Zeszyty czasopisma

Tom 22 (2022): Zeszyt 3 (September 2022)

Tom 22 (2022): Zeszyt 2 (June 2022)

Tom 22 (2022): Zeszyt 1 (March 2022)

Tom 21 (2021): Zeszyt 4 (December 2021)

Tom 21 (2021): Zeszyt 3 (September 2021)

Tom 21 (2021): Zeszyt 2 (June 2021)

Tom 21 (2021): Zeszyt 1 (March 2021)

Tom 20 (2020): Zeszyt 6 (December 2020)
Special Zeszyt on New Developments in Scalable Computing

Tom 20 (2020): Zeszyt 5 (December 2020)
Special issue on Innovations in Intelligent Systems and Applications

Tom 20 (2020): Zeszyt 4 (November 2020)

Tom 20 (2020): Zeszyt 3 (September 2020)

Tom 20 (2020): Zeszyt 2 (June 2020)

Tom 20 (2020): Zeszyt 1 (March 2020)

Tom 19 (2019): Zeszyt 4 (November 2019)

Tom 19 (2019): Zeszyt 3 (September 2019)

Tom 19 (2019): Zeszyt 2 (June 2019)

Tom 19 (2019): Zeszyt 1 (March 2019)

Tom 18 (2018): Zeszyt 5 (May 2018)
Special Thematic Zeszyt on Optimal Codes and Related Topics

Tom 18 (2018): Zeszyt 4 (November 2018)

Tom 18 (2018): Zeszyt 3 (September 2018)

Tom 18 (2018): Zeszyt 2 (June 2018)

Tom 18 (2018): Zeszyt 1 (March 2018)

Tom 17 (2017): Zeszyt 5 (December 2017)
Special Zeszyt With Selected Papers From The Workshop “Two Years Avitohol: Advanced High Performance Computing Applications 2017

Tom 17 (2017): Zeszyt 4 (November 2017)

Tom 17 (2017): Zeszyt 3 (September 2017)

Tom 17 (2017): Zeszyt 2 (June 2017)

Tom 17 (2017): Zeszyt 1 (March 2017)

Tom 16 (2016): Zeszyt 6 (December 2016)
Special issue with selection of extended papers from 6th International Conference on Logistic, Informatics and Service Science LISS’2016

Tom 16 (2016): Zeszyt 5 (October 2016)
Zeszyt Title: Special Zeszyt on Application of Advanced Computing and Simulation in Information Systems

Tom 16 (2016): Zeszyt 4 (December 2016)

Tom 16 (2016): Zeszyt 3 (September 2016)

Tom 16 (2016): Zeszyt 2 (June 2016)

Tom 16 (2016): Zeszyt 1 (March 2016)

Tom 15 (2015): Zeszyt 7 (December 2015)
Special Zeszyt on Information Fusion

Tom 15 (2015): Zeszyt 6 (December 2015)
Special Zeszyt on Logistics, Informatics and Service Science

Tom 15 (2015): Zeszyt 5 (April 2015)
Special Zeszyt on Control in Transportation Systems

Tom 15 (2015): Zeszyt 4 (November 2015)

Tom 15 (2015): Zeszyt 3 (September 2015)

Tom 15 (2015): Zeszyt 2 (June 2015)

Tom 15 (2015): Zeszyt 1 (March 2015)

Tom 14 (2014): Zeszyt 5 (December 2014)
Special Zeszyt

Tom 14 (2014): Zeszyt 4 (December 2014)

Tom 14 (2014): Zeszyt 3 (September 2014)

Tom 14 (2014): Zeszyt 2 (June 2014)

Tom 14 (2014): Zeszyt 1 (March 2014)

Tom 13 (2013): Zeszyt Special-Zeszyt (December 2013)

Tom 13 (2013): Zeszyt 4 (December 2013)
The publishing of the present issue (Tom 13, No 4, 2013) of the journal “Cybernetics and Information Technologies” is financially supported by FP7 project “Advanced Computing for Innovation” (ACOMIN), grant agreement 316087 of Call FP7 REGPOT-2012-2013-1.

Tom 13 (2013): Zeszyt 3 (September 2013)

Tom 13 (2013): Zeszyt 2 (June 2013)

Tom 13 (2013): Zeszyt 1 (March 2013)

Tom 12 (2012): Zeszyt 4 (December 2012)

Tom 12 (2012): Zeszyt 3 (September 2012)

Tom 12 (2012): Zeszyt 2 (June 2012)

Tom 12 (2012): Zeszyt 1 (March 2012)

Informacje o czasopiśmie
Format
Czasopismo
eISSN
1314-4081
ISSN
1314-4081
Pierwsze wydanie
13 Mar 2012
Częstotliwość wydawania
4 razy w roku
Języki
Angielski

Wyszukiwanie

Tom 13 (2013): Zeszyt Special-Zeszyt (December 2013)

Informacje o czasopiśmie
Format
Czasopismo
eISSN
1314-4081
ISSN
1314-4081
Pierwsze wydanie
13 Mar 2012
Częstotliwość wydawania
4 razy w roku
Języki
Angielski

Wyszukiwanie

16 Artykułów
Otwarty dostęp

Preface

Data publikacji: 31 Dec 2013
Zakres stron: 3 - 4

Abstrakt

Otwarty dostęp

Research of the Optimization of a Data Mining Algorithm Based on an Embedded Data Mining System

Data publikacji: 31 Dec 2013
Zakres stron: 5 - 17

Abstrakt

Abstract

At present most of the data mining systems are independent with respect to the database system, and data loading and conversion take much time. The running time of the algorithms in a data mining process is also long. Although some optimized algorithms have improved it in different aspects, they could not improve the efficiency to a large extent when many duplicate records are available in a database. Solving the problem of improving the efficiency of data mining in the presence of many coinciding records in a database, an Apriori optimized algorithm is proposed. Firstly, a new concept of duplication and use is suggested to remove and count the same records, in order to generate a new database of a small size. Secondly, the original database is compressed according to the users’ requirements. At last, finding the frequent item sets based on binary coding, strong association rules are obtained. The structure of the data mining system based on an embedded database has also been designed in this paper. The theoretical analysis and experimental verification prove that the optimized algorithm is appropriate and the algorithm application in an embedded data mining system can further improve the mining efficiency.

Keywords

  • Embedded database
  • data mining
  • association rules
  • Apriori algorithm
  • duplication
  • frequent item sets
Otwarty dostęp

The Regional Medical Business Process Optimization Based on Cloud Computing Medical Resources Sharing Environment

Data publikacji: 31 Dec 2013
Zakres stron: 18 - 29

Abstrakt

Abstract

The paper elaborates some basic concepts, for example, cloud computing, medical resources sharing, business process optimization, and then points out the problems in the development process of regional health informatization. However, there are many good characteristics and advantages in cloud computing. If cloud computing can be used in the construction of regional health informatization, the problems like insufficient medical resources sharing, paying fees several times, repeated checkup, long hospitalization period, can be efficiently solved. So we put forward cloud computing service mode and research the architecture of regional medical collaborative cloud computing platform. It can realize medical resources sharing. We have a further study about business process optimization based on cloud computing medical resources sharing environment and find out that it can reduce repeated checkup, shorten hospitalization period, and so on.

Keywords

  • Information management
  • cloud computing
  • medical resource sharing
  • regional health informatization
  • regional medical collaborative cloud computing platform
  • business process optimization of regional medical treatment
Otwarty dostęp

Cross-Organization Workflow Research of Agile Telecom on Positive Feedback

Data publikacji: 31 Dec 2013
Zakres stron: 30 - 40

Abstrakt

Abstract

In order to promote the core competitive power in telecom operating enterprises that face market fine operations, this article compares ECTA mode (Extension Case Transmission Mode) and LCA mode (Loosen Couple Mode). By comparing LCA mode with ECTA mode, we can find out the conditions, in which these two modes are appropriate. Besides, we can keep the semantics of the public flow mode and do our best to modernize the workflow by improving the task complexity, information transparency and operating controllability of LCA mode through a positive feedback system and by improving ECTA mode through a Petri net system.

Keywords

  • Cross-organization workflow
  • LCA mode
  • ECTA mode
  • positive feedback
  • Petri net
Otwarty dostęp

A New Privacy Preserving Association Rule Mining Algorithm Based on Hybrid Partial Hiding Strategy

Data publikacji: 31 Dec 2013
Zakres stron: 41 - 50

Abstrakt

Abstract

Data mining is the progress of automatically discovering high level data and trends in large amounts of data that would otherwise remain hidden. In order to improve the privacy preservation of association rule mining, a hybrid partial hiding algorithm (HPH) is proposed. The original data set can be interfered and transformed by different random parameters. Then, the algorithm of generating frequent items based on HPH is presented. Finally, it can be proved that the privacy of HPH algorithm is better than that of the original algorithm.

Keywords

  • Data mining
  • association rule
  • privacy preservation
Otwarty dostęp

Network Threat Identification and Analysis Based on a State Transition Graph

Data publikacji: 31 Dec 2013
Zakres stron: 51 - 61

Abstrakt

Abstract

With the rapid popularity of Internet and information technology, local area network is becoming insecure. Along with the improving advantages, security threats are emerging continually and bringing great pressure and challenges. An identification and analysis method for network real-time threats is proposed to accurately assess and master the current network security situation, and thereby preferably guide a dynamic defense. This method recognizes the current threats and predicts the subsequent threats by modeling attack scenarios and simulating attack state transferring. The threat identification model is called Attack State Transition Graph and Real-Time Attack State Graph, which is constructed by an Expanded Finite-State Automata. Based on the former possible threat paths, the state transitions can be illustrated and based on the latter, actually successful threats and threat paths are described. Then a threat identification algorithm is presented based on the above model. With this algorithm, various invalid threats are filtered; current valid threats are obtained by correlating the dynamic alarms with a static attack scenario. Further on, combining the Attack State Transition Graph with a Real-Time Attack State Graph, a possible next threat and a threat path can be identified and an attack target can also be predicted. Finally, the simulated results in an experimental network verify the feasibility and validity of the model and algorithm. This method provides a novel solution to evaluate and analyze the network security situation.

Keywords

  • Network security
  • threat
  • attack
  • state transition
  • graph
Otwarty dostęp

Multi-Attribute Decision Making Based on Attribute Importance Degree and Case-Based Reasoning

Data publikacji: 31 Dec 2013
Zakres stron: 62 - 74

Abstrakt

Abstract

To tackle a multi-attribute decision making problem, rough set and casebased reasoning are often combined. However, the reduction in a rough set is always complex. In this paper we provide a new relative importance measure about the unitary attributes values by ranking the relative importance of the attributes in the rough set theory. A new rough set model based on ranking the relative importance of the attributes is built and its properties are studied. Then unitary attributes values are utilized to compute the similarity of rules in case-based reasoning, for there might be incompletely match or miss values. A new multiattribute decision making based on case-based reasoning and a rough set based on the ranking relative importance of the attributes is constructed, which obtains rules, avoiding reduction and rule extraction.

Keywords

  • Multi-attribute decision-making
  • case-based reasoning
  • rough set
  • relative position region
  • attribute importance
Otwarty dostęp

A Negotiation Framework for Managing the Requirements Changes

Data publikacji: 31 Dec 2013
Zakres stron: 75 - 87

Abstrakt

Abstract

The consistent system requirements set is the basis of successful software projects. The requirements change is very usual in a software project, and it may cause inconsistency of the requirements set, and become the key factor that affects the quality of the requirements and the software. Aiming at the problem of requirements inconsistencies caused by the requirements change, this paper proposes a compromise-based negotiation framework to manage the requirements changes, illustrates the efficiency of the proposed method by a software engineering case, gives a contrast experiment with the current mainstream method, and finally gives a comparison with the related work and a conclusion. The experimental results show that the framework proposed in this paper is more flexible and accurate than the results of the current popular framework, so it is more suitable for the requirement changes management.

Otwarty dostęp

Distributed Energy Balance Clustering Algorithm in Wireless Sensor Networks

Data publikacji: 31 Dec 2013
Zakres stron: 88 - 99

Abstrakt

Abstract

The traditional clustering algorithm of Low-Energy Adaptive Clustering Hierarchy (LEACH) does not care about the residual energy of the cluster heads and the distance relationship of each node in the wireless sensor networks (WSNs). Each new round the cluster head is changed without any concern about the residual energy of the current cluster head, and the nodes join into a new cluster head without concern about the distance factor and the residual energy factor of all nodes in WSNs. To solve these problems in LEACH, this paper puts forward a distributed energy balance clustering algorithm, which takes into full consideration the residual energy of the cluster heads and the distance relationship between the base station and the cluster heads. The experimental results indicate that the proposed distributed energy balance clustering algorithm can prolong the lifetime of the networks more than LEACH, and the number of messages for selecting a new cluster head at the same time can be greatly reduced, which proves it as more suitable for practical applications.

Keywords

  • Wireless sensor networks
  • Low-Energy Adaptive Clustering Hierarchy
  • residual energy
  • distance relationship
  • distributed energy balance clustering algorithm
Otwarty dostęp

Research on Profit Distribution of Software Outsourcing Alliances Based on the Improved Shapley Value Model

Data publikacji: 31 Dec 2013
Zakres stron: 100 - 109

Abstrakt

Abstract

With the development of software outsourcing industry, there is a growing trend to establish the software outsourcing alliances. Whether alliances’ profit distribution is reasonable affects directly and significantly alliances’ stability. This paper introduces the Shapley value method which is a common profit distribution method applicable to multiple people cooperation. Due to the weakness of the Shapley value method, AHP is used to analyze the influence factors and adjust the model. The anticipated outcome of the result is to provide a theoretical support for the profit distribution of the software outsourcing alliances in the future.

Keywords

  • Software outsourcing
  • alliance
  • profit
  • distribution
  • Shapley value
  • AHP (Analytic Hierarchy Process)
Otwarty dostęp

Synergic Relationship and Synergic Degree between an Information System and Corporate Strategy

Data publikacji: 31 Dec 2013
Zakres stron: 110 - 121

Abstrakt

Abstract

With the development of information technology, the Information System (IS) has not the characters of rareness and inimitability, so an IS cannot form core competence alone. Forming synergic relationship and keeping higher synergic degree between IS and corporate strategy will help the enterprises acquire competence advantage and realize IS value. This paper analyzes the conditions of forming synergic relationship between an IS and strategy, and points out that the key factors for a synergic degree are the strategy rationality and the matching degree between the IS and strategy. Based on the analysis result and BCG growth share matrix, this paper constructed a synergy degree measure model to evaluate the synergic relationship between the IS and corporate strategy. Finally, a case study is used to verify the feasibility of the model.

Keywords

  • Information System (IS)
  • corporate strategy
  • synergic relationship
  • BCG Growth Share Matrix
  • synergy degree
Otwarty dostęp

UARR: A Novel Similarity Measure for Collaborative Filtering Recommendation

Data publikacji: 31 Dec 2013
Zakres stron: 122 - 130

Abstrakt

Abstract

User similarity measurement plays a key role in collaborative filtering recommendation which is the most widely applied technique in recommender systems. Traditional user-based collaborative filtering recommendation methods focus on absolute rating difference of common rated items while neglecting the relative rating level difference to the same items. In order to overcome this drawback, we propose a novel user similarity measure which takes into account the degree of rating the level gap that users could accept. The results of collaborative filtering recommendation based on User Acceptable Rating Radius (UARR) on a real movie rating data set, the MovieLens data set, prove to generate more accurate prediction results compared to the traditional similarity methods.

Keywords

  • Collaborative filtering
  • recommender system
  • user similarity measurement
  • User Acceptable Rating Radius (UARR)
Otwarty dostęp

Evaluation of Strategies in the Process of China’s City Informatization Using the AHP Method

Data publikacji: 31 Dec 2013
Zakres stron: 131 - 142

Abstrakt

Abstract

Informatization is the new power for urban management innovation -- the tools to enhance the quality of life for citizens and the new ways to improve government services. However, there are many problems in the informatization construction process of the Chinese cities, such as poor level design, hard effects than to soft, the lack of features, poor e-government function and information collaboration. This paper analyzes the problems in the informatization construction of Chinese cities, combined with advances in information network technology, social needs, and some city informatization instances, proposes development tactics of Chinese city informatization. Ultimately, AHP and ISM has been used to analyze the numerical value of different plans, carrying out the best plan under the criterion.

Keywords

  • City informatization
  • strategy hierarchy model assess
Otwarty dostęp

A Case Study of Question Answering in Automatic Tourism Service Packaging

Data publikacji: 31 Dec 2013
Zakres stron: 143 - 152

Abstrakt

Abstract

While Web Question Answering System (WQAS) has made great progress in Internet currently, a major limitation of the information sources that current WQASs are using is limited to static page texts. Content information that many users-are interested in, is provided dynamically to Web through programs. Web services are becoming the dominant forms of such sorts of programs. In this paper, a novel model is proposed to address the problem of natural language answering based Web services. The expansions of OWL-S are used to describe the services, and predicate tuples retrieved from questions are matched to the services by PROLOG reasoning. To plan the services, SHOP2 planner is introduced in our architecture, which adopts a semantic Web for content modeling, logic grammar for question parsing, and Hierarchical Task Network (HTN) for user query problem solving. A case study in e-Tourism domain is investigated, which implements dynamic packaging for tourism products.

Keywords

  • WQA
  • Semantic web service
  • HTN
  • e-Tourism
Otwarty dostęp

A Cloud Computing Service Architecture of a Parallel Algorithm Oriented to Scientific Computing with CUDA and Monte Carlo

Data publikacji: 31 Dec 2013
Zakres stron: 153 - 166

Abstrakt

Abstract

The GPGPU (General Purpose Graphics Processing Units) have become a whole new area for research due to the fast development of GPU hardware and programming tools, such as CUDA (Compute Unified Device Architecture). Here we have made a research on CUDA and its applications in the field of scientific computation, as organ electronics. We propose one solution of the parallel computation in global optimization of the physical characteristics in organ electronics with Monte Carlo, and one cloud service architecture for parallel computation of organ electronics was designed. Finally, one case of computing the organ molecule moving orbit was implemented based on the above solution and architecture, and has got a good display by the cloud service.

Keywords

  • CUDA
  • GPU
  • Monte Carlo
  • cloud computing
  • scientific computing
Otwarty dostęp

An Enterprise IT Service Quality Model (EISQM) Based on Service Interaction and Its Empirical Research

Data publikacji: 31 Dec 2013
Zakres stron: 167 - 177

Abstrakt

Abstract

The respondents’ perspective on service interaction is an important design consideration in service quality evaluations. In Information Technology (IT) field, the enterprise IT service, unlike the traditional service, entails more service interaction, evolving the interactions between the service users and IT department, the interactions between the service users and IT system. The importance of evaluating the enterprise IT service quality has been discussed for several decades. However, there is no universal agreement on the enterprise IT service quality model. This research, taking a cognitive approach, seeks to construct an enterprise IT service quality model based on the service interaction theory. Based on relative literature, we propose a two-dimensional model: human delivered service and system delivered service quality. Following a psychometric procedure, we have collected data and analyzed the construction of the model. The result shows that the enterprise IT service quality measurement instrument has been developed and validated. This model has provided theoretical support for IT service providers to measure users’ satisfaction and improve the service quality.

Keywords

  • IT service
  • service quality
  • IT management
  • service interaction
  • quality management
16 Artykułów
Otwarty dostęp

Preface

Data publikacji: 31 Dec 2013
Zakres stron: 3 - 4

Abstrakt

Otwarty dostęp

Research of the Optimization of a Data Mining Algorithm Based on an Embedded Data Mining System

Data publikacji: 31 Dec 2013
Zakres stron: 5 - 17

Abstrakt

Abstract

At present most of the data mining systems are independent with respect to the database system, and data loading and conversion take much time. The running time of the algorithms in a data mining process is also long. Although some optimized algorithms have improved it in different aspects, they could not improve the efficiency to a large extent when many duplicate records are available in a database. Solving the problem of improving the efficiency of data mining in the presence of many coinciding records in a database, an Apriori optimized algorithm is proposed. Firstly, a new concept of duplication and use is suggested to remove and count the same records, in order to generate a new database of a small size. Secondly, the original database is compressed according to the users’ requirements. At last, finding the frequent item sets based on binary coding, strong association rules are obtained. The structure of the data mining system based on an embedded database has also been designed in this paper. The theoretical analysis and experimental verification prove that the optimized algorithm is appropriate and the algorithm application in an embedded data mining system can further improve the mining efficiency.

Keywords

  • Embedded database
  • data mining
  • association rules
  • Apriori algorithm
  • duplication
  • frequent item sets
Otwarty dostęp

The Regional Medical Business Process Optimization Based on Cloud Computing Medical Resources Sharing Environment

Data publikacji: 31 Dec 2013
Zakres stron: 18 - 29

Abstrakt

Abstract

The paper elaborates some basic concepts, for example, cloud computing, medical resources sharing, business process optimization, and then points out the problems in the development process of regional health informatization. However, there are many good characteristics and advantages in cloud computing. If cloud computing can be used in the construction of regional health informatization, the problems like insufficient medical resources sharing, paying fees several times, repeated checkup, long hospitalization period, can be efficiently solved. So we put forward cloud computing service mode and research the architecture of regional medical collaborative cloud computing platform. It can realize medical resources sharing. We have a further study about business process optimization based on cloud computing medical resources sharing environment and find out that it can reduce repeated checkup, shorten hospitalization period, and so on.

Keywords

  • Information management
  • cloud computing
  • medical resource sharing
  • regional health informatization
  • regional medical collaborative cloud computing platform
  • business process optimization of regional medical treatment
Otwarty dostęp

Cross-Organization Workflow Research of Agile Telecom on Positive Feedback

Data publikacji: 31 Dec 2013
Zakres stron: 30 - 40

Abstrakt

Abstract

In order to promote the core competitive power in telecom operating enterprises that face market fine operations, this article compares ECTA mode (Extension Case Transmission Mode) and LCA mode (Loosen Couple Mode). By comparing LCA mode with ECTA mode, we can find out the conditions, in which these two modes are appropriate. Besides, we can keep the semantics of the public flow mode and do our best to modernize the workflow by improving the task complexity, information transparency and operating controllability of LCA mode through a positive feedback system and by improving ECTA mode through a Petri net system.

Keywords

  • Cross-organization workflow
  • LCA mode
  • ECTA mode
  • positive feedback
  • Petri net
Otwarty dostęp

A New Privacy Preserving Association Rule Mining Algorithm Based on Hybrid Partial Hiding Strategy

Data publikacji: 31 Dec 2013
Zakres stron: 41 - 50

Abstrakt

Abstract

Data mining is the progress of automatically discovering high level data and trends in large amounts of data that would otherwise remain hidden. In order to improve the privacy preservation of association rule mining, a hybrid partial hiding algorithm (HPH) is proposed. The original data set can be interfered and transformed by different random parameters. Then, the algorithm of generating frequent items based on HPH is presented. Finally, it can be proved that the privacy of HPH algorithm is better than that of the original algorithm.

Keywords

  • Data mining
  • association rule
  • privacy preservation
Otwarty dostęp

Network Threat Identification and Analysis Based on a State Transition Graph

Data publikacji: 31 Dec 2013
Zakres stron: 51 - 61

Abstrakt

Abstract

With the rapid popularity of Internet and information technology, local area network is becoming insecure. Along with the improving advantages, security threats are emerging continually and bringing great pressure and challenges. An identification and analysis method for network real-time threats is proposed to accurately assess and master the current network security situation, and thereby preferably guide a dynamic defense. This method recognizes the current threats and predicts the subsequent threats by modeling attack scenarios and simulating attack state transferring. The threat identification model is called Attack State Transition Graph and Real-Time Attack State Graph, which is constructed by an Expanded Finite-State Automata. Based on the former possible threat paths, the state transitions can be illustrated and based on the latter, actually successful threats and threat paths are described. Then a threat identification algorithm is presented based on the above model. With this algorithm, various invalid threats are filtered; current valid threats are obtained by correlating the dynamic alarms with a static attack scenario. Further on, combining the Attack State Transition Graph with a Real-Time Attack State Graph, a possible next threat and a threat path can be identified and an attack target can also be predicted. Finally, the simulated results in an experimental network verify the feasibility and validity of the model and algorithm. This method provides a novel solution to evaluate and analyze the network security situation.

Keywords

  • Network security
  • threat
  • attack
  • state transition
  • graph
Otwarty dostęp

Multi-Attribute Decision Making Based on Attribute Importance Degree and Case-Based Reasoning

Data publikacji: 31 Dec 2013
Zakres stron: 62 - 74

Abstrakt

Abstract

To tackle a multi-attribute decision making problem, rough set and casebased reasoning are often combined. However, the reduction in a rough set is always complex. In this paper we provide a new relative importance measure about the unitary attributes values by ranking the relative importance of the attributes in the rough set theory. A new rough set model based on ranking the relative importance of the attributes is built and its properties are studied. Then unitary attributes values are utilized to compute the similarity of rules in case-based reasoning, for there might be incompletely match or miss values. A new multiattribute decision making based on case-based reasoning and a rough set based on the ranking relative importance of the attributes is constructed, which obtains rules, avoiding reduction and rule extraction.

Keywords

  • Multi-attribute decision-making
  • case-based reasoning
  • rough set
  • relative position region
  • attribute importance
Otwarty dostęp

A Negotiation Framework for Managing the Requirements Changes

Data publikacji: 31 Dec 2013
Zakres stron: 75 - 87

Abstrakt

Abstract

The consistent system requirements set is the basis of successful software projects. The requirements change is very usual in a software project, and it may cause inconsistency of the requirements set, and become the key factor that affects the quality of the requirements and the software. Aiming at the problem of requirements inconsistencies caused by the requirements change, this paper proposes a compromise-based negotiation framework to manage the requirements changes, illustrates the efficiency of the proposed method by a software engineering case, gives a contrast experiment with the current mainstream method, and finally gives a comparison with the related work and a conclusion. The experimental results show that the framework proposed in this paper is more flexible and accurate than the results of the current popular framework, so it is more suitable for the requirement changes management.

Otwarty dostęp

Distributed Energy Balance Clustering Algorithm in Wireless Sensor Networks

Data publikacji: 31 Dec 2013
Zakres stron: 88 - 99

Abstrakt

Abstract

The traditional clustering algorithm of Low-Energy Adaptive Clustering Hierarchy (LEACH) does not care about the residual energy of the cluster heads and the distance relationship of each node in the wireless sensor networks (WSNs). Each new round the cluster head is changed without any concern about the residual energy of the current cluster head, and the nodes join into a new cluster head without concern about the distance factor and the residual energy factor of all nodes in WSNs. To solve these problems in LEACH, this paper puts forward a distributed energy balance clustering algorithm, which takes into full consideration the residual energy of the cluster heads and the distance relationship between the base station and the cluster heads. The experimental results indicate that the proposed distributed energy balance clustering algorithm can prolong the lifetime of the networks more than LEACH, and the number of messages for selecting a new cluster head at the same time can be greatly reduced, which proves it as more suitable for practical applications.

Keywords

  • Wireless sensor networks
  • Low-Energy Adaptive Clustering Hierarchy
  • residual energy
  • distance relationship
  • distributed energy balance clustering algorithm
Otwarty dostęp

Research on Profit Distribution of Software Outsourcing Alliances Based on the Improved Shapley Value Model

Data publikacji: 31 Dec 2013
Zakres stron: 100 - 109

Abstrakt

Abstract

With the development of software outsourcing industry, there is a growing trend to establish the software outsourcing alliances. Whether alliances’ profit distribution is reasonable affects directly and significantly alliances’ stability. This paper introduces the Shapley value method which is a common profit distribution method applicable to multiple people cooperation. Due to the weakness of the Shapley value method, AHP is used to analyze the influence factors and adjust the model. The anticipated outcome of the result is to provide a theoretical support for the profit distribution of the software outsourcing alliances in the future.

Keywords

  • Software outsourcing
  • alliance
  • profit
  • distribution
  • Shapley value
  • AHP (Analytic Hierarchy Process)
Otwarty dostęp

Synergic Relationship and Synergic Degree between an Information System and Corporate Strategy

Data publikacji: 31 Dec 2013
Zakres stron: 110 - 121

Abstrakt

Abstract

With the development of information technology, the Information System (IS) has not the characters of rareness and inimitability, so an IS cannot form core competence alone. Forming synergic relationship and keeping higher synergic degree between IS and corporate strategy will help the enterprises acquire competence advantage and realize IS value. This paper analyzes the conditions of forming synergic relationship between an IS and strategy, and points out that the key factors for a synergic degree are the strategy rationality and the matching degree between the IS and strategy. Based on the analysis result and BCG growth share matrix, this paper constructed a synergy degree measure model to evaluate the synergic relationship between the IS and corporate strategy. Finally, a case study is used to verify the feasibility of the model.

Keywords

  • Information System (IS)
  • corporate strategy
  • synergic relationship
  • BCG Growth Share Matrix
  • synergy degree
Otwarty dostęp

UARR: A Novel Similarity Measure for Collaborative Filtering Recommendation

Data publikacji: 31 Dec 2013
Zakres stron: 122 - 130

Abstrakt

Abstract

User similarity measurement plays a key role in collaborative filtering recommendation which is the most widely applied technique in recommender systems. Traditional user-based collaborative filtering recommendation methods focus on absolute rating difference of common rated items while neglecting the relative rating level difference to the same items. In order to overcome this drawback, we propose a novel user similarity measure which takes into account the degree of rating the level gap that users could accept. The results of collaborative filtering recommendation based on User Acceptable Rating Radius (UARR) on a real movie rating data set, the MovieLens data set, prove to generate more accurate prediction results compared to the traditional similarity methods.

Keywords

  • Collaborative filtering
  • recommender system
  • user similarity measurement
  • User Acceptable Rating Radius (UARR)
Otwarty dostęp

Evaluation of Strategies in the Process of China’s City Informatization Using the AHP Method

Data publikacji: 31 Dec 2013
Zakres stron: 131 - 142

Abstrakt

Abstract

Informatization is the new power for urban management innovation -- the tools to enhance the quality of life for citizens and the new ways to improve government services. However, there are many problems in the informatization construction process of the Chinese cities, such as poor level design, hard effects than to soft, the lack of features, poor e-government function and information collaboration. This paper analyzes the problems in the informatization construction of Chinese cities, combined with advances in information network technology, social needs, and some city informatization instances, proposes development tactics of Chinese city informatization. Ultimately, AHP and ISM has been used to analyze the numerical value of different plans, carrying out the best plan under the criterion.

Keywords

  • City informatization
  • strategy hierarchy model assess
Otwarty dostęp

A Case Study of Question Answering in Automatic Tourism Service Packaging

Data publikacji: 31 Dec 2013
Zakres stron: 143 - 152

Abstrakt

Abstract

While Web Question Answering System (WQAS) has made great progress in Internet currently, a major limitation of the information sources that current WQASs are using is limited to static page texts. Content information that many users-are interested in, is provided dynamically to Web through programs. Web services are becoming the dominant forms of such sorts of programs. In this paper, a novel model is proposed to address the problem of natural language answering based Web services. The expansions of OWL-S are used to describe the services, and predicate tuples retrieved from questions are matched to the services by PROLOG reasoning. To plan the services, SHOP2 planner is introduced in our architecture, which adopts a semantic Web for content modeling, logic grammar for question parsing, and Hierarchical Task Network (HTN) for user query problem solving. A case study in e-Tourism domain is investigated, which implements dynamic packaging for tourism products.

Keywords

  • WQA
  • Semantic web service
  • HTN
  • e-Tourism
Otwarty dostęp

A Cloud Computing Service Architecture of a Parallel Algorithm Oriented to Scientific Computing with CUDA and Monte Carlo

Data publikacji: 31 Dec 2013
Zakres stron: 153 - 166

Abstrakt

Abstract

The GPGPU (General Purpose Graphics Processing Units) have become a whole new area for research due to the fast development of GPU hardware and programming tools, such as CUDA (Compute Unified Device Architecture). Here we have made a research on CUDA and its applications in the field of scientific computation, as organ electronics. We propose one solution of the parallel computation in global optimization of the physical characteristics in organ electronics with Monte Carlo, and one cloud service architecture for parallel computation of organ electronics was designed. Finally, one case of computing the organ molecule moving orbit was implemented based on the above solution and architecture, and has got a good display by the cloud service.

Keywords

  • CUDA
  • GPU
  • Monte Carlo
  • cloud computing
  • scientific computing
Otwarty dostęp

An Enterprise IT Service Quality Model (EISQM) Based on Service Interaction and Its Empirical Research

Data publikacji: 31 Dec 2013
Zakres stron: 167 - 177

Abstrakt

Abstract

The respondents’ perspective on service interaction is an important design consideration in service quality evaluations. In Information Technology (IT) field, the enterprise IT service, unlike the traditional service, entails more service interaction, evolving the interactions between the service users and IT department, the interactions between the service users and IT system. The importance of evaluating the enterprise IT service quality has been discussed for several decades. However, there is no universal agreement on the enterprise IT service quality model. This research, taking a cognitive approach, seeks to construct an enterprise IT service quality model based on the service interaction theory. Based on relative literature, we propose a two-dimensional model: human delivered service and system delivered service quality. Following a psychometric procedure, we have collected data and analyzed the construction of the model. The result shows that the enterprise IT service quality measurement instrument has been developed and validated. This model has provided theoretical support for IT service providers to measure users’ satisfaction and improve the service quality.

Keywords

  • IT service
  • service quality
  • IT management
  • service interaction
  • quality management

Zaplanuj zdalną konferencję ze Sciendo