source: Proceedings - 2010 International Conference on
Intelligent Computing and Cognitive Informatics, ICICCI 2010, p 479-482, 2010, 2010 International Conference
on Intelligent Computing and Cognitive Informatics, ICICCI 2010; ISBN-13: 9780769540146; DOI:
10.1109/ICICCI.2010.122; Article number: 5566054; Conference: 2010 International Conference on
Intelligent Computing and Cognitive Informatics, ICICCI 2010, June 22, 2010 - June 23, 2010; Sponsor:
Intelligent Inf. Technol. Appl. Res. Assoc.; Wuhan University of Science and Tecchnology, Zhongnan Branch;
Publisher: IEEE Computer Society
Author affiliation:
1
Institute of China Security Market, Zhejiang University of Finance and Economics, Hangzhou, 310018,
China
2
11F-05, International Trust Building, Guosen Securities Co. Ltd., Shenzhen, 518001, China
Abstract: Evaluation index are long been thought as very accurately reflect stock price by people in
China. In this paper, we build theory models to study the raltionship between volume, P/B(Price-to-Book
value Ratio), P/S(Price-to-Sale Ratio) and P/CF(Price-to-Cash Flow Ratio) and stock market volatility. In
current China stock market, individual stock price volatility is a complicated function. The resulting stock
price function has four variables as input: volume, PB, PS, PC. In this paper, we present a new
mathematical model to simulate stock price volatility. We applied the new model to a stock through
empirical analysis. Our conclusions are as follows: (1) The volatility of stock price is a function of
parameters of PB, PS and PC. (2) Our new model can predict future stock price changes. (3) PB, PS and
PC has positive effect on stock price. Moreover, this paper proposed some potential methods and
system suggestions for the further improvement of stock price pridiction in China stock market. Overal,
the empirical analysis results show that the new model can enhance the volatility forecasting ability of
individual stock in china stock market. © 2010 IEEE.
(12 refs.)
Main Heading: Costs
Controlled terms: Commerce
- Information science - Intelligent computing - Mathematical models
- Complicated functions - Empirical analysis - Evaluation
index - New mathematical model - New model - Positive effects - Potential methods - Stock
market
- Stock market volatility - Stock price - Stock valuations
- Theory
model - Volatility - Volatility forecasting
Uncontrolled terms: Cash flow
Classification Code:
723.4 Artificial Intelligence - 903 Information Science - 911 Cost and Value
Engineering; Industrial Economics - 921 Mathematics
Database: Compendex
Fast algorithm of output increment feedback predictive control with input
constraints
Aiping, Yang1 Source: Proceedings of the World Congress on Intelligent Control and Automation (WCICA), p
4851-4854, 2010, 2010 8th World Congress on Intelligent Control and Automation, WCICA 2010; ISBN-13:
9781424467129; DOI: 10.1109/WCICA.2010.5554847; Article number: 5554847; Conference: 2010 8th
World Congress on Intelligent Control and Automation, WCICA 2010, July 7, 2010 - July 9, 2010; Publisher:
Institute of Electrical and Electronics Engineers Inc.
Author affiliation:
1
Zhejiang University of Finance and Economics, Hangzhou, 310018, China
Abstract: Based on output increment feedback GPC and some algorithms to solve the problem of input
constrains, a new output increment feedback GPC with input constraints is proposed. The operation of
inverse matrix is avoided by approximately computing the future control increment sequence off line, so
that the on-line computation burden is strongly reduced. Moreover, the algorithm can obtain the optimal
control input by adjusting the set-value of max-output increment and guarantees that output close to the
set-value. Simulation results show that the proposed algorithm is effective. © 2010 IEEE.
(10 refs.)
Main Heading: Algorithms
Controlled terms: Intelligent control
- Inverse problems
- GPC - Input constrains - Input constraints - Inverse
- Online computations - Optimal controls - Output increment feedback - Predictive
control - Simulation result
Uncontrolled terms: Fast algorithms
matrix
Classification Code:
731.1 Control Systems - 921 Mathematics
Database: Compendex
A Fast generalized predictive control algorithm with non-overshoot
Yang, Aiping1 Source: Proceedings of the World Congress on Intelligent Control and Automation (WCICA), p
3572-3575, 2010, 2010 8th World Congress on Intelligent Control and Automation, WCICA 2010; ISBN-13:
9781424467129; DOI: 10.1109/WCICA.2010.5553879; Article number: 5553879; Conference: 2010 8th
World Congress on Intelligent Control and Automation, WCICA 2010, July 7, 2010 - July 9, 2010; Publisher:
Institute of Electrical and Electronics Engineers Inc.
Author affiliation:
1
Zhejiang University of Finance and Economics, Hangzhou, 310018, China
Abstract: A Fast generalized predictive control algorithm is proposed for a class of system requirement
of non-overshoot based on integrating stair-like GPC and varying trend of control increments. The heavy
on-line computation burden for computing inverse matrix is avoided by single-valued GPC, and current
input increment is compensated by next step input to overcome potential overshoot. The steps of the
algorithm is described in detail. Simulation results show the algorithm has good control performance in
response speed, anti-interference, restricting the overshoot and robustness. © 2010 IEEE.
(10 refs.)
Main Heading: Predictive control systems
Controlled terms: Algorithms
- Intelligent control - Inverse problems
Uncontrolled terms: Anti-interference
predictive control algorithms
speed
-
GPC
-
Control performance
-
Inverse matrix
-
- Simulation result - System requirements
Classification Code:
731.1 Control Systems - 921 Mathematics
Database: Compendex
-
Current input
Online computations
-
Generalized
-
Response
Singular integral operator, Hardy-Morrey space estimates for multilinear
operators and Navier-Stokes equations
Wang, Henggeng1, 2; Jia, Houyu3 Source: Mathematical Methods in the Applied Sciences, v 33, n 14, p
1661-1684, September 30, 2010; ISSN: 01704214, E-ISSN: 10991476; DOI: 10.1002/mma.1275; Publisher:
John Wiley and Sons Ltd
Author affiliation:
1
School of Mathematics and Statistics, Zhejiang University of Finance and Economics, Hangzhou 310018,
China
2
Institute of Applied Physics and Computational Mathematics, Beijing 100088, China
3
Department of Mathematics, Zhejiang University, Hangzhou, Zhejiang 310027, China
Abstract: After establishing the molecule characterization of the Hardy-Morrey space, we prove the
boundedness of the singular integral operator and the Riesz potential. We also obtain the Hardy-Morrey
space estimates for multilinear operators satisfying certain vanishing moments. As an application, we
study the existence and the uniqueness of the solutions to the Navier-Stokes equations for the initial data
in the Hardy-Morrey space H Mpq(p≥n) for q as small as possible. Here, the Hardy-Morrey space
estimates for multilinear operators are important tools. Copyright © 2010 John Wiley & Sons, Ltd.
(27
refs.)
Main Heading: Navier Stokes equations
Controlled terms: Mathematical operators
Uncontrolled
operator
terms: Boundedness
-
- Viscous flow
Div-curl
theorem
-
Morrey
spaces
- Riesz potentials - Singular integral operators - Vanishing moment
Classification Code:
631.1 Fluid Flow, General - 921 Mathematics
Database: Compendex
-
Multilinear
Study on design strategy of brand culture in art education
Lili, Zhu1 Source: ICENT 2010 - 2010 International Conference on Educational and Network Technology, p
62-65, 2010, ICENT 2010 - 2010 International Conference on Educational and Network Technology; ISBN-13:
9781424476619; DOI: 10.1109/ICENT.2010.5532127; Article number: 5532127; Conference: 2010
International Conference on Educational and Network Technology, ICENT 2010, June 25, 2010 - June 27,
2010; Sponsor: Int. Assoc. Comput. Sci. Inf. Technol. (IACSIT); Institute of Electrical and Electronics
Engineers (IEEE); Publisher: IEEE Computer Society
Author affiliation:
1
College of Arts, Zhejiang University of Finance and Economics, Hangzhou, China
Abstract: The education for design method of brand culture takes a very important position in art
education. It's a great challenge for students to understand basic attributes of a brand's trademark, its
role as an important mark for an enterprise and products to distinguish from competitors and its
characteristics as an important carrier of market publicity for an enterpriser, and also design for a
humanistic brand. In terms of principles for brand design, this article drafts the brand's design program
and conducts in-depth analysis and investigation on specific schemes, such as whole design for a
brand's image, packaging design and innovative design of advertisement. Besides, it proposes the point
that in teaching process the students understand the principle for an enterprise devoting to humanistic
brand design and taking culture as brand communication strategy. © 2010 IEEE.
(10 refs.)
Main Heading: Design
Controlled terms: Competition
-
Uncontrolled terms: Art education
strategy
strategies
-
Communication
In-depth analysis
Classification Code:
Students
-
strategy
-
Brand communication
-
Design
Innovative design
method
-
-
Brand design
Design
Packaging designs
-
Brand-culture
programs
-
Design
Teaching process
408 Structural Design - 901.2 Education - 911.2 Industrial Economics
Database: Compendex
-
A new manufacturing resource allocation method for supply chain
optimization using extended genetic algorithm
Zhang, W.Y.1; Zhang, Shuai1; Cai, Ming2; Huang, J.X.2 Source: International Journal of Advanced
Manufacturing Technology, p 1-14, 2010; ISSN: 02683768, E-ISSN: 14333015; DOI:
10.1007/s00170-010-2900-3
Author affiliation:
1
School of Information, Zhejiang University of Finance and Economics, Hangzhou, 310018, China
2
School of Computer Science, Zhejiang University, Hangzhou, 310027, China
Abstract: In distributed manufacturing environments, the real competitive edge of an enterprise is
directly related to the optimization level of its supply chain deployment in general, and, in particular, to
how it allocates diverse manufacturing resources optimally. This is faced with increasing challenges
caused by the conflicting objectives in manufacturing integration over distributed manufacturing
resources. This paper presents a new manufacturing resource allocation method using extended genetic
algorithm (GA) to support the multi-objective decision-making optimization for supply chain deployment.
A new multi-objective decision-making mathematical model is proposed to evaluate, select, and
sequence the candidate manufacturing resources allocated to sub-tasks composing the supply chain, by
dealing with the trade-offs among multiple objectives including similarity, time, cost, quality, and service.
An extended GA approach with problem-specific two-dimensional representation scheme, selection
operator, crossover operator, and mutation operator is proposed to solve the mathematical model
optimally by designing a chromosome containing two kinds of information, i.e., resource selection and
resource sequencing. A case study is carried out to demonstrate the effectiveness and efficiency of the
proposed approach. © 2010 Springer-Verlag London Limited.
(19 refs.)
Main Heading: Mathematical operators
Controlled terms: Decision making
models
-
management
Multiobjective
-
terms: Competitive
-
Enterprise IS
resource
allocation
operators
-
operators
-
-
Genetic algorithms
-
Resource
Manufacture
allocation
-
-
Mathematical
Supply
chain
Supply chains
Uncontrolled
manufacturing
-
optimization
-
Classification Code:
-
eXtended GA
Multiobjective
Optimization
Subtasks
-
-
edges
levels
decision
-
Crossover
-
operator
Manufacturing resource
-
Multiple
Resource
-
Manufacturing
-
objectives
selection
Distributed
-
Mutation
Selection
Supply chain optimization
912 Industrial Engineering and Management
-
912.2 Management
-
913
Production Planning and Control; Manufacturing - 913.4 Manufacturing - 921 Mathematics - 921.5
Optimization Techniques
Database: Compendex
A universal algorithm to generate pseudo-random numbers based on
uniform mapping as homeomorphism
Fu-Lai, Wang1 Source: Chinese Physics B, v 19, n 9, September 2010; ISSN: 16741056; DOI:
10.1088/1674-1056/19/9/090505; Article number: 090505; Publisher: Institute of Physics Publishing
Author affiliation:
1
Department of Mathematics and Statistics, Zhejiang University of Finance and Economics, Hangzhou
310012, China
Abstract: A specific uniform map is constructed as a homeomorphism mapping chaotic time series into
[0,1] to obtain sequences of standard uniform distribution. With the uniform map, a chaotic orbit and a
sequence orbit obtained are topologically equivalent to each other so the map can preserve the most
dynamic properties of chaotic systems such as permutation entropy. Based on the uniform map, a
universal algorithm to generate pseudo random numbers is proposed and the pseudo random series is
tested to follow the standard 0-1 random distribution both theoretically and experimentally. The algorithm
is not complex, which does not impose high requirement on computer hard ware and thus computation
speed is fast. The method not only extends the parameter spaces but also avoids the drawback of small
function space caused by constraints on chaotic maps used to generate pseudo random numbers. The
algorithm can be applied to any chaotic system and can produce pseudo random sequence of high
quality, thus can be a good universal pseudo random number generator. © 2010 Chinese Physical
Society and IOP Publishing Ltd.
(17 refs.)
Main Heading: Chaotic systems
-
Controlled terms: Algorithms
Uncontrolled
-
series
quality
-
-
terms: Chaos
Computation
speed
Parameter spaces
-
-
generators
distribution
Number theory
-
Chaotic
-
Classification Code:
Random number generation
Dynamic
numbers
-
-
Chaotic
orbits
property
-
Function
map
-
Permutation entropy
Pseudo-random
Uniform distribution
-
-
Uniform map
Pseudorandom
-
-
Time series
Chaotic
spaces
-
time
High
Pseudo random number
sequences
Universal algorithm
921 Mathematics - 922.2 Mathematical Statistics
Database: Compendex
-
Pseudo random
-
-
Random
Image digital watermarking algorithm based on wavelet transform and
relative quantization
Li, Xu-Dong1 Source: Guangdianzi Jiguang/Journal of Optoelectronics Laser, v 21, n 9, p 1378-1382,
September 2010; Language: Chinese; ISSN: 10050086; Publisher: Board of Optronics Lasers
Author affiliation:
1
School of Mathematics and Statistics, Zhejiang University of Finance and Economics, Hangzhou 310018,
China
Abstract: An image digital watermarking algorithm is proposed, based on blocked wavelet transform and
relative quantization which is simple, handy and easy to implement. For the using of quantization scheme,
the algorithm can extract watermark without original image and original watermark. Experimental results
show that the algorithm has a fine transparency of the embedded watermark image, and the algorithm is
very robust against brightness and contrast attacks and is robust against attacks such as
JPEG-compression, re-sampling, dithering, smoothing, and noise adding as well.
(20 refs.)
Main Heading: Watermarking
Controlled
processing
-
terms: Algorithms
-
quantization
-
Digital
-
watermarking
Image
Wavelet transforms
Uncontrolled terms: Blind watermarking
adding
-
Copyrights
Original
Resampling
Classification Code:
images
-
-
-
Copyright protection
-
Quantization
Embedded watermarks
schemes
-
-
Noise
Relative
Watermarking algorithms
723 Computer Software, Data Handling and Applications - 723.2 Data Processing
and Image Processing
-
811.1.1 Papermaking Processes
Mathematics - 921.3 Mathematical Transformations
Database: Compendex
-
903 Information Science
-
921
Dynamic service selection with reputation management
Surong, Yan1; Xiaolin, Zheng2; Deren, Chen2 Source: Proceedings - 2010 International Conference on
Service Science, ICSS 2010, p 9-16, 2010, Proceedings - 2010 International Conference on Service Science,
ICSS 2010; ISBN-13: 9780769540177; DOI: 10.1109/ICSS.2010.67; Article number: 5494369; Conference:
2010 International Conference on Service Sciences, ICSS 2010, May 12, 2010 - May 14, 2010; Sponsor:
International Business Machines China Company Limited (IBM); Zhejiang University (ZJU); Institute of
Software, Chinese Academy of Sciences (ISCAS); Publisher: IEEE Computer Society
Author affiliation:
1
College of Computer Science and Technology, Zhejiang University, Zhejiang University of Finance and
Economics, Hangzhou, China
2
College of Computer Science and Technology, Zhejiang University, Hangzhou, China
Abstract: In open and dynamic internet environments, reputation-based trust is a key issue for service
selection which is based on the prediction of services' performance. Typically, the trust and reputation
evaluation is based on the feedback of the service quality from all service users. The crucial issue in this
evaluation is to detect and deal with false or unfair feedback from dishonest providers and malicious
users. In this paper, we first present a dynamic service selection framework then introduce a semantic
matching and ranking algorithm to enable the automatic selection. Furthermore, we propose a trust and
reputation assessment approach to address trust and reputation of service and service user in various
realistic malicious behaviors. Finally, to the best of our knowledge, a set of empirical studies have been
conducted to demonstrate that our solution gains good results under collaboration attacks of various
malicious behaviors. © 2010 IEEE.
(11 refs.)
Uncontrolled terms: Assessment approaches - Automatic selection services
- Empirical studies - Internet environment - Key issues behavior - Ranking algorithm - Reputation management - Semantic matching matching - Service Quality - Service selection - Trust and reputation
Database: Compendex
Dynamic
Malicious
Service
A complexity measure approach based on forbidden patterns and
correlation degree
Fu-Lai, Wang1 Source: Chinese Physics B, v 19, n 6, 2010; ISSN: 16741056; DOI:
10.1088/1674-1056/19/6/060515; Article number: 060515; Publisher: Institute of Physics Publishing
Author affiliation:
1
Department of Mathematics and Statistics, Zhejiang University of Finance and Economics, Hangzhou
310012, China
Abstract: Based on forbidden patterns in symbolic dynamics, symbolic subsequences are classified and
relations between forbidden patterns, correlation dimensions and complexity measures are studied. A
complexity measure approach is proposed in order to separate deterministic (usually chaotic) series from
random ones and measure the complexities of different dynamic systems. The complexity is related to
the correlation dimensions, and the algorithm is simple and suitable for time series with noise. In the
paper, the complexity measure method is used to study dynamic systems of the Logistic map and the
He´non map with multi-parameters. © 2010 Chinese Physical Society and IOP Publishing Ltd.
(18
refs.)
Main Heading: Correlation methods
-
Controlled terms: Computational complexity
Uncontrolled terms: Complexity measures
dimensions
maps
-
-
Dynamic
Multiparameters
Classification Code:
-
-
Dynamical systems
Complexity theory
Systems
-
-
-
Time series
-
Correlation degree
Forbidden
pattern
-
Correlation
Logistic
Symbolic Dynamics
721.1 Computer Theory, Includes Formal Logic, Automata Theory, Switching Theory,
Programming Theory - 921 Mathematics - 922.2 Mathematical Statistics - 931 Classical Physics;
Quantum Theory; Relativity
Database: Compendex
A modification of regularized newton-type method for nonlinear ill-posed
problems
Meng, Ze-Hong1; Zhao, Zhen-Yu2; He, Guo-Qiang3 Source: Lecture Notes in Computer Science (including
subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 5938 LNCS, p 295-304,
2010, High Performance Computing and Applications - Second International Conference, HPCA 2009, Revised
Selected Papers; ISSN: 03029743, E-ISSN: 16113349; ISBN-10: 3642118410, ISBN-13: 9783642118418;
DOI: 10.1007/978-3-642-11842-5_40; Conference: 2nd International Conference on High-Performance
Computing and Applications, HPCA 2009, August 10, 2009 - August 12, 2009; Sponsor: Shanghai Jiao Tong
University; Xi'an Jiao Tong University; University of Calgary; Publisher: Springer Verlag
Author affiliation:
1
School of Mathematics and Statistics, Zhejiang University of Finance and Economics, 310018, China
2
College of Science, Guangdong Ocean University, Zhanjiang, 524088, China
3
Department of Mathematics, Shanghai University, 200444, China
Abstract: A Modification of regularized Newton-type method for nonlinear ill-posed problems is
considered. Using an a posteriori stopping rule proposed by Kaltenbacher, the convergence of the
method is proved under certain conditions on the nonlinear operator. Optimal convergence rates are also
shown under appropriate closeness and smoothness assumptions on the difference of the starting value
and the solution. Some special cases of the method are also given. Numerical results confirm the
corresponding theoretical statements. © 2010 Springer-Verlag.
(13 refs.)
Main Heading: Problem solving
Controlled terms: Numerical analysis
Uncontrolled
-
operator
values
-
terms: Newton-type
Numerical
results
methods
-
-
Optimal
Nonlinear
ill-posed
convergence
-
problems
Posteriori
-
Nonlinear
-
Stopping rule
Classification Code:
723.4 Artificial Intelligence - 921 Mathematics - 921.6 Numerical Methods
Database: Compendex
Starting
A new smoothing Newton-type algorithm for semi-infinite programming
Ling, Chen1; Ni, Qin2; Qi, Liqun3; Wu, Soon-Yi4 Source: Journal of Global Optimization, v 47, n 1, p 133-159,
May 2010; ISSN: 09255001, E-ISSN: 15732916; DOI: 10.1007/s10898-009-9462-7; Publisher: Springer
Netherlands
Author affiliation:
1
School of Mathematics and Statistics, Zhejiang University of Finance and Economics, 310018 Hangzhou,
China
2
Department of Mathematics, Nanjing University of Aeronautics and Astronautics, 210016 Nanjing, China
3
Department of Applied Mathematics, Hong Kong Polytechnic University, Hung Hom, Kowloon, Hong Kong
4
Department of Mathematics, National Cheng Kung University, National Center for Theoretical Sciences,
Tainan, Taiwan
Abstract: We consider a semismooth reformulation of the KKT system arising from the semi-infinite
programming (SIP) problem. Based upon this reformulation, we present a new smoothing Newton-type
method for the solution of SIP problem. The main properties of this method are: (a) it is globally
convergent at least to a stationary point of the SIP problem, (b) it is locally superlinearly convergent
under a certain regularity condition, (c) the feasibility is ensured via the aggregated constraint, and (d) it
has to solve just one linear system of equations at each iteration. Preliminary numerical results are
reported. © Springer Science+Business Media, LLC. 2009.
(39 refs.)
Main Heading: Mathematical programming
Controlled
terms: Convergence
of
numerical
methods
-
Internet
protocols
-
Linear
systems - Numerical analysis
Uncontrolled
terms: Globally
algorithms
Newton-type methods
-
convergent
-
-
Linear
system
Nonsmooth equation
-
of
equations
-
Newton-type
Numerical results
-
Regularity
condition - Semi infinite programming - Semismooth - Smoothing methods - Stationary points
Classification
Code:
961
Systems
Science
-
922
Statistical
Methods
-
921.6
Numerical
Methods - 921.5 Optimization Techniques - 921 Mathematics - 731.1 Control Systems - 723.1
Computer Programming
-
723 Computer Software, Data Handling and Applications
Communication, Equipment and Techniques
Database: Compendex
-
722.3 Data
Automatic transformation of HTML pages into relational database
Deng, Xubin1 Source: Journal of Information and Computational Science, v 7, n 2, p 349-355, February 2010;
ISSN: 15487741; Publisher: Binary Information Press
Author affiliation:
1
School of Information, Zhejiang University of Finance and Economics, Hangzhou 310018, China
Abstract: We present an approach for transformation of HTML pages into relational database. This
approach first constructs a DOM-tree from a HTML page, then finds continually repeat structures in the
DOM-tree and abstracts them into a set of generalized lists, and finally constructs a schema tree for an
abstracted DOM-tree and simultaneously fills relation tables in the schema tree with data extracted from
the DOM-tree. A prototype system has been developed, which forms the bases for a relational
model-based platform of entity set finding, useful information extraction and analyses for HTML pages.
Copyright © 2010 Binary Information Press.
(8 refs.)
Main Heading: Trees (mathematics)
Controlled terms: Abstracting
-
Biological materials
-
Database systems
-
HTML
-
Markup
languages
Uncontrolled terms: Automatic transformations
-
Generalized list
-
HTML pages
-
Information
Extraction - Prototype system - Relation tables - Relational Database - Relational Model
Classification Code:
461.2 Biological Materials and Tissue Engineering - 723 Computer Software, Data
Handling and Applications - 723.3 Database Systems - 903.1 Information Sources and Analysis - 921.4
Combinatorial Mathematics, Includes Graph Theory, Set Theory
Database: Compendex
A color recovering method for black-white facial image
Li, Xudong1 Source: Wuhan Daxue Xuebao (Xinxi Kexue Ban)/ Geomatics and Information Science of Wuhan
University, v 35, n 2, p 237-239, February 2010; Language: Chinese; ISSN: 16718860; Publisher: Wuhan
University
Author affiliation:
1
School of Mathematics and Statistics, Zhejiang University of Finance and Economics, 18 Xueyuan Street,
Hangzhou 310018, China
Abstract: A novel color recovering method for black-white facial image based on image warping and
color-space transformation is presented. The basic idea of the method is referring a colorized facial
image and then adding its tint into the black-white facial image. This method is simple to understand and
can easily be implemented. Experimental results show that the method is very effective and can naturally
and livelily realize color recovering of different black-white facial images including images of the males,
the females, the elders, and the youngers. The facial details in the color recovered image obtained by
this method is very realistic and convincing.
(11 refs.)
Main Heading: Color
Controlled terms: Image enhancement - Recovery - Weaving
Uncontrolled terms: Basic idea - Black-white images - Color space - Facial images
- Image
warping - Space transformations
Classification Code:
531 Metallurgy and Metallography - 622.5 Radioactive Wastes - 723.2 Data
Processing and Image Processing - 741 Light, Optics and Optical Devices - 741.1 Light/Optics - 819.5
Textile Products and Processing
Database: Compendex
A new semantic similarity measuring method based on web search
engines
Lu, Gang1; Huang, Peng2; He, Lijun1; Cu, Changyong3; Li, Xiaobo4 Source: WSEAS Transactions on
Computers, v 9, n 1, p 1-10, January 2010; ISSN: 11092750; Publisher: World Scientific and Engineering
Academy and Society
Author affiliation:
1
School of Information, Zhejiang University of Finance and Economics, 18 Xueyuan Street, Hangzhou
310018, China
2
Zhejiang University, 1 Yugu road, Hangzhou 310018, China
3
School of Mechanical Engineering, Hangzhou Dianzi University, Xiasha, Hangzhou 310018, China
4
School of Information, Zhejiang Education Institute, 140 Wensan Road, Hangzhou 310012, China
Abstract: Word semantic similarity measurement is a basic research area in the fields of natural
language processing, intelligent retrieval, document clustering, document classification, automatic
question answering, word sense disambiguation, machine translation, etc.. To address the issues
existing in current approaches to word semantic similarity measurement, such as the low term coverage
and difficult update, a novel word semantic similarity measurement method based on web search
engines is proposed, which exploits the information, including page count and snippets, in retrieved
results to do calculation. The proposed method can resolve the issues mentioned above due to the huge
volumes of information in the Web. The experimental results demonstrate the effectiveness of the
(26 refs.)
proposed methods.
Main Heading: World Wide Web
Controlled terms: Computational linguistics - Industrial research - Information retrieval - Information
retrieval systems - Information theory - Natural language processing systems - Ontology - Search
engines - Semantic Web - Semantics - Speech transmission
Uncontrolled terms: Intelligent retrieval - Semantic similarity - Web search engine - Web search
engines - Wordnet
Classification
Speech
-
Dissemination
Code:
901.3
-
912.1
Industrial
Engineering
Engineering
Research
903.3 Information Retrieval
-
903
-
723.5
Information
and Use
-
Computer
Science
Applications
-
903.2
-
751.5
Information
723.2 Data Processing and Image
Processing - 721.1 Computer Theory, Includes Formal Logic, Automata Theory, Switching Theory,
Programming Theory - 718 Telephone Systems and Related Technologies; Line Communications - 717
Optical Communication - 716.1 Information Theory and Signal Processing - 716 Telecommunication;
Radar, Radio and Television - 723 Computer Software, Data Handling and Applications
Database: Compendex
Semiparametric estimation in transformation models with cure fraction
Zhao, Xiaobing1; Zhou, Xian2 Source: Communications in Statistics - Theory and Methods, v 39, n 18, p
3371-3388, January 2010; ISSN: 03610926, E-ISSN: 1532415X; DOI: 10.1080/03610920903268840;
Publisher: Taylor and Francis Inc.
Author affiliation:
1
School of Management and Statistics, Zhejiang University of Finance and Economics, Hangzhou, China
2
Department of Actuarial Studies, Macquarie University, Balaclava Road, North Ryde, Sydney, NSW 2109,
Australia
Abstract: Semiparametric transformation model has been extensively investigated in the literature. The
model, however, has little dealt with survival data with cure fraction. In this article, we consider a class of
semi-parametric transformation models, where an unknown transformation of the survival times with cure
fraction is assumed to be linearly related to the covariates and the error distributions are parametrically
specified by an extreme value distribution with unknown parameters. Estimators for the coefficients of
covariates are obtained from pseudo Z-estimator procedures allowing censored observations. We show
that the estimators are consistent and asymptotically normal. The bootstrap estimation of the variances
of the estimators is also investigated. Copyright © Taylor & Francis Group, LLC.
(33 refs.)
Main Heading: Parameter estimation
Controlled terms: Curing - Linear transformations
Uncontrolled
terms: Bootstrap
estimator
-
Censored
observations
-
Covariates
-
Cure
fraction - Error distributions - Extreme value distributions - Pseudo Z-estimator - Semi parametric
estimation - Semiparametric - Survival data - Survival time - Transformation model - Unknown
parameters
Classification Code:
Transformations
Database: Compendex
731.1 Control Systems
-
815.1 Polymeric Materials
-
921.3 Mathematical
Value safeguard mechanism in asymmetric interorganizational
relationships
Ye, Zhan1, 2 Source: 2010 International Conference on Management and Service Science, MASS 2010, 2010,
2010 International Conference on Management and Service Science, MASS 2010; ISBN-13: 9781424453269;
DOI: 10.1109/ICMSS.2010.5576703; Article number: 5576703; Conference: 2010 International Conference
on Management and Service Science, MASS 2010, August 24, 2010 - August 26, 2010; Sponsor: IEEE
Wuhan Section; Sichuan University; Wuhan University; James Madison University; Publisher: IEEE Computer
Society
Author affiliation:
1
Shool of Management, Zhejiang University, Hangzhou, China
2
School of Accounting, Zhejiang University of Finance and Economics, Hangzhou, China
Abstract: Network structure is recognized as an increasing important mechanism of value safeguard in
interorganizational relationships. This paper employs social network approach to examine how smaller
and vulnerable firms use their network structure as governance mechanisms in collaborations with
stronger and prominent firms. We identify three distinctive types of tie-formation strategies and illustrate
contingents that affect the choice of network strategies. © 2010 IEEE.
(16 refs.)
Main Heading: Management science
Uncontrolled
terms: Governance
mechanism
-
Inter-organizational
strategy - Network structures - Social Networks - Value safeguard
Classification Code:
912.2 Management
relationships
-
Network
Improvement of background value and its application in
non-equidistance GM (1, 1) modeling
Wei, Xiong1; Yang, Aiping2; Dai, Wenzhan1 Source: Proceedings of the World Congress on Intelligent Control
and Automation (WCICA), p 5919-5923, 2010, 2010 8th World Congress on Intelligent Control and Automation,
WCICA 2010; ISBN-13: 9781424467129; DOI: 10.1109/WCICA.2010.5554504; Article number: 5554504;
Conference: 2010 8th World Congress on Intelligent Control and Automation, WCICA 2010, July 7, 2010 - July
9, 2010; Publisher: Institute of Electrical and Electronics Engineers Inc.
Author affiliation:
1
Department of Automatic Control, Zhejiang Sci.-Tech. University, Hangzhou, 310018, China
2
Zhejiang University of Finance and Economics, Hangzhou, 310018, China
Abstract: Based on the geometric explanation of integral, a new construction method of GM(1,1)'s
background value for non-equidistance sequence is put forward by using approach that actual area is
substituted by summation of small rectangle area and small echelon area. Because the method is able to
optimize the result of modeling, so the GM(1,1)'s fitting precision and prediction precision are advanced
greatly The method is applied in building model of relation between titanium alloy fatigue strength and
temperature change, the result proves its validity and enlarges the scope of GM(1,1) 's application wildly.
© 2010 IEEE.
(9 refs.)
Main Heading: System theory
Controlled terms: Intelligent control - Titanium - Titanium alloys
Uncontrolled terms: Background value - Fatigue strength - Fitting precision - GM (1 , 1) - Grey
Model - In-buildings - New constructions - Non-equidistance - Prediction precision - Rectangle
areas - Temperature changes
Classification Code:
Database: Compendex
542.3 Titanium and Alloys - 731.1 Control Systems - 961 Systems Science
An improved feature extraction method for individual offline handwritten
digit recognition
Qinghui, Wang1, 3; Aiping, Yang2; Wenzhan, Dai1 Source: Proceedings of the World Congress on Intelligent
Control and Automation (WCICA), p 6327-6330, 2010, 2010 8th World Congress on Intelligent Control and
Automation, WCICA 2010; ISBN-13: 9781424467129; DOI: 10.1109/WCICA.2010.5554355; Article number:
5554355; Conference: 2010 8th World Congress on Intelligent Control and Automation, WCICA 2010, July 7,
2010 - July 9, 2010; Publisher: Institute of Electrical and Electronics Engineers Inc.
Author affiliation:
1
Department of Automatic Control, Zhejiang Sci.-Tech. University, Hangzhou, 310018, China
2
Zhejiang University of Finance and Economics, Hangzhou, 310018, China
3
Department of Electron and Electric, Longyan University, Longyan, 364000, China
Abstract: Offline handwritten digit recognition (OHDR) is considered as one of difficult problems in the
field of pattern recognition. Because it is a challenging computational problem mainly due to the vast
differences associated with the handwritten patterns of different individuals. In this paper, a novel method
of feature extraction is presented based on structural feature for OHDR by simulating the process of
human recognizing handwritten digit. Firstly state and state value are introduced, then the steps of how to
determine the eigenvalue is explained in detail, last the method is applied in OHDR, and the result show
its effectiveness. © 2010 IEEE.
(10 refs.)
Main Heading: Feature extraction
Controlled terms: Character recognition - Eigenvalues and eigenfunctions - Intelligent control
Uncontrolled terms: Computational problem - Eigen-value - Feature extraction methods - Handwritten
digit - Novel methods - Off-line handwritten - Structural feature
Classification Code:
716 Telecommunication; Radar, Radio and Television - 723 Computer Software,
Data Handling and Applications - 723.4.1 Expert Systems - 921.1 Algebra
Database: Compendex
GM (1,1)Model based on arccot(x) transformation and it's application
Wei, Xiong1; Yang, Aiping2; Dai, Wenzhan1 Source: Proceedings of the World Congress on Intelligent Control
and Automation (WCICA), p 5924-5928, 2010, 2010 8th World Congress on Intelligent Control and Automation,
WCICA 2010; ISBN-13: 9781424467129; DOI: 10.1109/WCICA.2010.5554498; Article number: 5554498;
Conference: 2010 8th World Congress on Intelligent Control and Automation, WCICA 2010, July 7, 2010 - July
9, 2010; Publisher: Institute of Electrical and Electronics Engineers Inc.
Author affiliation:
1
Department of Automatic Control, Zhejiang Sci.-Tech. University, Hangzhou, 310018, China
2
Zhejiang University of Finance and Economics, Hangzhou, 310018, China
Abstract: In this paper, the method of GM (1, 1) modeling based on arccot(x) transformation is put
forward. It is proved that the series after this transformation can not only needs the condition of modeling
GM (1,1), but the smooth degree is much better than that by other transformations, so the method can
widen the range of application of grey mode1. The practical application shows the effectiveness of the
proposed method. © 2010 IEEE.
(7 refs.)
Main Heading: System theory
Controlled terms: Intelligent control
Uncontrolled terms: Discrete data
-
GM (1 , 1)
-
Grey Model
degree - The conditions of building model
Classification Code:
Database: Compendex
731.1 Control Systems - 961 Systems Science
-
Model-based
-
Smooth
Hybrid multi-attribute decision making based on vague sets
Wang, Haixia1; Yang, Aiping2; Dai, Wenzhan1 Source: Proceedings of the World Congress on Intelligent
Control and Automation (WCICA), p 5140-5144, 2010, 2010 8th World Congress on Intelligent Control and
Automation, WCICA 2010; ISBN-13: 9781424467129; DOI: 10.1109/WCICA.2010.5554924; Article number:
5554924; Conference: 2010 8th World Congress on Intelligent Control and Automation, WCICA 2010, July 7,
2010 - July 9, 2010; Publisher: Institute of Electrical and Electronics Engineers Inc.
Author affiliation:
1
Department of Automatic Control, Zhejiang Sci.-Tech. University, Hangzhou, 310018, China
2
Zhejiang University of Finance and Economics, Hangzhou, 310018, China
Abstract: In view of the practical problems in hybrid multi-attribute decision-making, a method based on
vague sets is proposed. Firstly, the qualitative and quantitative indicator values described by linguistic
variables and exact numbers respectively are transformed into vague values. Secondly, a model of
hybrid multi-objective decision making based on vague sets is put forward. Thirdly a novel
comprehensive evaluation index is proposed, by which the meaning of "which is closest to PIS (Positive
Ideal Solution) and farthest from NIS (Negative Ideal Solution)" is expressed and the concrete steps of
hybrid multi-attribute decision making on vague sets is given. Finally, the proposed method is applied into
a case study and the result proves the method is effective. © 2010 IEEE.
(10 refs.)
Main Heading: Decision making
Controlled terms: Intelligent control
Uncontrolled terms: Comprehensive evaluation index - Hybrid multi-attribute decision making - Ideal
solutions
-
Linguistic
variable
-
Multi
attribute
decision
making
-
Multi
objective
decision
making - Practical problems - Quantitative indicators - TOPSIS - Vague sets - Vague values
Classification Code:
Database: Compendex
731.1 Control Systems - 912.2 Management
Exploring injection prevention technologies for security-aware
distributed collaborative manufacturing on the Semantic Web
Yang, Xiaohu1; Chen, Yixi1; Zhang, Wenyu2; Zhang, Shuai2 Source: International Journal of Advanced
Manufacturing Technology, p 1-11, 2010; ISSN: 02683768, E-ISSN: 14333015; DOI:
10.1007/s00170-010-2983-x
Author affiliation:
1
School of Computer Science, Zhejiang University, Hangzhou, 310027, China
2
School of Information, Zhejiang University of Finance and Economics, Hangzhou, 310027, China
Abstract: Security is one of the key challenges for the development of distributed collaborative
manufacturing systems. Most of the access control models of collaborative systems cannot prevent
illegal accesses to column/row levels of a database table, which could be caused by command injection.
This paper firstly presents the possible injection attacks in RDBMS-based collaborative system on the
Semantic Web and gives their classification. Based on this classification, the paper then describes an
attempt at detecting command injections to the distributed collaborative manufacturing systems by
comparing the inputs related nodes that are intended with the resulting parse tree in run time. To validate
the proposed approach, a prototype system called "SemGuard" has been developed. By testing on two
commonly used RDF databases and one real Semantic Web application, it shows that SemGuard is
efficient, taking less than 10 ms overhead to protect the context information of a distributed collaborative
manufacturing system. © 2010 Springer-Verlag London Limited.
(23 refs.)
Main Heading: Semantic Web
Controlled terms: Access control - Computer aided manufacturing - Network security
Uncontrolled terms: Access control models - Collaborative manufacturing - Collaborative manufacturing
system - Collaborative systems - Commonly used - Context information - Database tables - Illegal
Access
-
Parse
trees
-
Prevention
technologies
-
Prototype
system
-
RDF
database - Runtimes - Security-aware - Semantic web applications
Classification Code:
Applications
Database: Compendex
723 Computer Software, Data Handling and Applications
- 723.5 Computer
Advances on stability for switched linear systems
Zhang, Xia1, 2; Gao, Yan3; Xia, Zun-Quan1 Source: Kongzhi yu Juece/Control and Decision, v 25, n 10, p
1441-1450, October 2010; Language: Chinese; ISSN: 10010920; Publisher: Northeast University
Author affiliation:
1
School of Mathematical Sciences, Dalian University of Technology, Dalian 116024, China
2
School of Mathematics and Statistics, Zhejiang University of Finance and Economics, Hangzhou 310018,
China
3
School of Management, University of Shanghai for Science and Technology, Shanghai 200093, China
Abstract: The study of the stability analysis and the switching stabilization for switched linear systems is
a hot topic in recent years. The lately main results about this problem are reviewed in this paper. Firstly,
the primary conclusions of the stability analysis are given for switched linear systems under two cases
such that the arbitrary switching and the restricted switching. Then the main methods for switching
stabilization are presented. Finally, the current results of the practical stability and the finite-time stability
problems for switched systems are outlined, and the development of this research field is forecasted.
(87 refs.)
Main Heading: System stability
Controlled
terms: Differential
equations
-
Electric
grounding
-
Hybrid
computers
-
Hybrid
systems - Linear systems - Lyapunov functions - Stabilization - Switching - Switching systems
Uncontrolled
function
-
terms: Arbitrary
Non-smooth
-
switching
Practical stability
-
Finite
-
time
stability
Research fields
-
-
Multiple
Slow switching
Lyapunov
-
Stability
analysis - Switched linear system - Switched system - Switching stabilization
Classification Code:
951 Materials Science - 921.2 Calculus - 921 Mathematics - 961 Systems
Science - 722.5 Analog and Hybrid Computers - 706 Electric Transmission and Distribution - 704
Electric Components and Equipment - 721.1 Computer Theory, Includes Formal Logic, Automata Theory,
Switching Theory, Programming Theory
Database: Compendex
Numerical differentiation for periodic functions
Zhao, Zhenyu1, 3; Meng, Zehong2 Source: Inverse Problems in Science and Engineering, v 18, n 7, p 957-969,
2010; ISSN: 17415977, E-ISSN: 17415985; DOI: 10.1080/17415977.2010.492517; Publisher: Taylor and
Francis Ltd.
Author affiliation:
1
College of Science, Guangdong Ocean University, Zhanjiang, 524088, China
2
School of Mathematics and Statistics, Zhejiang University of Finance and Economics, Hangzhou, 310018,
China
3
School of Mathematical Sciences, Fudan University, Shanghai, 200433, China
Abstract: In this article we consider the numerical differentiation of periodic functions specified by noisy
data. A new method, which is based on the truncated singular value decomposition (TSVD)
regularization technique of a suitable compact operator, is presented and analysed. It turns out the new
method coincides with some type of truncated Fourier series approach. Numerical examples are also
given to show the efficiency of the method. © 2010 Taylor & Francis.
(14 refs.)
Main Heading: Differentiation (calculus)
Controlled terms: Dynamic loads - Fourier analysis - Fourier series - Harmonic analysis - Problem
solving - Singular value decomposition
Uncontrolled
terms: Ill
posed
problem
-
Numerical
differentiation
methods - Truncated Fourier series - TSVD method
Classification Code:
Database: Compendex
408.1 Structural Design, General - 921 Mathematics
-
Regularization
Analysis of baldder tumor recurrence data with the ternimal event and
cure fraction
Xiao, Cuiliu1; Bing, Yang1; Zhao, Xiaobing2 Source: 2010 4th International Conference on Bioinformatics and
Biomedical Engineering, iCBBE 2010, 2010, 2010 4th International Conference on Bioinformatics and
Biomedical Engineering, iCBBE 2010; ISBN-13: 9781424447138; DOI: 10.1109/ICBBE.2010.5517919; Article
number: 5517919; Conference: 4th International Conference on Bioinformatics and Biomedical Engineering,
iCBBE 2010, June 18, 2010 - June 20, 2010; Sponsor: IEEE Engineering in Medicine and Biology Society;
Sichuan University; Wuhan University; Publisher: IEEE Computer Society
Author affiliation:
1
School of Science, Jiangnan University, 1800 Lihu Road, Wuxi, Jiangsu Province, 214122, China
2
School of Mathematics and Statistics, Zhejiang University of Finance and Economics, Hangzhou, China
Abstract: Complete observation of the recurrent events may not be available, since some subjects might
drop out or fail before the endpoint of observation. However, the assumption of independency of the
recurrent events and the censoring is not realistic in many situations. In this paper, we develop an
innovative model based on the Clayton-Oakes copula function to fit the correlation of these variables.
The joint survival function of the recurrent event times can be obtained through the marginal hazard
functions with copula parameters which measure the degree of dependence and control the association
between these variables. The cure fraction can be concluded into the proposed model as well. An
example of application on bladder tumor recurrence data is re-analyzed to assess the proposed models
and methodologies. © 2010 IEEE.
(15 refs.)
Main Heading: Bioinformatics
Controlled terms: Curing - Tumors
Uncontrolled
terms: Bladder
tumor
-
Clayton
-
Copula
functions
-
Drop-out
-
Hazard
function - Innovative models - Joint survival functions - Recurrent events
Classification
Code:
461.2
Biological
Materials - 903 Information Science
Database: Compendex
Materials
and
Tissue
Engineering
-
815.1
Polymeric
Interval-censored data analysis of gaps between recurrent events with
cure fraction
Yang, Bing1; Xiao, Cuiliu1; Zhao, Xiaobing2 Source: 2010 4th International Conference on Bioinformatics and
Biomedical Engineering, iCBBE 2010, 2010, 2010 4th International Conference on Bioinformatics and
Biomedical Engineering, iCBBE 2010; ISBN-13: 9781424447138; DOI: 10.1109/ICBBE.2010.5518094; Article
number: 5518094; Conference: 4th International Conference on Bioinformatics and Biomedical Engineering,
iCBBE 2010, June 18, 2010 - June 20, 2010; Sponsor: IEEE Engineering in Medicine and Biology Society;
Sichuan University; Wuhan University; Publisher: IEEE Computer Society
Author affiliation:
1
School of Science, Jiangnan University, 1800 Lihu Road, Wuxi, Jiangsu Province, 214122, China
2
School of Mathematics and Statistics, Zhejiang University of Finance and Economics, Hangzhou, China
Abstract: Interval-censored data of gaps between recurrent events arise as the exact gaps can not be
available but only know, such as whether the event time of interest is no later than the examination time.
The recurrent event times subject to this interval censoring are often encountered in epidemiological
studies and clinical trials. In this paper we propose a gaps model which is a derivative of the marginal
rate function of the recurrent events processes. This model can accommodate the cure fraction as well.
The proposed model can be easily extended to the general case, however, for an easy representation,
parametric model is assumed in this paper. As an example of application, the bladder tumor recurrent
event data are reanalyzed by using the proposed model. ©2010 IEEE.
(18 refs.)
Main Heading: Bioinformatics
Controlled terms: Curing - Data reduction
Uncontrolled
terms: Bladder
tumor
-
Censored
data
-
Clinical
trial
-
Epidemiological
studies - Interval censoring - Marginal rates - Parametric models - Recurrent events
Classification Code:
Information Science
Database: Compendex
723.2 Data Processing and Image Processing - 815.1 Polymeric Materials - 903
On the culture integration and innovation of Chinese multi-campus
universities
Hong, Wu1, 2 Source: ICETC 2010 - 2010 2nd International Conference on Education Technology and
Computer, v 2, p V2537-V2540, 2010, ICETC 2010 - 2010 2nd International Conference on Education
Technology and Computer; ISBN-13: 9781424463688; DOI: 10.1109/ICETC.2010.5529326; Article number:
5529326; Conference: 2010 2nd International Conference on Education Technology and Computer, ICETC
2010, June 22, 2010 - June 24, 2010; Sponsor: Int. Assoc. Comput. Sci. Inf. Technol. (IACSIT); Publisher:
IEEE Computer Society
Author affiliation:
1
Economic Development Research Center, Wuhan University, Wu Han, China
2
Zhejiang University of Finance and Economics, Hang Zhou, China
Abstract: The multi-campus culture construction is a process of absorption and abandonment. The old
campus culture is the foundation of the new one and the new one is the succession and development of
the old one. The campus culture construction is a long-term, difficult task, which can not be completed in
a short time. It is necessary to be ready for a long effort and mobile the enthusiasm of all teachers, staff,
students, make full use of the advantages of the new campus, add new contents to the existing campus
culture to create harmonious, consistent, first-class campus culture of the multi-campus university. ©
2010 IEEE.
(5 refs.)
Main Heading: Education
Controlled terms: Competition - Social sciences
Uncontrolled terms: Campus culture - College competitiveness - Multi-campus university
Classification Code:
Database: Compendex
901.2 Education - 911.2 Industrial Economics
The p-maxian problem on block graphs
Kang, Liying1; Cheng, Yukun1, 2 Source: Journal of Combinatorial Optimization, v 20, n 2, p 131-141, August
2010; ISSN: 13826905, E-ISSN: 15732886; DOI: 10.1007/s10878-008-9198-1; Publisher: Springer
Netherlands
Author affiliation:
1
Department of Mathematics, Shanghai University, Shanghai 200444, China
2
School of Mathematics and Statistics, Zhejiang University of Finance and Economics, Hangzhou 310018,
China
Abstract: This paper deals with the p-maxian problem on block graphs with unit edge length. It is shown
that the two points with maximum distance provide an optimal solution for the 2-maxian problem of block
graphs except for K3. It can easily be extended to the p-maxian problem of block graphs. So we solve the
p-maxian problem on block graphs in linear time. © Springer Science+Business Media, LLC 2008.
(11
refs.)
Main Heading: Graphic methods
Uncontrolled terms: Block graphs
-
Edge length
-
Linear time -
Location theory
distance - Obnoxious facilities - Optimal solutions - P-maxian problem - Two-point
Classification Code:
Database: Compendex
902.1 Engineering Graphics
-
Maximum
Improved-grey Verhulst model and its application
Dai, Wenzhan1; Xiong, Wei1; Yang, Aiping2 Source: Huagong Xuebao/CIESC Journal, v 61, n 8, p 2097-2100,
August 2010; Language: Chinese; ISSN: 04381157; Publisher: Chemical Industry Press
Author affiliation:
1
Institute of Automatic Control, Zhejiang Sci-Tech University, Hangzhou 310018, Zhejiang, China
2
Zhejiang University of Finance and Economics, Hangzhou 310018, Zhejiang, China
Abstract: The accuracy of grey Verhulst model greatly depends on background value and model
structure parameter. In this paper, an improved-grey Verhulst model is proposed. Firstly, the cause of
grey Verhulst model's inaccuracy is analyzed. Secondly, the background value is rebuilt by using original
data sequence. Thirdly, model structure parameter is obtained by optimization based on the principle
about information overlap of grey system. Finally, the improved-grey Verhulst modeling is applied for
building the model of national production of crude oil and results show its effectiveness. © All Rights
Reserved.
(15 refs.)
Main Heading: Crude oil
Uncontrolled terms: Background value
-
Data sequences
-
Forecast
Verhulst - Grey Verhulst model - Information overlap - Structure parameter
Classification Code:
Database: Compendex
523 Liquid Fuels
-
Grey systems
-
Grey
Sunny-shady slope effect on the thermal and deformation stability of the
highway embankment in warm permafrost regions
Chou, Yaling1; Sheng, Yu2; Li, Yuwen3; Wei, Zhenming4; Zhu, Yanpeng1; Li, Jinping5 Source: Cold Regions
Science and Technology, v 63, n 1-2, p 78-86, August 2010; ISSN: 0165232X; DOI:
10.1016/j.coldregions.2010.05.001; Publisher: Elsevier
Author affiliation:
1
School of Civil Engineering, Lanzhou University of Technology, Lanzhou 730000, China
2
State key Laboratory of Frozen Soil Engineering, Cold and Arid Regions Environmental and Engineering
Research Institute, Chinese Academy of Sciences, Lanzhou 730000, China
3
School of Business Administration, Zhejiang University of Finance and Economics, Hangzhou 310018,
China
4
Gansu Non-Ferrous Metal Geological Exploration Bureau, Lanzhou 730000, China
5
CCCC First Highway Consultants Co., LTD Xi'an Shaan Xi 710068, China
Abstract: The aim of this study was to investigate how the sunny-shady slope impacts on the thermal and
deformation stability of the highway embankment in warm permafrost region. The investigation was done by
analyzing both the observational geo-temperature and deformation data of the embankment in the
experimental section K369+100 along the National Highway 214 on Qinghai-Tibet Plateau. Also, the
fundamental cause of the embankment transverse asymmetrical thermal regime and asymmetrical deformation
was discussed. The observation data indicates (1) for embankment in warm permafrost regions, the
deformation stability is highly correlated with the thermal stability, and the embankment transverse deformation
is mainly controlled by the ground temperature and its change; (2) the absorbed solar radiation difference
between sunny and shady slopes results in the embankment's transverse thermal difference, which leads to
asymmetrical deformation; and (3) the time of the highest settlement deformation does not coincide with that of
the maximum thaw depth, which means that the development of the embankment deformation lags behind the
development of embankment temperature. For the embankment with differential deformation in transverse
section, the times of the highest settlement deformation on two sides of embankment are different. This
difference lies in that the time of the highest settlement deformation on the sunny side is later than that on the
shady side of the embankment. The differential deformation will be magnified over time, and finally the
embankment stability is engulfed by the longitudinal cracks caused by asymmetric settlement of permafrost. ©
2010 Elsevier B.V. (19 refs.)
Main Heading: Permafrost
Controlled
terms: Deformation
-
Embankments
-
Highway
engineering
-
Hydraulic
structures - Slope stability - Soil mechanics - Soils - Solar radiation - Sun - Temperature
Uncontrolled
soils
-
terms: Deformation
Embankment
stability
stability
-
Differential
-
Experimental
deformation
-
Embankment
section
-
Ground
temperature - Highly-correlated - Highway embankments - Longitudinal cracks - Maximum thaw
depth
-
Observation data
-
Qinghai Tibet plateau
-
Settlement deformation
-
Sunny-shady
slope - Temperature field - Thermal differences - Thermal regimes - Thermal stability - Transverse
deformation - Transverse section - Warm permafrost
Classification Code:
483 Soil Mechanics and Foundations - 483.1 Soils and Soil Mechanics - 483.2
Foundations - 611 Hydroelectric and Tidal Power Plants - 641.1 Thermodynamics - 657.1 Solar Energy
and Phenomena - 657.2 Extraterrestrial Physics and Stellar Phenomena - 446.2 Related Hydraulic
Structures - 405 Construction Equipment and Methods; Surveying - 406 Highway Engineering - 406.2
Roads and Streets - 407.2 Waterways - 421 Strength of Building Materials; Mechanical Properties - 422
Strength of Building Materials; Test Equipment and Methods
Development
Database: Compendex
-
441 Dams and Reservoirs; Hydro
Grey modeling based on cot (xα) transformation and background value
optimization
Dai, Wen-Zhan1; Xiong, Wei1; Yang, Ai-Ping2 Source: Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of
Zhejiang University (Engineering Science), v 44, n 7, p 1368-1372, July 2010; Language: Chinese; ISSN:
1008973X; DOI: 10.3785/j.issn.1008-973X.2010.07.024; Publisher: Zhejiang University Press
Author affiliation:
1
Department of Automatic Control, Zhejiang Sci.-Tech. University, Hangzhou 310018, China
2
School of Foreign Language, Zhejiang University of Finance and Economics, Hangzhou 310018, China
Abstract: The precision of grey model greatly depends on the smooth degree of discrete-time sequence,
and the need of stepwise ratio of discrete sequence must be met. A method of grey modeling based on
cot (xα)(α > 0) transformation and its background value optimization was proposed in case that original
discrete-time sequence can not meet the condition for grey modeling. The discrete-time sequence
F(k)=f(x(k)) transformed by f(x)=cot (xα) can meet the requirements of grey modeling under the condition
of 0.2125 &le f(x) &le π/2, and the smooth degree of F(k) was greatly improved compared with other
transformation functions. Then the background value was rebuilt based on the monotonic rise of
accumulated generating sequence. The sum of the rectangle area and the trapezium area was used to
realize that the negative error was balanced off by the positive error. The rebuilt background value was
more close to the practical value, and the model accuracy was improved. Finally, the step of grey
modeling was given, and the application results showed that it is effective.
(10 refs.)
Main Heading: Models
Controlled terms: Optimization
Uncontrolled
terms: Background
value
-
Discrete
data
-
Discrete-time
sequences
Model - Model accuracy - Rectangle areas - Smooth degree - Transformation functions
-
Grey
Classification Code:
Techniques
902.1
Engineering Graphics
-
921.5
Optimization
Database: Compendex
A new method of training sample selection in text classification
Liao, Yixing1, 2; Pan, Xuezeng1 Source: 2nd International Workshop on Education Technology and Computer
Science, ETCS 2010, v 1, p 211-214, 2010, 2nd International Workshop on Education Technology and
Computer Science, ETCS 2010; ISBN-13: 9780769539874; DOI: 10.1109/ETCS.2010.621; Article number:
5458972; Conference: 2nd International Workshop on Education Technology and Computer Science, ETCS
2010, March 6, 2010 - March 7, 2010; Sponsor: Huazhong Normal University; Huazhong University of Science
and Technology; Research Association of Modern Education and Computer Science; Columbia University;
Wuhan University; Publisher: IEEE Computer Society
Author affiliation:
1
Department of Computer Science and Technology, Zhejiang University, Hangzhou, China
2
Department of Information, Zhejiang University of Finance and Economics, Hangzhou, China
Abstract: Aiming to noise samples in the training dataset, a new method for reducing the amount of
training dataset is proposed in the paper which is applicable to text classification. This method describes
the distribution of training dataset according to the representativeness score of samples in the class they
belong to, so as to show representative samples and noise samples in each class. The new method is
applied on Chinese text dataset provided by Fudan Database Center. The experiments show that the
proposed method can reduce noise samples effectively, improve the performance of classification and
decrease the computational cost. © 2010 IEEE.
(11 refs.)
Main Heading: Classification (of information)
Controlled terms: Computational methods
-
Computer science
-
Cost reduction
-
Education
computing - Engineering education - Text processing
Uncontrolled terms: Chinese text - Computational costs - Data sets - Representative sample - Text
classification - Training dataset - Training sample selection
Classification Code:
921 Mathematics - 912.2 Management - 911.2 Industrial Economics - 903.3
Information Retrieval and Use - 903.1 Information Sources and Analysis - 901.2 Education - 723.5
Computer Applications - 723.2 Data Processing and Image Processing - 723 Computer Software, Data
Handling and Applications - 722 Computer Systems and Equipment - 721.1 Computer Theory, Includes
Formal Logic, Automata Theory, Switching Theory, Programming Theory - 721 Computer Circuits and Logic
Elements - 716.1 Information Theory and Signal Processing
Database: Compendex
Image quality assessment based on the contourlet transform
Li, Junfeng1; Dai, Wenzhan1; Wang, Huijiao1; Yang, Aiping2 Source: CAR 2010 - 2010 2nd International Asia
Conference on Informatics in Control, Automation and Robotics, v 1, p 13-16, 2010, CAR 2010 - 2010 2nd
International Asia Conference on Informatics in Control, Automation and Robotics; ISBN-13: 9781424451937;
DOI: 10.1109/CAR.2010.5456888; Article number: 5456888; Conference: 2010 2nd International Asia
Conference on Informatics in Control, Automation and Robotics, CAR 2010, March 6, 2010 - March 7, 2010;
Sponsor: Hubei University of Education; Huazhong Normal University; Wuhan University; Huazhong Univ. Sci.
Technol., China Intelligent Inf.; Technology Application Research Association; Publisher: IEEE Computer
Society
Author affiliation:
1
Department of Automatic Control, Zhejiang Sci-Tech University, HangZhou, China
2
Foreign Languages School, Zhejiang University of Finance and Economics, HangZhou, China
Abstract: Contourlet transform has excellent properties for image representation, such as
multiresolution, localization and directionality, which are the key characteristics of human vision system.
In this paper, a novel image quality assessment metric based on the characteristics of contourlet
coefficients of images is proposed. Firstly, the original image and the distorted images are decomposed
into several levels by means of contourlet transform respectively. The contourlet coefficients of the
original image and the distorted images are as the referenced matrixes and the comparative matrixes
respectively. Secondly, calculate the correlativity indexes between the referenced matrixes and the
comparative matrixes respectively. Moreover, image quality assessment vector of every distorted image
can be constructed based on the correlativity indexes values and image quality can be assessed.
Performance experiments are made on image quality database with four different distortion types.
Experimental results show that the proposed method improves accuracy and robustness of image quality
prediction. ©2010 IEEE.
(13 refs.)
Main Heading: Image quality
Controlled terms: Fuzzy logic - Information science - Robotics
Uncontrolled terms: Contourlet coefficients
-
Contourlet transform
-
Distorted images
-
Fuzzy
similarity - Human vision systems - Image quality assessment - Image representations - Included
angle cosine - Key characteristics - matrix - Multi-resolutions - Original images - Performance
experiment
Classification Code:
721.1 Computer Theory, Includes Formal Logic, Automata Theory, Switching Theory,
Programming Theory - 731.5 Robotics - 741 Light, Optics and Optical Devices - 903 Information
Science
Database: Compendex
The improvement of PHP algorithm for association rules
Yang, Huansong1; Qin, Suntao2 Source: CAR 2010 - 2010 2nd International Asia Conference on Informatics
in Control, Automation and Robotics, v 3, p 404-407, 2010, CAR 2010 - 2010 2nd International Asia
Conference on Informatics in Control, Automation and Robotics; ISBN-13: 9781424451937; DOI:
10.1109/CAR.2010.5456721; Article number: 5456721; Conference: 2010 2nd International Asia Conference
on Informatics in Control, Automation and Robotics, CAR 2010, March 6, 2010 - March 7, 2010; Sponsor:
Hubei University of Education; Huazhong Normal University; Wuhan University; Huazhong Univ. Sci. Technol.,
China Intelligent Inf.; Technology Application Research Association; Publisher: IEEE Computer Society
Author affiliation:
1
Hangzhou Institute of Service Engineering, Hangzhou Normal University, Hangzhou, Zhejiang, China
2
Information School, Zhejiang University of Finance and Economics, Hangzhou , Zhejiang, China
Abstract: The first step of detecting relating rule is a process at the cost of much system resource, so the
total performance of detecting relating rule is determined by this step. The main goal of existing
algorithms at present is focused on the efficiency of this step. DHP and PHP are included in those
algorithms and these two algorithms are the transmutations of Apriori algorithm to improve its validity.
PHP is developed based on DHP and it saves the CPU running time of DHP effectively. It is useful in
improving the efficiency of detecting relating rule in commercial database by developing PHP algorithms
to reduce the CPU calculating time. ©2010 IEEE.
(8 refs.)
Main Heading: Algorithms
Controlled terms: Associative processing - Information science - Robotics
Uncontrolled terms: Apriori algorithms - Calculating time - Data digging - Running time - System
resources - Total performance
Classification Code:
723 Computer Software, Data Handling and Applications - 723.2 Data Processing
and Image Processing - 731.5 Robotics - 903 Information Science - 921 Mathematics
Database: Compendex
Construction of process-oriented industrial design knowledge map
Liu, Zheng1; Sun, Lingyun1; Lu, Na2 Source: Jixie Gongcheng Xuebao/Journal of Mechanical Engineering, v
46, n 8, p 181-187, April 20, 2010; Language: Chinese; ISSN: 05776686; DOI: 10.3901/JME.2010.08.181;
Publisher: Editorial Office of Chinese Journal of Mechanical
Author affiliation:
1
Modern Industrial Design Institution, Zhejiang University, Hangzhou 310027, China
2
Collage of Arts, Zhejiang University of Finance and Economics, Hangzhou 310028, China
Abstract: The method of building knowledge map for industrial design process is proposed to organize
the industrial design knowledge, which can add innovations of product concept design. By the
investigation on the industrial design process, the design process descriptive model with different
abstract granularity levels is established, which forms the frame of knowledge map. Based on the
concepts system of knowledge node, the structure of input and output are defined. The design
knowledge can be acquired, saved and reused in the uniform by the operation of combination,
decomposition, derivation, insertion and trim. On the one hand, knowledge can be organized by
knowledge map with the operation procedure, which can reduce the chaos of knowledge complexity,
distraction and obscurity, and help to make the design decisions and ideas. On the other hand, visible
knowledge map can be adapted to some kinds of design projects, and integrated with the design
knowledge scenario information of condition, object, procedure, cause and effect, which can reduce the
blindness of design activities with single knowledge area. An application case is introduced to prove the
method. © 2010 Journal of Mechanical Engineering.
(19 refs.)
Main Heading: Structural design
Controlled terms: Industry - Product design
Uncontrolled
terms: Descriptive
Model
-
Design
activity
-
Design
decisions
-
Design
knowledge - Design process - Design projects - Granularity levels - Industrial design - Input and
outputs
-
Knowledge
areas
-
Knowledge
map
-
Knowledge
nodes
-
Operation
procedure - Process-oriented - Product concept design
Classification Code:
408.1 Structural Design, General - 911 Cost and Value Engineering; Industrial
Economics - 912 Industrial Engineering and Management
Manufacturing - 913.1 Production Engineering
Database: Compendex
- 913 Production Planning and Control;
Semidefinite relaxation bounds for bi-quadratic optimization problems
with quadratic constraints
Zhang, Xinzhen1; Ling, Chen2, 3; Qi, Liqun1 Source: Journal of Global Optimization, p 1-19, 2010; ISSN:
09255001, E-ISSN: 15732916; DOI: 10.1007/s10898-010-9545-5
Author affiliation:
1
Department of Applied Mathematics, The Hong Kong Polytechnic University, Hung Hom, Kowloon, Hong
Kong
2
School of Science, Hangzhou Dianzi University, Hangzhou, 310018, China
3
School of Mathematics and Statistics, Zhejiang University of Finance and Economics, Hangzhou, China
Abstract: This paper studies the relationship between the so-called bi-quadratic optimization problem
and its semidefinite programming (SDP) relaxation. It is shown that each r-bound approximation solution
of the relaxed bi-linear SDP can be used to generate in randomized polynomial time an {Mathematical
expression}-approximation solution of the original bi-quadratic optimization problem, where the constant
in {Mathematical expression} does not involve the dimension of variables and the data of problems. For
special cases of maximization model, we provide an approximation algorithm for the considered
problems. © 2010 Springer Science+Business Media, LLC.
(33 refs.)
Main Heading: Polynomial approximation
Controlled terms: Approximation algorithms - Mathematical programming
Uncontrolled terms: Approximation solution - Mathematical expressions - Polynomial-time - Quadratic
constraint - Quadratic optimization problems - Semi-definite programming - Semidefinite relaxation
Classification Code:
Database: Compendex
921 Mathematics - 921.6 Numerical Methods - 922 Statistical Methods
A preemptive-resume stochastic scheduling model with disruption
Tang, Heng-Yong1; Tang, Chun-Hui2; Zhao, Chuan-Li1 Source: Xitong Gongcheng Lilun yu Shijian/System
Engineering Theory and Practice, v 30, n 4, p 751-757, April 2010; Language: Chinese; ISSN: 10006788;
Publisher: Systems Engineering Society of China
Author affiliation:
1
College of Mathematics and Systems Science, Shenyang Normal University, Shenyang 110034, China
2
Business Administration College, Zhejiang University of Finance and Economics, Hangzhou 310018,
China
Abstract: We gave a preemptive-resume stochastic scheduling model with disruption, in witch the
starting time and the duration of the disruption are both stochastic. Minimized objective functions are the
sum of the expected weighted completion times, the sum of the expected weighted tardiness and the
expected weighted number of the tardy jobs. For the problem minimizing the sum of the expected
weighted completion times we showed that under an agreeable condition the problem can be
polynomially solved, if the starting time of disruption is uniformly distributed, the WSPT rule is an optimal
static policy for the problem. A dynamic programminalgorithm is given for a special case in witch the
starting time of the disruption is deterministic. or the problem minimizing the sum of the expected
weighted tardiness and the expected weighted number of the tardy jobs we proved that under an
agreeable condition the problem can be polynomially solved.
(16 refs.)
Main Heading: Stochastic models
Controlled terms: Optimization - Scheduling - Stochastic systems
Uncontrolled
terms: Objective
functions
-
Stochastic
scheduling
-
Tardy
jobs
-
Weighted
completion - Weighted number - Weighted tardiness
Classification
Code:
731.1
Control
Systems
-
912.2
Techniques - 922.1 Probability Theory - 961 Systems Science
Database: Compendex
Management
-
921.5
Optimization
The pos/neg-weighted 1-median problem on tree graphs with
subtree-shaped customers
Cheng, Yukun1, 2; Kang, Liying1; Lu, Changhong3 Source: Theoretical Computer Science, v 411, n 7-9, p
1038-1044, February 28, 2010; ISSN: 03043975; DOI: 10.1016/j.tcs.2009.11.009; Publisher: Elsevier
Author affiliation:
1
Department of Mathematics, Shanghai University, Shanghai, 200444, China
2
School of Mathematics and Statistics, Zhejiang University of Finance and Economics, Hangzhou, 310018,
China
3
Department of Mathematics, East China Normal University, Shanghai, 200241, China
Abstract: In this paper we consider the pos/neg-weighted median problem on a tree graph where the
customers are modeled as continua subtrees. We address the discrete and continuous models, i.e., the
subtrees' boundary points are all vertices, or possibly inner points of an edge, respectively. We consider
two different objective functions. If we minimize the overall sum of the minimum weighted distances of the
subtrees from the facilities, there exists an optimal solution satisfying a generalized vertex optimality
property, e.g., there is an optimal solution such that all facilities are located at vertices or the boundary
points of the subtrees. Based on this property we devise a polynomial time algorithm for the
pos/neg-weighted 1-median problem on a tree with subtree-shaped customers. © 2009 Elsevier B.V. All
rights reserved.
(13 refs.)
Main Heading: Customer satisfaction
Controlled terms: Optimal systems - Polynomial approximation - Sales
Uncontrolled
vertex
solutions
-
terms: 1-Median
Location
theory
Optimality
-
-
Boundary
points
-
Median
problem
Polynomial-time algorithms
-
Continuous
-
-
Objective
Subtrees
-
models
-
Generalized
functions
-
Optimal
Tree graph
-
Weighted
distance - Weighted median
Classification Code:
731.1 Control Systems - 911.4 Marketing - 912 Industrial Engineering and
Management - 921.5 Optimization Techniques - 921.6 Numerical Methods - 961 Systems Science
Database: Compendex
Nonlinear VaR model of FX options portfolio based on multivariate
Laplace distributions
Chen, Rong-Da1, 2; Wang, Chun-Fa2 Source: Xitong Gongcheng Lilun yu Shijian/System Engineering Theory
and Practice, v 30, n 2, p 315-323, February 2010; Language: Chinese; ISSN: 10006788; Publisher: Systems
Engineering Society of China
Author affiliation:
1
School of Management, Zhejiang University, Hangzhou 310058, China
2
School of Finance, Zhejiang University of Finance and Economics, Hangzhou 310018, China
Abstract: To overcome the difficulty in non-linear VaR calculation under heavy-tailed exchange rate
returns, the paper depicts heavy-tailed exchange rate returns using multivariate Laplace distribution, and
settles the moment generating function that reflects the change in FX option portfolio value using the
hazard function transformation technique and the result of approximate calculation about multidimension
Laplace type integral. Moreover, the paper proposes that importance samping technique is developed up
to non-linear VaR model of FX option portfolio when exchange rate returns have multivariate Laplace
distribution. This makes the state not be rare event simulation. Accordingly, this decreases calculating
effort in Monte Carlo simulation. Moreover, the loss probability of portfolio is estimated precisely. The
simulation result shows the algorithm has more much effectiveness of computational efficiency than the
standard Monte Carlo simulation, and can lead to large variance reductions when estimating the loss
(13 refs.)
probability of portfolio.
Main Heading: Monte Carlo methods
Controlled terms: Computational efficiency - Computer simulation - Cosmic ray detectors - Function
evaluation - Laplace transforms - Linear transformations - Value engineering
Uncontrolled
terms: Approximate
calculations
-
Exchange
rates
-
Hazard
function - Heavy-tailed - Laplace distributions - Laplace-type integrals - Loss probability - Moment
generating function - Monte Carlo Simulation - Multidimension - Non-linear - Portfolio value - Rare
event simulation - Simulation result - Variance reductions
Classification Code:
Numerical Methods
944.7 Radiation Measuring Instruments - 922.2 Mathematical Statistics - 921.6
-
921.3 Mathematical Transformations
-
921 Mathematics
-
911.5 Value
Engineering - 723.5 Computer Applications - 723.1 Computer Programming - 657 Space Physics
Database: Compendex
A text classification model based on training sample selection and
feature weight adjustement
Pang, Xuezeng1; Liao, Yixing1, 2 Source: Proceedings - 2nd IEEE International Conference on Advanced
Computer Control, ICACC 2010, v 3, p 294-297, 2010, Proceedings - 2nd IEEE International Conference on
Advanced Computer Control, ICACC 2010; ISBN-13: 9781424458462; DOI: 10.1109/ICACC.2010.5486615;
Article number: 5486615; Conference: 2010 IEEE International Conference on Advanced Computer Control,
ICACC 2010, March 27, 2010 - March 29, 2010; Sponsor: Int. Assoc. Comput. Sci. Inf. Technol. (IACSIT);
Institute of Electrical and Electronics Engineers (IEEE); Publisher: IEEE Computer Society
Author affiliation:
1
Department of Computer Science and Technology, Zhejiang University, Hangzhou, China
2
Department of Information, Zhejiang University of Finance and Economics, Hangzhou, China
Abstract: A new text classification model based on training samples selection and feature weight
adjustment is presented. First it computes representativeness score of samples so as to distinguish noise
samples from original training samples. Then a feature weight adjustment taking inter-class distribution
and intra-class distribution into consideration is used to further improve the performance of text
classification. The presented text classification model is applied on Chinese text dataset provided by
Fudan Database Center. The experiments show that the proposed model can improve the performance
of text classification to some extent with fewer training samples and fewer feature dimensions. © 2010
IEEE.
(13 refs.)
Main Heading: Text processing
Controlled terms: Classification (of information) - Feature extraction
Uncontrolled terms: Chinese text - Class distributions - Data sets - Feature dimensions - Feature
weight
-
Representativeness score
-
Text classification models
-
Textclassification
-
Training
dataset - Training sample - Training sample selection
Classification Code:
716 Telecommunication; Radar, Radio and Television - 716.1 Information Theory
and Signal Processing - 723.5 Computer Applications
Database: Compendex
SWMRD: A Semantic Web-based manufacturing resource discovery
system for cross-enterprise collaboration
Cai, M.1; Zhang, W.Y.2; Chen, G.1; Zhang, K.1; Li, S.T.1 Source: International Journal of Production
Research, v 48, n 12, p 3445-3460, January 2010; ISSN: 00207543, E-ISSN: 1366588X; DOI:
10.1080/00207540902814330; Publisher: Taylor and Francis Ltd.
Author affiliation:
1
School of Computer Science, Zhejiang University, Hangzhou 310027, China
2
School of Information, Zhejiang University of Finance and Economics, Hangzhou 310018, China
Abstract: As supply chains are becoming ever more global and agile in the modern manufacturing era, enterprises are
increasingly dependent upon the efficient and effective discovery of shared manufacturing resources provided by their
partners, wherever they are. Enterprises are thus faced with increasing challenges caused by the technical difficulties and
ontological issues in manufacturing interoperability and integration over heterogeneous computing platforms. This paper
presents a prototype intelligent system SWMRD (Semantic Web-based manufacturing resource discovery) for distributed
manufacturing collaboration across ubiquitous virtual enterprises. Ontology-based annotation to the distributed manufacturing
resources via a new, multidisciplinary manufacturing ontology is proposed on the semantic web to convert resources into
machine understandable knowledge, which is a prelude to the meaningful resource discovery for cross-enterprise
multidisciplinary collaboration. An ontology-based multi-level knowledge retrieval model is devised to extend the traditional
information retrieval approaches based on keyword search, with integrated capabilities of graph search, semantic search,
fuzzy search and automated reasoning to realise the intelligent discovery of manufacturing resources, e.g. to facilitate more
flexible, meaningful, accurate and automated resource discovery. A case study for intelligent discovery of manufacturing
resources is used to demonstrate the practicality of the developed system. © 2010 Taylor & Francis. (17 refs.)
Main Heading: Semantic Web
Controlled
systems
terms: Automata
-
Interoperability
-
theory
Natural
-
Flexible
manufacturing
language processing systems
-
systems
Ontology
-
-
Intelligent
Semantics
-
Supply
chains - Virtual corporation
Uncontrolled terms: Automated reasoning
search
retrieval
-
Heterogeneous
-
computing
Manufacturing
ontology
-
-
Distributed manufacturing
Information
-
retrieval
Manufacturing
-
Enterprise collaboration
approach
resource
-
Keyword
search
Multi-level
-
-
-
Graph
Knowledge
Multidisciplinary
collaboration - Ontology-based - Ontology-based annotation - Resource discovery - Resource sharing - Semantic
search - Technical difficulties - Virtual enterprise
Classification Code:
913.4.1 Flexible Manufacturing Systems
-
903 Information Science
-
903.2 Information
Dissemination - 911.3 Inventory Control - 912 Industrial Engineering and Management - 912.2 Management - 913
Production Planning and Control; Manufacturing - 723.4 Artificial Intelligence - 723 Computer Software, Data Handling
and Applications - 721.1 Computer Theory, Includes Formal Logic, Automata Theory, Switching Theory, Programming
Theory - 718 Telephone Systems and Related Technologies; Line Communications - 717 Optical Communication - 716
Telecommunication; Radar, Radio and Television - 723.2 Data Processing and Image Processing
Database: Compendex
Weaving an agent-based Semantic Grid for distributed collaborative
manufacturing
Yin, J.W.1; Zhang, W.Y.2; Cai, M.1 Source: International Journal of Production Research, v 48, n 7, p
2109-2126, January 2010; ISSN: 00207543, E-ISSN: 1366588X; DOI: 10.1080/00207540802582870;
Publisher: Taylor and Francis Ltd.
Author affiliation:
1
School of Computer Science, Zhejiang University, Hangzhou, China
2
School of Information, Zhejiang University of Finance and Economics, Hangzhou, China
Abstract: The development and maintenance of distributed collaborative manufacturing systems is
faced with increasing challenges caused by the technical difficulties and ontological issues in distributed
computing, resource integration and knowledge sharing over heterogeneous computing platforms. This
paper presents an agent-based Semantic Grid for distributed manufacturing collaboration across
ubiquitous virtual enterprises. A hierarchy of autonomous, adaptive agents forming a 'super peer' based
peer-to-peer network is laid out in the Semantic Grid to provide, in an open, dynamic, loosely coupled
and scalable manner, the service publication, discovery and reuse for management of applications that
need to utilise Grid resources. The operation and experimental evaluation of the system are presented to
(29 refs.)
validate the implementation of the proposed approach. © 2010 Taylor & Francis.
Main Heading: Peer to peer networks
Controlled terms: Autonomous agents
-
Computer aided manufacturing
-
Distributed computer
systems - Knowledge acquisition - Ontology - Semantics - Virtual corporation
Uncontrolled terms: Adaptive agents - Agent based - Collaborative manufacturing - Collaborative
manufacturing
system
evaluation
Grid
-
-
Distributed
resource
-
Computing
Heterogeneous
-
Distributed
computing
-
manufacturing
-
Knowledge-sharing
Experimental
-
Resource
integration - Semantic Grid - Service publication - Super-peer - Technical difficulties - Virtual
enterprise
Classification Code:
Science
-
731.5
912.2 Management
Robotics
-
913.4.2
-
903.2 Information Dissemination
Computer
Aided
Manufacturing
-
903 Information
723.5
Computer
Applications - 723 Computer Software, Data Handling and Applications - 722.4 Digital Computers and
Systems - 722 Computer Systems and Equipment - 723.4 Artificial Intelligence
Database: Compendex
The p-maxian problem on interval graphs
Cheng, Yukun1, 2; Kang, Liying1 Source: Discrete Applied Mathematics, v 158, n 18, p 1986-1993, 2010; ISSN:
0166218X; DOI: 10.1016/j.dam.2010.08.021; Publisher: Elsevier
Author affiliation:
1
Department of Mathematics, Shanghai University, Shanghai 200444, China
2
School of Mathematics and Statistics, Zhejiang University of Finance and Economics, Hangzhou 310018,
China
Abstract: This paper deals with the p-maxian problem on interval graphs where each interval has a
positive weight. First we propose a linear time algorithm which is similar to the algorithm of
Bespamyatnikh for the unweighted 1-median problem on interval graphs to solve the weighted 1-maxian
problem. For a 2-maxian problem, we show that two intervals with the minimum right endpoint and the
maximum left endpoint, respectively, are an optimal solution. It can be easily extended to the p-maxian
problem (p<3). © 2010 Elsevier B.V. All rights reserved.
Uncontrolled
terms: 1-Median
-
Interval
graph
(19 refs.)
-
Linear-time
theory - Obnoxious facilities - Optimal solutions - p-maxian problem
Database: Compendex
algorithms
-
Location
A multi-watermarking method for 3D meshes
Feng, Xiaoqing1, 2; Pan, Zhigeng1; Li, Li3 Source: Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of
Computer-Aided Design and Computer Graphics, v 22, n 1, p 17-23+29, January 2010; Language: Chinese;
ISSN: 10039775; Publisher: Institute of Computing Technology
Author affiliation:
1
State Key Laboratory of CAD and CG, Zhejiang University, Hangzhou 310058, China
2
Institute of Computer Application Techniques, College of Information, Zhejiang University of Finance and
Economics, Hangzhou 310018, China
3
Hangzhou Institute of Electronic Engineering, Hangzhou 310018, China
Abstract: Since single blind watermarking scheme is difficult to resist against various attacks, a robust
multi-watermarking is proposed based on 3D mesh model in this paper. In this scheme, two kinds of
watermarks are embedded respectively into vertexes coordinates and topological information of 3D mesh,
which enables the model to resist against not only large scaled cropping operation but also high strong
noising. During the extraction of the watermark, the original model is not necessary. Experimental results
show that the multi-watermark method can effectively increase the ability of resisting attacks, such as
translation, rotating, scaling, un-scaling, cutting, noising, re-ordering etc.
(21 refs.)
Main Heading: Three dimensional
Controlled terms: Coordinate measuring machines - Watermarking
Uncontrolled terms: 3-D mesh models
-
3D meshes
-
Blind watermarking scheme
-
Original
model - Polar coordinate systems - Topological information - Various attacks
Classification Code:
723.5 Computer Applications
-
Engineering Graphics - 943.3 Special Purpose Instruments
Database: Compendex
811.1.1 Papermaking Processes
-
902.1