Revista y Edición

Volumen 22 (2022): Edición 3 (September 2022)

Volumen 22 (2022): Edición 2 (June 2022)

Volumen 22 (2022): Edición 1 (March 2022)

Volumen 21 (2021): Edición 4 (December 2021)

Volumen 21 (2021): Edición 3 (September 2021)

Volumen 21 (2021): Edición 2 (June 2021)

Volumen 21 (2021): Edición 1 (March 2021)

Volumen 20 (2020): Edición 6 (December 2020)
Special Edición on New Developments in Scalable Computing

Volumen 20 (2020): Edición 5 (December 2020)
Special issue on Innovations in Intelligent Systems and Applications

Volumen 20 (2020): Edición 4 (November 2020)

Volumen 20 (2020): Edición 3 (September 2020)

Volumen 20 (2020): Edición 2 (June 2020)

Volumen 20 (2020): Edición 1 (March 2020)

Volumen 19 (2019): Edición 4 (November 2019)

Volumen 19 (2019): Edición 3 (September 2019)

Volumen 19 (2019): Edición 2 (June 2019)

Volumen 19 (2019): Edición 1 (March 2019)

Volumen 18 (2018): Edición 5 (May 2018)
Special Thematic Edición on Optimal Codes and Related Topics

Volumen 18 (2018): Edición 4 (November 2018)

Volumen 18 (2018): Edición 3 (September 2018)

Volumen 18 (2018): Edición 2 (June 2018)

Volumen 18 (2018): Edición 1 (March 2018)

Volumen 17 (2017): Edición 5 (December 2017)
Special Edición With Selected Papers From The Workshop “Two Years Avitohol: Advanced High Performance Computing Applications 2017

Volumen 17 (2017): Edición 4 (November 2017)

Volumen 17 (2017): Edición 3 (September 2017)

Volumen 17 (2017): Edición 2 (June 2017)

Volumen 17 (2017): Edición 1 (March 2017)

Volumen 16 (2016): Edición 6 (December 2016)
Special issue with selection of extended papers from 6th International Conference on Logistic, Informatics and Service Science LISS’2016

Volumen 16 (2016): Edición 5 (October 2016)
Edición Title: Special Edición on Application of Advanced Computing and Simulation in Information Systems

Volumen 16 (2016): Edición 4 (December 2016)

Volumen 16 (2016): Edición 3 (September 2016)

Volumen 16 (2016): Edición 2 (June 2016)

Volumen 16 (2016): Edición 1 (March 2016)

Volumen 15 (2015): Edición 7 (December 2015)
Special Edición on Information Fusion

Volumen 15 (2015): Edición 6 (December 2015)
Special Edición on Logistics, Informatics and Service Science

Volumen 15 (2015): Edición 5 (April 2015)
Special Edición on Control in Transportation Systems

Volumen 15 (2015): Edición 4 (November 2015)

Volumen 15 (2015): Edición 3 (September 2015)

Volumen 15 (2015): Edición 2 (June 2015)

Volumen 15 (2015): Edición 1 (March 2015)

Volumen 14 (2014): Edición 5 (December 2014)
Special Edición

Volumen 14 (2014): Edición 4 (December 2014)

Volumen 14 (2014): Edición 3 (September 2014)

Volumen 14 (2014): Edición 2 (June 2014)

Volumen 14 (2014): Edición 1 (March 2014)

Volumen 13 (2013): Edición Special-Edición (December 2013)

Volumen 13 (2013): Edición 4 (December 2013)
The publishing of the present issue (Volumen 13, No 4, 2013) of the journal “Cybernetics and Information Technologies” is financially supported by FP7 project “Advanced Computing for Innovation” (ACOMIN), grant agreement 316087 of Call FP7 REGPOT-2012-2013-1.

Volumen 13 (2013): Edición 3 (September 2013)

Volumen 13 (2013): Edición 2 (June 2013)

Volumen 13 (2013): Edición 1 (March 2013)

Volumen 12 (2012): Edición 4 (December 2012)

Volumen 12 (2012): Edición 3 (September 2012)

Volumen 12 (2012): Edición 2 (June 2012)

Volumen 12 (2012): Edición 1 (March 2012)

Detalles de la revista
Formato
Revista
eISSN
1314-4081
ISSN
1314-4081
Publicado por primera vez
13 Mar 2012
Periodo de publicación
4 veces al año
Idiomas
Inglés

Buscar

Volumen 13 (2013): Edición Special-Edición (December 2013)

Detalles de la revista
Formato
Revista
eISSN
1314-4081
ISSN
1314-4081
Publicado por primera vez
13 Mar 2012
Periodo de publicación
4 veces al año
Idiomas
Inglés

Buscar

16 Artículos
Acceso abierto

Preface

Publicado en línea: 31 Dec 2013
Páginas: 3 - 4

Resumen

Acceso abierto

Research of the Optimization of a Data Mining Algorithm Based on an Embedded Data Mining System

Publicado en línea: 31 Dec 2013
Páginas: 5 - 17

Resumen

Abstract

At present most of the data mining systems are independent with respect to the database system, and data loading and conversion take much time. The running time of the algorithms in a data mining process is also long. Although some optimized algorithms have improved it in different aspects, they could not improve the efficiency to a large extent when many duplicate records are available in a database. Solving the problem of improving the efficiency of data mining in the presence of many coinciding records in a database, an Apriori optimized algorithm is proposed. Firstly, a new concept of duplication and use is suggested to remove and count the same records, in order to generate a new database of a small size. Secondly, the original database is compressed according to the users’ requirements. At last, finding the frequent item sets based on binary coding, strong association rules are obtained. The structure of the data mining system based on an embedded database has also been designed in this paper. The theoretical analysis and experimental verification prove that the optimized algorithm is appropriate and the algorithm application in an embedded data mining system can further improve the mining efficiency.

Keywords

  • Embedded database
  • data mining
  • association rules
  • Apriori algorithm
  • duplication
  • frequent item sets
Acceso abierto

The Regional Medical Business Process Optimization Based on Cloud Computing Medical Resources Sharing Environment

Publicado en línea: 31 Dec 2013
Páginas: 18 - 29

Resumen

Abstract

The paper elaborates some basic concepts, for example, cloud computing, medical resources sharing, business process optimization, and then points out the problems in the development process of regional health informatization. However, there are many good characteristics and advantages in cloud computing. If cloud computing can be used in the construction of regional health informatization, the problems like insufficient medical resources sharing, paying fees several times, repeated checkup, long hospitalization period, can be efficiently solved. So we put forward cloud computing service mode and research the architecture of regional medical collaborative cloud computing platform. It can realize medical resources sharing. We have a further study about business process optimization based on cloud computing medical resources sharing environment and find out that it can reduce repeated checkup, shorten hospitalization period, and so on.

Keywords

  • Information management
  • cloud computing
  • medical resource sharing
  • regional health informatization
  • regional medical collaborative cloud computing platform
  • business process optimization of regional medical treatment
Acceso abierto

Cross-Organization Workflow Research of Agile Telecom on Positive Feedback

Publicado en línea: 31 Dec 2013
Páginas: 30 - 40

Resumen

Abstract

In order to promote the core competitive power in telecom operating enterprises that face market fine operations, this article compares ECTA mode (Extension Case Transmission Mode) and LCA mode (Loosen Couple Mode). By comparing LCA mode with ECTA mode, we can find out the conditions, in which these two modes are appropriate. Besides, we can keep the semantics of the public flow mode and do our best to modernize the workflow by improving the task complexity, information transparency and operating controllability of LCA mode through a positive feedback system and by improving ECTA mode through a Petri net system.

Keywords

  • Cross-organization workflow
  • LCA mode
  • ECTA mode
  • positive feedback
  • Petri net
Acceso abierto

A New Privacy Preserving Association Rule Mining Algorithm Based on Hybrid Partial Hiding Strategy

Publicado en línea: 31 Dec 2013
Páginas: 41 - 50

Resumen

Abstract

Data mining is the progress of automatically discovering high level data and trends in large amounts of data that would otherwise remain hidden. In order to improve the privacy preservation of association rule mining, a hybrid partial hiding algorithm (HPH) is proposed. The original data set can be interfered and transformed by different random parameters. Then, the algorithm of generating frequent items based on HPH is presented. Finally, it can be proved that the privacy of HPH algorithm is better than that of the original algorithm.

Keywords

  • Data mining
  • association rule
  • privacy preservation
Acceso abierto

Network Threat Identification and Analysis Based on a State Transition Graph

Publicado en línea: 31 Dec 2013
Páginas: 51 - 61

Resumen

Abstract

With the rapid popularity of Internet and information technology, local area network is becoming insecure. Along with the improving advantages, security threats are emerging continually and bringing great pressure and challenges. An identification and analysis method for network real-time threats is proposed to accurately assess and master the current network security situation, and thereby preferably guide a dynamic defense. This method recognizes the current threats and predicts the subsequent threats by modeling attack scenarios and simulating attack state transferring. The threat identification model is called Attack State Transition Graph and Real-Time Attack State Graph, which is constructed by an Expanded Finite-State Automata. Based on the former possible threat paths, the state transitions can be illustrated and based on the latter, actually successful threats and threat paths are described. Then a threat identification algorithm is presented based on the above model. With this algorithm, various invalid threats are filtered; current valid threats are obtained by correlating the dynamic alarms with a static attack scenario. Further on, combining the Attack State Transition Graph with a Real-Time Attack State Graph, a possible next threat and a threat path can be identified and an attack target can also be predicted. Finally, the simulated results in an experimental network verify the feasibility and validity of the model and algorithm. This method provides a novel solution to evaluate and analyze the network security situation.

Keywords

  • Network security
  • threat
  • attack
  • state transition
  • graph
Acceso abierto

Multi-Attribute Decision Making Based on Attribute Importance Degree and Case-Based Reasoning

Publicado en línea: 31 Dec 2013
Páginas: 62 - 74

Resumen

Abstract

To tackle a multi-attribute decision making problem, rough set and casebased reasoning are often combined. However, the reduction in a rough set is always complex. In this paper we provide a new relative importance measure about the unitary attributes values by ranking the relative importance of the attributes in the rough set theory. A new rough set model based on ranking the relative importance of the attributes is built and its properties are studied. Then unitary attributes values are utilized to compute the similarity of rules in case-based reasoning, for there might be incompletely match or miss values. A new multiattribute decision making based on case-based reasoning and a rough set based on the ranking relative importance of the attributes is constructed, which obtains rules, avoiding reduction and rule extraction.

Keywords

  • Multi-attribute decision-making
  • case-based reasoning
  • rough set
  • relative position region
  • attribute importance
Acceso abierto

A Negotiation Framework for Managing the Requirements Changes

Publicado en línea: 31 Dec 2013
Páginas: 75 - 87

Resumen

Abstract

The consistent system requirements set is the basis of successful software projects. The requirements change is very usual in a software project, and it may cause inconsistency of the requirements set, and become the key factor that affects the quality of the requirements and the software. Aiming at the problem of requirements inconsistencies caused by the requirements change, this paper proposes a compromise-based negotiation framework to manage the requirements changes, illustrates the efficiency of the proposed method by a software engineering case, gives a contrast experiment with the current mainstream method, and finally gives a comparison with the related work and a conclusion. The experimental results show that the framework proposed in this paper is more flexible and accurate than the results of the current popular framework, so it is more suitable for the requirement changes management.

Acceso abierto

Distributed Energy Balance Clustering Algorithm in Wireless Sensor Networks

Publicado en línea: 31 Dec 2013
Páginas: 88 - 99

Resumen

Abstract

The traditional clustering algorithm of Low-Energy Adaptive Clustering Hierarchy (LEACH) does not care about the residual energy of the cluster heads and the distance relationship of each node in the wireless sensor networks (WSNs). Each new round the cluster head is changed without any concern about the residual energy of the current cluster head, and the nodes join into a new cluster head without concern about the distance factor and the residual energy factor of all nodes in WSNs. To solve these problems in LEACH, this paper puts forward a distributed energy balance clustering algorithm, which takes into full consideration the residual energy of the cluster heads and the distance relationship between the base station and the cluster heads. The experimental results indicate that the proposed distributed energy balance clustering algorithm can prolong the lifetime of the networks more than LEACH, and the number of messages for selecting a new cluster head at the same time can be greatly reduced, which proves it as more suitable for practical applications.

Keywords

  • Wireless sensor networks
  • Low-Energy Adaptive Clustering Hierarchy
  • residual energy
  • distance relationship
  • distributed energy balance clustering algorithm
Acceso abierto

Research on Profit Distribution of Software Outsourcing Alliances Based on the Improved Shapley Value Model

Publicado en línea: 31 Dec 2013
Páginas: 100 - 109

Resumen

Abstract

With the development of software outsourcing industry, there is a growing trend to establish the software outsourcing alliances. Whether alliances’ profit distribution is reasonable affects directly and significantly alliances’ stability. This paper introduces the Shapley value method which is a common profit distribution method applicable to multiple people cooperation. Due to the weakness of the Shapley value method, AHP is used to analyze the influence factors and adjust the model. The anticipated outcome of the result is to provide a theoretical support for the profit distribution of the software outsourcing alliances in the future.

Keywords

  • Software outsourcing
  • alliance
  • profit
  • distribution
  • Shapley value
  • AHP (Analytic Hierarchy Process)
Acceso abierto

Synergic Relationship and Synergic Degree between an Information System and Corporate Strategy

Publicado en línea: 31 Dec 2013
Páginas: 110 - 121

Resumen

Abstract

With the development of information technology, the Information System (IS) has not the characters of rareness and inimitability, so an IS cannot form core competence alone. Forming synergic relationship and keeping higher synergic degree between IS and corporate strategy will help the enterprises acquire competence advantage and realize IS value. This paper analyzes the conditions of forming synergic relationship between an IS and strategy, and points out that the key factors for a synergic degree are the strategy rationality and the matching degree between the IS and strategy. Based on the analysis result and BCG growth share matrix, this paper constructed a synergy degree measure model to evaluate the synergic relationship between the IS and corporate strategy. Finally, a case study is used to verify the feasibility of the model.

Keywords

  • Information System (IS)
  • corporate strategy
  • synergic relationship
  • BCG Growth Share Matrix
  • synergy degree
Acceso abierto

UARR: A Novel Similarity Measure for Collaborative Filtering Recommendation

Publicado en línea: 31 Dec 2013
Páginas: 122 - 130

Resumen

Abstract

User similarity measurement plays a key role in collaborative filtering recommendation which is the most widely applied technique in recommender systems. Traditional user-based collaborative filtering recommendation methods focus on absolute rating difference of common rated items while neglecting the relative rating level difference to the same items. In order to overcome this drawback, we propose a novel user similarity measure which takes into account the degree of rating the level gap that users could accept. The results of collaborative filtering recommendation based on User Acceptable Rating Radius (UARR) on a real movie rating data set, the MovieLens data set, prove to generate more accurate prediction results compared to the traditional similarity methods.

Keywords

  • Collaborative filtering
  • recommender system
  • user similarity measurement
  • User Acceptable Rating Radius (UARR)
Acceso abierto

Evaluation of Strategies in the Process of China’s City Informatization Using the AHP Method

Publicado en línea: 31 Dec 2013
Páginas: 131 - 142

Resumen

Abstract

Informatization is the new power for urban management innovation -- the tools to enhance the quality of life for citizens and the new ways to improve government services. However, there are many problems in the informatization construction process of the Chinese cities, such as poor level design, hard effects than to soft, the lack of features, poor e-government function and information collaboration. This paper analyzes the problems in the informatization construction of Chinese cities, combined with advances in information network technology, social needs, and some city informatization instances, proposes development tactics of Chinese city informatization. Ultimately, AHP and ISM has been used to analyze the numerical value of different plans, carrying out the best plan under the criterion.

Keywords

  • City informatization
  • strategy hierarchy model assess
Acceso abierto

A Case Study of Question Answering in Automatic Tourism Service Packaging

Publicado en línea: 31 Dec 2013
Páginas: 143 - 152

Resumen

Abstract

While Web Question Answering System (WQAS) has made great progress in Internet currently, a major limitation of the information sources that current WQASs are using is limited to static page texts. Content information that many users-are interested in, is provided dynamically to Web through programs. Web services are becoming the dominant forms of such sorts of programs. In this paper, a novel model is proposed to address the problem of natural language answering based Web services. The expansions of OWL-S are used to describe the services, and predicate tuples retrieved from questions are matched to the services by PROLOG reasoning. To plan the services, SHOP2 planner is introduced in our architecture, which adopts a semantic Web for content modeling, logic grammar for question parsing, and Hierarchical Task Network (HTN) for user query problem solving. A case study in e-Tourism domain is investigated, which implements dynamic packaging for tourism products.

Keywords

  • WQA
  • Semantic web service
  • HTN
  • e-Tourism
Acceso abierto

A Cloud Computing Service Architecture of a Parallel Algorithm Oriented to Scientific Computing with CUDA and Monte Carlo

Publicado en línea: 31 Dec 2013
Páginas: 153 - 166

Resumen

Abstract

The GPGPU (General Purpose Graphics Processing Units) have become a whole new area for research due to the fast development of GPU hardware and programming tools, such as CUDA (Compute Unified Device Architecture). Here we have made a research on CUDA and its applications in the field of scientific computation, as organ electronics. We propose one solution of the parallel computation in global optimization of the physical characteristics in organ electronics with Monte Carlo, and one cloud service architecture for parallel computation of organ electronics was designed. Finally, one case of computing the organ molecule moving orbit was implemented based on the above solution and architecture, and has got a good display by the cloud service.

Keywords

  • CUDA
  • GPU
  • Monte Carlo
  • cloud computing
  • scientific computing
Acceso abierto

An Enterprise IT Service Quality Model (EISQM) Based on Service Interaction and Its Empirical Research

Publicado en línea: 31 Dec 2013
Páginas: 167 - 177

Resumen

Abstract

The respondents’ perspective on service interaction is an important design consideration in service quality evaluations. In Information Technology (IT) field, the enterprise IT service, unlike the traditional service, entails more service interaction, evolving the interactions between the service users and IT department, the interactions between the service users and IT system. The importance of evaluating the enterprise IT service quality has been discussed for several decades. However, there is no universal agreement on the enterprise IT service quality model. This research, taking a cognitive approach, seeks to construct an enterprise IT service quality model based on the service interaction theory. Based on relative literature, we propose a two-dimensional model: human delivered service and system delivered service quality. Following a psychometric procedure, we have collected data and analyzed the construction of the model. The result shows that the enterprise IT service quality measurement instrument has been developed and validated. This model has provided theoretical support for IT service providers to measure users’ satisfaction and improve the service quality.

Keywords

  • IT service
  • service quality
  • IT management
  • service interaction
  • quality management
16 Artículos
Acceso abierto

Preface

Publicado en línea: 31 Dec 2013
Páginas: 3 - 4

Resumen

Acceso abierto

Research of the Optimization of a Data Mining Algorithm Based on an Embedded Data Mining System

Publicado en línea: 31 Dec 2013
Páginas: 5 - 17

Resumen

Abstract

At present most of the data mining systems are independent with respect to the database system, and data loading and conversion take much time. The running time of the algorithms in a data mining process is also long. Although some optimized algorithms have improved it in different aspects, they could not improve the efficiency to a large extent when many duplicate records are available in a database. Solving the problem of improving the efficiency of data mining in the presence of many coinciding records in a database, an Apriori optimized algorithm is proposed. Firstly, a new concept of duplication and use is suggested to remove and count the same records, in order to generate a new database of a small size. Secondly, the original database is compressed according to the users’ requirements. At last, finding the frequent item sets based on binary coding, strong association rules are obtained. The structure of the data mining system based on an embedded database has also been designed in this paper. The theoretical analysis and experimental verification prove that the optimized algorithm is appropriate and the algorithm application in an embedded data mining system can further improve the mining efficiency.

Keywords

  • Embedded database
  • data mining
  • association rules
  • Apriori algorithm
  • duplication
  • frequent item sets
Acceso abierto

The Regional Medical Business Process Optimization Based on Cloud Computing Medical Resources Sharing Environment

Publicado en línea: 31 Dec 2013
Páginas: 18 - 29

Resumen

Abstract

The paper elaborates some basic concepts, for example, cloud computing, medical resources sharing, business process optimization, and then points out the problems in the development process of regional health informatization. However, there are many good characteristics and advantages in cloud computing. If cloud computing can be used in the construction of regional health informatization, the problems like insufficient medical resources sharing, paying fees several times, repeated checkup, long hospitalization period, can be efficiently solved. So we put forward cloud computing service mode and research the architecture of regional medical collaborative cloud computing platform. It can realize medical resources sharing. We have a further study about business process optimization based on cloud computing medical resources sharing environment and find out that it can reduce repeated checkup, shorten hospitalization period, and so on.

Keywords

  • Information management
  • cloud computing
  • medical resource sharing
  • regional health informatization
  • regional medical collaborative cloud computing platform
  • business process optimization of regional medical treatment
Acceso abierto

Cross-Organization Workflow Research of Agile Telecom on Positive Feedback

Publicado en línea: 31 Dec 2013
Páginas: 30 - 40

Resumen

Abstract

In order to promote the core competitive power in telecom operating enterprises that face market fine operations, this article compares ECTA mode (Extension Case Transmission Mode) and LCA mode (Loosen Couple Mode). By comparing LCA mode with ECTA mode, we can find out the conditions, in which these two modes are appropriate. Besides, we can keep the semantics of the public flow mode and do our best to modernize the workflow by improving the task complexity, information transparency and operating controllability of LCA mode through a positive feedback system and by improving ECTA mode through a Petri net system.

Keywords

  • Cross-organization workflow
  • LCA mode
  • ECTA mode
  • positive feedback
  • Petri net
Acceso abierto

A New Privacy Preserving Association Rule Mining Algorithm Based on Hybrid Partial Hiding Strategy

Publicado en línea: 31 Dec 2013
Páginas: 41 - 50

Resumen

Abstract

Data mining is the progress of automatically discovering high level data and trends in large amounts of data that would otherwise remain hidden. In order to improve the privacy preservation of association rule mining, a hybrid partial hiding algorithm (HPH) is proposed. The original data set can be interfered and transformed by different random parameters. Then, the algorithm of generating frequent items based on HPH is presented. Finally, it can be proved that the privacy of HPH algorithm is better than that of the original algorithm.

Keywords

  • Data mining
  • association rule
  • privacy preservation
Acceso abierto

Network Threat Identification and Analysis Based on a State Transition Graph

Publicado en línea: 31 Dec 2013
Páginas: 51 - 61

Resumen

Abstract

With the rapid popularity of Internet and information technology, local area network is becoming insecure. Along with the improving advantages, security threats are emerging continually and bringing great pressure and challenges. An identification and analysis method for network real-time threats is proposed to accurately assess and master the current network security situation, and thereby preferably guide a dynamic defense. This method recognizes the current threats and predicts the subsequent threats by modeling attack scenarios and simulating attack state transferring. The threat identification model is called Attack State Transition Graph and Real-Time Attack State Graph, which is constructed by an Expanded Finite-State Automata. Based on the former possible threat paths, the state transitions can be illustrated and based on the latter, actually successful threats and threat paths are described. Then a threat identification algorithm is presented based on the above model. With this algorithm, various invalid threats are filtered; current valid threats are obtained by correlating the dynamic alarms with a static attack scenario. Further on, combining the Attack State Transition Graph with a Real-Time Attack State Graph, a possible next threat and a threat path can be identified and an attack target can also be predicted. Finally, the simulated results in an experimental network verify the feasibility and validity of the model and algorithm. This method provides a novel solution to evaluate and analyze the network security situation.

Keywords

  • Network security
  • threat
  • attack
  • state transition
  • graph
Acceso abierto

Multi-Attribute Decision Making Based on Attribute Importance Degree and Case-Based Reasoning

Publicado en línea: 31 Dec 2013
Páginas: 62 - 74

Resumen

Abstract

To tackle a multi-attribute decision making problem, rough set and casebased reasoning are often combined. However, the reduction in a rough set is always complex. In this paper we provide a new relative importance measure about the unitary attributes values by ranking the relative importance of the attributes in the rough set theory. A new rough set model based on ranking the relative importance of the attributes is built and its properties are studied. Then unitary attributes values are utilized to compute the similarity of rules in case-based reasoning, for there might be incompletely match or miss values. A new multiattribute decision making based on case-based reasoning and a rough set based on the ranking relative importance of the attributes is constructed, which obtains rules, avoiding reduction and rule extraction.

Keywords

  • Multi-attribute decision-making
  • case-based reasoning
  • rough set
  • relative position region
  • attribute importance
Acceso abierto

A Negotiation Framework for Managing the Requirements Changes

Publicado en línea: 31 Dec 2013
Páginas: 75 - 87

Resumen

Abstract

The consistent system requirements set is the basis of successful software projects. The requirements change is very usual in a software project, and it may cause inconsistency of the requirements set, and become the key factor that affects the quality of the requirements and the software. Aiming at the problem of requirements inconsistencies caused by the requirements change, this paper proposes a compromise-based negotiation framework to manage the requirements changes, illustrates the efficiency of the proposed method by a software engineering case, gives a contrast experiment with the current mainstream method, and finally gives a comparison with the related work and a conclusion. The experimental results show that the framework proposed in this paper is more flexible and accurate than the results of the current popular framework, so it is more suitable for the requirement changes management.

Acceso abierto

Distributed Energy Balance Clustering Algorithm in Wireless Sensor Networks

Publicado en línea: 31 Dec 2013
Páginas: 88 - 99

Resumen

Abstract

The traditional clustering algorithm of Low-Energy Adaptive Clustering Hierarchy (LEACH) does not care about the residual energy of the cluster heads and the distance relationship of each node in the wireless sensor networks (WSNs). Each new round the cluster head is changed without any concern about the residual energy of the current cluster head, and the nodes join into a new cluster head without concern about the distance factor and the residual energy factor of all nodes in WSNs. To solve these problems in LEACH, this paper puts forward a distributed energy balance clustering algorithm, which takes into full consideration the residual energy of the cluster heads and the distance relationship between the base station and the cluster heads. The experimental results indicate that the proposed distributed energy balance clustering algorithm can prolong the lifetime of the networks more than LEACH, and the number of messages for selecting a new cluster head at the same time can be greatly reduced, which proves it as more suitable for practical applications.

Keywords

  • Wireless sensor networks
  • Low-Energy Adaptive Clustering Hierarchy
  • residual energy
  • distance relationship
  • distributed energy balance clustering algorithm
Acceso abierto

Research on Profit Distribution of Software Outsourcing Alliances Based on the Improved Shapley Value Model

Publicado en línea: 31 Dec 2013
Páginas: 100 - 109

Resumen

Abstract

With the development of software outsourcing industry, there is a growing trend to establish the software outsourcing alliances. Whether alliances’ profit distribution is reasonable affects directly and significantly alliances’ stability. This paper introduces the Shapley value method which is a common profit distribution method applicable to multiple people cooperation. Due to the weakness of the Shapley value method, AHP is used to analyze the influence factors and adjust the model. The anticipated outcome of the result is to provide a theoretical support for the profit distribution of the software outsourcing alliances in the future.

Keywords

  • Software outsourcing
  • alliance
  • profit
  • distribution
  • Shapley value
  • AHP (Analytic Hierarchy Process)
Acceso abierto

Synergic Relationship and Synergic Degree between an Information System and Corporate Strategy

Publicado en línea: 31 Dec 2013
Páginas: 110 - 121

Resumen

Abstract

With the development of information technology, the Information System (IS) has not the characters of rareness and inimitability, so an IS cannot form core competence alone. Forming synergic relationship and keeping higher synergic degree between IS and corporate strategy will help the enterprises acquire competence advantage and realize IS value. This paper analyzes the conditions of forming synergic relationship between an IS and strategy, and points out that the key factors for a synergic degree are the strategy rationality and the matching degree between the IS and strategy. Based on the analysis result and BCG growth share matrix, this paper constructed a synergy degree measure model to evaluate the synergic relationship between the IS and corporate strategy. Finally, a case study is used to verify the feasibility of the model.

Keywords

  • Information System (IS)
  • corporate strategy
  • synergic relationship
  • BCG Growth Share Matrix
  • synergy degree
Acceso abierto

UARR: A Novel Similarity Measure for Collaborative Filtering Recommendation

Publicado en línea: 31 Dec 2013
Páginas: 122 - 130

Resumen

Abstract

User similarity measurement plays a key role in collaborative filtering recommendation which is the most widely applied technique in recommender systems. Traditional user-based collaborative filtering recommendation methods focus on absolute rating difference of common rated items while neglecting the relative rating level difference to the same items. In order to overcome this drawback, we propose a novel user similarity measure which takes into account the degree of rating the level gap that users could accept. The results of collaborative filtering recommendation based on User Acceptable Rating Radius (UARR) on a real movie rating data set, the MovieLens data set, prove to generate more accurate prediction results compared to the traditional similarity methods.

Keywords

  • Collaborative filtering
  • recommender system
  • user similarity measurement
  • User Acceptable Rating Radius (UARR)
Acceso abierto

Evaluation of Strategies in the Process of China’s City Informatization Using the AHP Method

Publicado en línea: 31 Dec 2013
Páginas: 131 - 142

Resumen

Abstract

Informatization is the new power for urban management innovation -- the tools to enhance the quality of life for citizens and the new ways to improve government services. However, there are many problems in the informatization construction process of the Chinese cities, such as poor level design, hard effects than to soft, the lack of features, poor e-government function and information collaboration. This paper analyzes the problems in the informatization construction of Chinese cities, combined with advances in information network technology, social needs, and some city informatization instances, proposes development tactics of Chinese city informatization. Ultimately, AHP and ISM has been used to analyze the numerical value of different plans, carrying out the best plan under the criterion.

Keywords

  • City informatization
  • strategy hierarchy model assess
Acceso abierto

A Case Study of Question Answering in Automatic Tourism Service Packaging

Publicado en línea: 31 Dec 2013
Páginas: 143 - 152

Resumen

Abstract

While Web Question Answering System (WQAS) has made great progress in Internet currently, a major limitation of the information sources that current WQASs are using is limited to static page texts. Content information that many users-are interested in, is provided dynamically to Web through programs. Web services are becoming the dominant forms of such sorts of programs. In this paper, a novel model is proposed to address the problem of natural language answering based Web services. The expansions of OWL-S are used to describe the services, and predicate tuples retrieved from questions are matched to the services by PROLOG reasoning. To plan the services, SHOP2 planner is introduced in our architecture, which adopts a semantic Web for content modeling, logic grammar for question parsing, and Hierarchical Task Network (HTN) for user query problem solving. A case study in e-Tourism domain is investigated, which implements dynamic packaging for tourism products.

Keywords

  • WQA
  • Semantic web service
  • HTN
  • e-Tourism
Acceso abierto

A Cloud Computing Service Architecture of a Parallel Algorithm Oriented to Scientific Computing with CUDA and Monte Carlo

Publicado en línea: 31 Dec 2013
Páginas: 153 - 166

Resumen

Abstract

The GPGPU (General Purpose Graphics Processing Units) have become a whole new area for research due to the fast development of GPU hardware and programming tools, such as CUDA (Compute Unified Device Architecture). Here we have made a research on CUDA and its applications in the field of scientific computation, as organ electronics. We propose one solution of the parallel computation in global optimization of the physical characteristics in organ electronics with Monte Carlo, and one cloud service architecture for parallel computation of organ electronics was designed. Finally, one case of computing the organ molecule moving orbit was implemented based on the above solution and architecture, and has got a good display by the cloud service.

Keywords

  • CUDA
  • GPU
  • Monte Carlo
  • cloud computing
  • scientific computing
Acceso abierto

An Enterprise IT Service Quality Model (EISQM) Based on Service Interaction and Its Empirical Research

Publicado en línea: 31 Dec 2013
Páginas: 167 - 177

Resumen

Abstract

The respondents’ perspective on service interaction is an important design consideration in service quality evaluations. In Information Technology (IT) field, the enterprise IT service, unlike the traditional service, entails more service interaction, evolving the interactions between the service users and IT department, the interactions between the service users and IT system. The importance of evaluating the enterprise IT service quality has been discussed for several decades. However, there is no universal agreement on the enterprise IT service quality model. This research, taking a cognitive approach, seeks to construct an enterprise IT service quality model based on the service interaction theory. Based on relative literature, we propose a two-dimensional model: human delivered service and system delivered service quality. Following a psychometric procedure, we have collected data and analyzed the construction of the model. The result shows that the enterprise IT service quality measurement instrument has been developed and validated. This model has provided theoretical support for IT service providers to measure users’ satisfaction and improve the service quality.

Keywords

  • IT service
  • service quality
  • IT management
  • service interaction
  • quality management

Planifique su conferencia remota con Sciendo