28 results on '"Xiaorong Cheng"'
Search Results
2. Study on Intelligent Wiper Based on STC89C51 Microcontroller
- Author
-
Xiaorong Cheng and Zhixing Fan
- Subjects
Source code ,Computer science ,business.industry ,media_common.quotation_subject ,Process (computing) ,Base (geometry) ,Microcontroller ,Microcomputer ,Control system ,Software system ,Sensitivity (control systems) ,business ,Computer hardware ,media_common - Abstract
In this paper, an intelligent wiper is designed base on STC89C51 Microcontroller. This intelligent wiper system can detect raindrops in real time with high sensitivity and automatically adjust the wiper speed according to the actual situation of rain. At the same time, the system can be manually switched by three wiper speeds: fast, medium and slow. The software system is based on the programming code and realizes the control of STC89C51 single chip microcomputer. In the whole measurement process, the system can work normally and respond to various instructions perfectly. After optimization and improvement, it finally shows a very high performance and fully meets the initial design requirements.
- Published
- 2020
- Full Text
- View/download PDF
3. Analysis and Improvement on Routing Protocols for Wireless Sensor Networks
- Author
-
Xiaorong Cheng and Yonglin Gao
- Subjects
Protocol (science) ,Routing protocol ,Computer science ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Path (graph theory) ,Work (physics) ,Key (cryptography) ,Energy consumption ,business ,Wireless sensor network ,Power (physics) ,Computer network - Abstract
Routing protocols are perceived to be growing hotspots and required to devote more time and work to studying it. Research on routing protocols of wireless sensor networks is significantly important to accurately guide the application. Theoretical analysis and comparison are one of the key steps in the protocol research. Restricted by irreversible factors of power and others, lifetime of wireless sensor networks is very short. In this paper, we analyze and compare the characteristics and application fields of existing protocols. On the basis of that, this paper mainly proposes an improved directed diffusion exploring the phase of reinforcing path, which chooses the way to strengthen the path after evaluating the critical factors. It was determined by simulation that improved directed diffusion has a higher transmission rate, and it satisfies the requirements, which balancing the energy consumption and prolonging the lifetime.
- Published
- 2018
- Full Text
- View/download PDF
4. Plasmonic enhanced Cu2O-Au-BFO photocathodes for solar hydrogen production
- Author
-
Graham Dawson, Shoulin Gu, Anthony Centeno, and Xiaorong Cheng
- Subjects
0301 basic medicine ,Photocurrent ,Multidisciplinary ,Materials science ,business.industry ,Poling ,lcsh:R ,Nanoparticle ,lcsh:Medicine ,Heterojunction ,Electrolyte ,Ferroelectricity ,Photocathode ,Article ,03 medical and health sciences ,030104 developmental biology ,0302 clinical medicine ,Sputtering ,Optoelectronics ,lcsh:Q ,business ,lcsh:Science ,030217 neurology & neurosurgery - Abstract
A novel Cu2O-Au-BFO heterostructure photocathode was constructed which significantly improved the efficiency of photo-generated carrier transfer for solar hydrogen production. A BiFeO3 (BFO) ferroelectric film was synthesized on top of a Cu2O layer by a sputtering process. The BFO layer acted to protect the Cu2O layer from photochemical corrosion, increasing photoelectrochemical (PEC) stability. The p–n heterojunction between Cu2O and BFO layers enhanced the PEC properties by suppressing charge recombination and improved interfacial charge transfer efficiency. When Cu2O and BFO are interfaced by Au Nanoparticles (NPs) the PEC performance was further enhanced, due to hot-electron transfer at the plasmonic resonance. After positive poling, the depolarization field across the whole volume of BFO film drove electrons into the electrolyte solution, inducing a significant anodic shift, Vop of 1.01 V vs. RHE, together with a significantly enhanced photocurrent density of −91 μA/cm2 at 0 V vs. RHE under 100 mW/cm2 illumination. The mechanism was investigated through experimental and theoretivcal calculations.
- Published
- 2019
5. Analysis of Suzhou’s Ecological Environment Construction Measures Based on Caohu’s Experience and Achievements
- Author
-
Jin Ling, Xiaorong Cheng, and Feng Zhou
- Subjects
Geography ,business.industry ,Ecological environment ,Environmental resource management ,business - Abstract
In recent years, the city’s ecological environment construction and environmental protection work have made good progress. The ecological environment still have many weak links and problems in the construction of ecological environment. This article combines Suzhou’s achievements and experience in ecological environment construction of Caohu Lake, and analyzes Suzhou’s measures and achievements in ecological environment construction and environmental protection. Provide experience reference for the construction of ecological environment in other regions.
- Published
- 2021
- Full Text
- View/download PDF
6. A credibility measurement method of smart grid data
- Author
-
Tianqi Li and Xiaorong Cheng
- Subjects
Measure (data warehouse) ,GeneralLiterature_INTRODUCTORYANDSURVEY ,Computer science ,business.industry ,020208 electrical & electronic engineering ,Big data ,Context (language use) ,02 engineering and technology ,computer.software_genre ,Trusted Network Connect ,Data modeling ,InformationSystems_GENERAL ,Electric power system ,Smart grid ,020401 chemical engineering ,Credibility ,0202 electrical engineering, electronic engineering, information engineering ,Data mining ,0204 chemical engineering ,business ,computer - Abstract
The requirement of the credibility is analyzed for smart grid data and the traditional theories of data measurement and bad data identification are studied in power system. On the basis of that, this paper mainly studies the credibility between data sources, the construction of the trusted network generation algorithm, and the hierarchical and dynamic trusted network model innovatively which is based on the relationship between data sources. The credibility evaluation of data sources, the credibility evaluation between data sources and the credibility evaluation of data are studied. The credibility between data sources is restricted by the credibility of data sources, the credibility of data sources is restricted both from the credibility of data and the credibility between data sources, the credibility of data is restricted by the credibility between data sources and the credibility of data sources, they are interrelated and restricted by each other and constitute to a whole. The simulation results show that the model can satisfy the requirement of the credibility of smart grid data better, and provide the ideas to solve the problem of the credibility measure for prospective research is feasible.
- Published
- 2016
- Full Text
- View/download PDF
7. The photocathodic properties of a Pb(Zr0.2Ti0.8)O3 wrapped CaFe2O4 layer on ITO coated quartz for water splitting
- Author
-
Deliang Chen, Fengang Zheng, Xiaorong Cheng, Liang Fang, Mingrong Shen, and Wen Dong
- Subjects
Photocurrent ,Materials science ,business.industry ,Poling ,Metals and Alloys ,Nanotechnology ,General Chemistry ,Catalysis ,Photocathode ,Surfaces, Coatings and Films ,Electronic, Optical and Magnetic Materials ,Materials Chemistry ,Ceramics and Composites ,Water splitting ,Optoelectronics ,Zero bias ,business ,Quartz ,Layer (electronics) - Abstract
Pb(Zr(0.2)Ti(0.8))O3 wrapped CaFe2O4 particles were constructed on ITO coated quartz as a photocathode for efficient water splitting. A photocurrent of 152 μA cm(-2) was obtained under zero bias vs. Ag/AgCl and 100 mW cm(-2) with the assistance of positive poling and Ag decoration.
- Published
- 2014
- Full Text
- View/download PDF
8. Is elapsing time really recoded into spatial linear representation in working memory?
- Author
-
Huashan Liu, Zhao Fan, Xiaorong Cheng, and Xianfeng Ding
- Subjects
Male ,Linear representation ,Adolescent ,Experimental and Cognitive Psychology ,Space (commercial competition) ,Choice Behavior ,Judgment ,Young Adult ,Arts and Humanities (miscellaneous) ,Reaction Time ,Humans ,Set (psychology) ,Association (psychology) ,General Psychology ,Communication ,Analysis of Variance ,Working memory ,business.industry ,Recognition, Psychology ,General Medicine ,Memory, Short-Term ,Space Perception ,Time Perception ,Key (cryptography) ,Female ,Psychology ,business ,Psychomotor Performance ,Cognitive psychology - Abstract
A growing body of evidence suggested that elapsing time is tightly associated with space in a specific way (e.g., Spatial Temporal Association of Response Codes or STARC effect). However, existing findings cannot justify a hypothesis that elapsing time is recoded directly into a spatial linear representation in working memory. The present study addresses this fundamental question by using three modified STARC-related working memory paradigms. In different experiments, participants were asked to give order judgment, order-irrelevant STM recognition judgment, or motor-related free-choice judgment, immediately after successive presentation of a set of disparate stimuli. Results show that responses to early stimuli were faster or more often with the left key and responses to late stimuli were faster or more often with the right key. These findings clearly support the hypothesis that elapsing time is directly and automatically recoded into a spatial linear representation in working memory.
- Published
- 2014
9. Application Research of Improved FUP Algorithm in Network Security Linkage System
- Author
-
Lipu Cao and Xiaorong Cheng
- Subjects
Apriori algorithm ,Theoretical computer science ,Computational complexity theory ,Association rule learning ,Computer science ,Network security ,business.industry ,Linkage (mechanical) ,computer.software_genre ,law.invention ,law ,Algorithm design ,Data mining ,business ,computer ,Algorithm ,Time complexity ,FSA-Red Algorithm - Abstract
Association rules are an important branch of data mining. Aiming at the update maintenance problem of association rules when increase the database data while keep the minimum support unchanged, on the basis of FUP algorithm, this paper proposes a matrix-based incremental association rules mining algorithm, namely MBFUP algorithm. The algorithm just scans the database once, and doesn't produce candidate item sets, greatly reduces the space complexity and time complexity of the algorithm.
- Published
- 2013
- Full Text
- View/download PDF
10. Application of Network Topology Visualization for Power Communication Resource Management
- Author
-
Qianqian Zhang and Xiaorong Cheng
- Subjects
Tree (data structure) ,Spanning tree ,business.industry ,Computer science ,Distributed computing ,Topology optimization ,Frame (networking) ,Logical topology ,Resource management ,Topology (electrical circuits) ,business ,Network topology ,Computer network - Abstract
The original mode becomes hard to meet the requirement of power communication resource management for the network environment with complex topology structure, with multi-vendor resource in it. Since management of power communication resource is faced with a variety of challenges, it is very meaningful to set up a suitable topology for the connection of power communication resource and visualize this topology in an optimized way. This paper firstly analyzes several classic layout algorithms for topology visualization and makes a comparison among these algorithms, and then selects a modified tree layout algorithm based on a spanning tree frame to visualize the network topology according to the characteristics of power communication resource management's network topology.
- Published
- 2013
- Full Text
- View/download PDF
11. The Risk Assessment Quantitative Research of WAMS Communications Network
- Author
-
Xiaorong Cheng and Ying Wang
- Subjects
Risk analysis ,Engineering ,Electric power system ,Identification (information) ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,Smart grid ,Fuzzy analytic hierarchy process ,business.industry ,Reliability (computer networking) ,business ,Risk assessment ,Telecommunications network ,Reliability engineering - Abstract
WAMS (Wide Area Measurement System) is an important part of smart grid, it is the basic effective methods to realize power system dynamic security monitoring, safety and reliability of its communication network become increasingly prominent. In this paper through the identification of risk analysis and risk factors of WAMS communication network, Established the WAMS communications network risk assessment index system. The integrated use of fuzzy analytic hierarchy process and the D-S evidence theory realized quantification of all levels of the index factors in the evaluation index system, And then could determine the risk value and risk level of the WAMS communication network, Realized the quantitative risk assessment of the WAMS communications network.
- Published
- 2013
- Full Text
- View/download PDF
12. Nano-Au and Ferroelectric Polarization Mediated Si/ITO/BiFeO3Tandem Photocathode for Efficient H2Production
- Author
-
Xiaorong Cheng, Huanyu Shen, Wen Dong, Xiaodong Su, Mingrong Shen, Liang Fang, and Fengang Zheng
- Subjects
Photocurrent ,Materials science ,Tandem ,business.industry ,Band gap ,Mechanical Engineering ,02 engineering and technology ,010402 general chemistry ,021001 nanoscience & nanotechnology ,01 natural sciences ,Photocathode ,0104 chemical sciences ,Semiconductor ,Mechanics of Materials ,Electrode ,Optoelectronics ,Reversible hydrogen electrode ,Water splitting ,0210 nano-technology ,business - Abstract
For efficient utilization of solar light during photoelectrochemical (PEC) water splitting, tandem photoelectrodes comprising a wider bandgap top semiconductor stacked above a smaller bandgap one have been proposed in the previous studies. However, the photocurrent is usually limited due to the blocked transfer of photogenerated carriers on the interface between the semiconductors. Here, this study constructs an Si-pnn+/ITO/Au/BiFeO3 (BFO) hybrid photocathode catalyzed by MoS2/Pt with an intension to fulfill the efficient transfer of photogenerated electrons from Si to electrode surface. This study reveals how the local surface plasmonic resonance effect of Au nanoparticles and the depolarization electric field of BFO enhance the PEC reactivity of the photocathode, and also the catalytic effect of the combined MoS2/Pt catalyst. Remarkably, the photocathode exhibits an onset potential of 1.3 V versus reversible hydrogen electrode (RHE), and the photocurrent at 0 V versus RHE can be up to –9.1 mA cm−2 under 100 mW cm−2 Xe-lamp illuminations. Such a unique design represents a general strategy to enhance the PEC performance of a tandem photoelectrode where the energy bands are not so matched on the interfaces, and therefore extends the scope of the tandem architectures.
- Published
- 2016
- Full Text
- View/download PDF
13. Research on Network Security Situation Assessment and Prediction
- Author
-
Su Lang and Xiaorong Cheng
- Subjects
Network security ,business.industry ,Computer science ,Computer security model ,Computer security ,computer.software_genre ,Security policy ,Security information and event management ,Risk analysis (engineering) ,Security service ,Software security assurance ,Security convergence ,business ,computer ,Situation analysis - Abstract
The overall objective of the network security situation assessment is to establish security situation assessment system. This system can unify the large-scale network. First, it provides a security policy unified the whole network. It also provides the techniques for wide-area situation assessment. At the same time this system provides situational awareness and decision support tools for the implementation of network security command. Firstly, the information model of security situation was studied based on XML. Then the security situation value of system including three levels: service, host and network was analyzed and calculated. The-support vector regression machine was chosen for predicting the network security situation and determined the parameter values. Finally, the effectiveness of the method was verified through experimental analysis.
- Published
- 2012
- Full Text
- View/download PDF
14. The Research on Dynamic Risk Assessment Based on Hidden Markov Models
- Author
-
Yangdan Ni and Xiaorong Cheng
- Subjects
business.industry ,Computer science ,Markov process ,Dynamic assessment ,Machine learning ,computer.software_genre ,symbols.namesake ,Service level ,Scalability ,Attack time ,symbols ,Artificial intelligence ,Data mining ,business ,Hidden Markov model ,Risk assessment ,computer ,Risk management - Abstract
In order to effectively finish the dynamic risk assessment of the electricity system, this paper will divide each attack into three distinct phases, The difficulty of attack is assessed by percent of each attack time of distinct stages take up in the total attack time to describe the attack difficulty in order to determine the status of the assets transition matrix, realising the dynamic nature of risk assessment. The real-time dynamic risk assessment methods based on Hidden Markov Model HMM has a strong adaptability and scalability, it can be effectively applied on the network, host, system, service level of risk assessment. This paper designs and implements the dynamic risk assessment examples power system, and then demonstrateds the dynamic assessment model.
- Published
- 2012
- Full Text
- View/download PDF
15. Research of routing optimization based on improved PSO algorithm in power communication network
- Author
-
Xiaorong Cheng, Huawei Mei, Jujie Zhang, and Mingquan Zhang
- Subjects
Mathematical optimization ,Engineering ,Local optimum ,business.industry ,Quality of service ,Convergence (routing) ,Particle swarm optimization ,Destination-Sequenced Distance Vector routing ,Routing (electronic design automation) ,business ,Telecommunications network ,Power (physics) - Abstract
This paper introduces an improved PSO algorithm for power communication network routing, which minimizes the cost of communication and improves the Quality of Service (QoS). In this paper, PSO algorithm is improved in two parts of the parameter inertia weight and the discrete idea is added to, so that it can easily run out the local optimum and provide high speed of convergence as well as for the proposed application. An example shows the feasibleness and effectiveness of the algorithm. And it is easier to get an optimal or nearly optimal solution in power communication network routing by using the presented algorithm.
- Published
- 2011
- Full Text
- View/download PDF
16. A real-time hybrid intrusion detection system based on Principle Component Analysis and Self Organizing Maps
- Author
-
Xiaorong Cheng and Shanshan Wen
- Subjects
Self-organizing map ,Computer science ,Anomaly-based intrusion detection system ,business.industry ,Intrusion detection system ,computer.software_genre ,Machine learning ,Misuse detection ,Intrusion ,Principal component analysis ,Anomaly detection ,Data mining ,Artificial intelligence ,business ,computer - Abstract
Hybrid intrusion detection is a novel kind of model combining the advantages of anomaly detection and misuse detection. We design a new hybrid intrusion system based on Principle Component Analysis and Self Organizing Maps, aiming at establishing an extensible real-time intrusion model with high detection accuracy. Experimental results on the KDD 1999 Cup dataset show that the proposed model is promising in terms of detection accuracy and computational efficiency, thus amenable for real-time intrusion detection.
- Published
- 2010
- Full Text
- View/download PDF
17. Risk assessment of information system using the shell theory and attack graph
- Author
-
Zhenshan Zhang and Xiaorong Cheng
- Subjects
Network security ,business.industry ,Computer science ,Nuclear Theory ,Shell (computing) ,computer.software_genre ,Network theory in risk assessment ,Field (computer science) ,Physics::Atomic and Molecular Clusters ,Information system ,Data mining ,business ,Risk assessment ,computer ,Risk management ,Vulnerability (computing) - Abstract
In order to improve the accuracy of risk assessment of corporate networks, the paper introduces the concept of network shell into the field of security risk assessment. After analyzing the actual needs of corporate networks, we give the risk assessment model of network shell, then based on this model we analyze the application of network shell and give the algorithm to repair the network shell through the attack graph. After that, a calculation method of the integrated value of network shell is given. Finally, an example is given to verify the validity of assessment model.
- Published
- 2010
- Full Text
- View/download PDF
18. Name agreement in picture naming: An ERP study
- Author
-
Graham Schafer, Xiaorong Cheng, Elkan G. Akyürek, and Experimental Psychology
- Subjects
Adult ,Male ,Speech production ,Vocabulary ,Adolescent ,SENTENCE PRODUCTION ,media_common.quotation_subject ,Decision Making ,CATEGORY INTERFERENCE ,EVENT-RELATED POTENTIALS ,Naming ,Semantics ,Identity (music) ,Psycholinguistics ,SPEECH PRODUCTION ,Young Adult ,ELECTROPHYSIOLOGICAL EVIDENCE ,BRAIN POTENTIALS ,VANDERWART PICTURES ,Event-related potential ,Reference Values ,Physiology (medical) ,Reaction Time ,COGNITIVE COMPONENTS ,Humans ,Evoked Potentials ,media_common ,Communication ,Analysis of Variance ,business.industry ,Verbal Behavior ,General Neuroscience ,Recognition, Psychology ,Linguistics ,Lexical processing ,Neuropsychology and Physiological Psychology ,Categorization ,TIME-COURSE ,Female ,VISUAL SELECTIVE ATTENTION ,business ,Psychology ,Picture naming ,ERP - Abstract
Name agreement is the extent to which different people agree on a name for a particular picture. Previous studies have found that it takes longer to name low name agreement pictures than high name agreement pictures. To examine the effect of name agreement in the online process of picture naming, we compared event-related potentials (ERPs) recorded whilst 19 healthy, native English speakers silently named pictures which had either high or low name agreement. A series of ERP components was examined: P1 approximately 120 ms from picture onset, N1 around 170 ms, P2 around 220 ms, N2 around 290 ms, and P3 around 400 ms. Additionally, a late time window from 800 to 900 ms was considered. Name agreement had an early effect, starting at P1 and possibly resulting from uncertainty of picture identity, and continuing into N2, possibly resulting from alternative names for pictures. These results support the idea that name agreement affects two consecutive processes: first, object recognition, and second, lexical selection and/or phonological encoding. (C) 2010 Elsevier B.V. All rights reserved.
- Published
- 2010
19. PSO Algorithm Combined with Neural Network Training Study
- Author
-
Kun Xie, Xiaorong Cheng, Dong Wang, and Jujie Zhang
- Subjects
Artificial neural network ,Computer science ,business.industry ,Particle swarm optimization ,Machine learning ,computer.software_genre ,Probabilistic neural network ,Statistical classification ,Encoding (memory) ,Genetic algorithm ,Training study ,Artificial intelligence ,business ,computer - Published
- 2009
- Full Text
- View/download PDF
20. The research of PSO algorithm in web information filtering
- Author
-
Dong Wang, Kun Xie, and Xiaorong Cheng
- Subjects
SIMPLE (military communications protocol) ,Computer science ,business.industry ,User modeling ,Process (computing) ,Particle swarm optimization ,Information technology ,Machine learning ,computer.software_genre ,Algorithm design ,The Internet ,Data mining ,Artificial intelligence ,business ,computer ,Information filtering system - Abstract
With the development of information technology and the popularization of the Internet, the amount of information based on the network has raised rapidly, and the emergence and development of network information filtering provide a better choice for people to access to the information quickly, accurately and completely. In this paper, the introduction of PSO uses its simple and efficient to establish accurate user model. It takes the access and update of profile as a process of learning, adjusted, learning again. Model is updated under considering inertia weight, parameters and other factors. Then doing some experiments test it.
- Published
- 2009
- Full Text
- View/download PDF
21. A Quantitative Risk Assessment Approach Based on VPRS and Group Decision-Making Theory
- Author
-
Xin Geng, Xiaorong Cheng, and Yan Wei
- Subjects
Risk analysis ,Computer science ,business.industry ,Analytic hierarchy process ,Factor analysis of information risk ,computer.software_genre ,Group decision-making ,Electric power system ,Data mining ,Electric power ,Risk assessment ,business ,computer ,Risk management - Abstract
In view of the characteristics and the special demands of the electric power information system, this paper designs an assessment model based on variable precision rough set. Then, it uses group decision-making theory, which could make the results of the assessment more accurate and more objective, to calculate the risk value of the target system risk. And then VPRS and AHP are used to determine the index weight involved in the process of the electric power information risk assessment. Finally, it verifies the correctness of the algorithm by analyzing results of the examples of the electric power information system security assessment. We can see that the model could not only find the weakness of the system by analyzing the results got by calculating the current risk value of the electric power system, but also reduce the influence of the subjective factors in some degree.
- Published
- 2009
- Full Text
- View/download PDF
22. Network security risk assessment based on association rules
- Author
-
Xin Geng, Xiaorong Cheng, and Yan Wei
- Subjects
Apriori algorithm ,Association rule learning ,Computer science ,business.industry ,Network information system ,Network security ,Vulnerability ,Data security ,Information security ,Data science ,Server ,Information system ,business ,Risk assessment ,Risk management - Abstract
With the rapid development of computer network, the network is confronting a growing number of threats. Therefore, it is very important to assess the risks for the network information system. This paper draws data mining technology based on association rules into the field of risk assessment, demonstrating a network security risk assessment model based on association rules. The model mines data from history vulnerability database to discover association rules of vulnerabilities, and it is applied on risk assessment of vulnerabilities. In addition, the paper shows a multidimensional association rule mining algorithm based on improved Apriori, and it is proved that it is available by the experimental results.
- Published
- 2009
- Full Text
- View/download PDF
23. Network Traffic Anomaly Detection Based on Self-Similarity Using HHT and Wavelet Transform
- Author
-
Xiaorong Cheng, Kun Xie, and Dong Wang
- Subjects
Discrete wavelet transform ,Wavelet ,Lifting scheme ,Computer science ,business.industry ,Stationary wavelet transform ,Second-generation wavelet transform ,Wavelet transform ,Pattern recognition ,Artificial intelligence ,Fast wavelet transform ,business ,Wavelet packet decomposition - Abstract
Network traffic anomaly detection can be done through the self-similar analysis of network traffic. In this case, the abnormal condition of network can be indicated by investigating if the performance parameters of real time data locate at the acceptable ranges. A common method of estimating self-similar parameter is the Wavelet transform. However, the Wavelet transform fails to exclude the influence of non-stationary signal’s periodicity and trend term. In view of the fact that Hilbert-Huang Transform (HHT) has unique advantage on non-stationary signal treatment, in this paper, a refined self-similar parameter estimation algorithm is designed through the combination of wavelet analysis and Hilbert-Huang Transform and a set of experiments are run to verify the improvement in the accuracy of parameter estimation and network traffic anomaly detection.
- Published
- 2009
- Full Text
- View/download PDF
24. Risk Rules Mining of Information System Based on Variable Precision Rough Set
- Author
-
Mingquan Zhang, Huilan Zhao, Xiaorong Cheng, and Xin Geng
- Subjects
Risk analysis ,Basis (linear algebra) ,business.industry ,Fuzzy set ,computer.software_genre ,Machine learning ,Information system ,Set theory ,Data mining ,Artificial intelligence ,Rough set ,business ,computer ,Risk management ,Mathematics ,Variable precision - Abstract
For evaluation of the risk in information system, variable precision rough set (VPRS) theory is emerging as a powerful tool for reasoning about data. The method for risk rules mining in information system based on VPRS is designed on the basis of related concepts of VPRS. Through the example of the assessment, it is considered that the method can not only reduce greatly the data, but also increase the validity of risk regulations.
- Published
- 2009
- Full Text
- View/download PDF
25. A Support Vector Machines Security Assessment Method Based on Group Decision-Marking for Electric Power Information System
- Author
-
Xiaorong Cheng, Yan Wei, and Xin Geng
- Subjects
Correctness ,business.industry ,Computer science ,Sample (statistics) ,computer.software_genre ,Support vector machine ,Electric power system ,Information system ,Electric power ,Data mining ,business ,Risk assessment ,computer ,Risk management - Abstract
In accordance with the characteristics and the special demands of electric power information system, this paper designs a support vector machines (SVM) risk assessment method based on group decision-marking. According to security technology indices of electric power information system, the method chooses the mode of expert scoring, based on the group decision-marking, to calculate integrated value of each index, which is as a training sample used to train SVM, and it forecasts risk level for the system. Finally, it verifies the correctness of the method by analyzing results of the examples of the electric power information system security assessment. The experiment shows that the method can not only forecast the current risk level of the electric power system with a high accuracy rate, but also reduce the influence of the subjective factors in some degree.
- Published
- 2009
- Full Text
- View/download PDF
26. Personalized Services Research Based on Web Data Mining Technology
- Author
-
Hong Liu and Xiaorong Cheng
- Subjects
Service (systems architecture) ,business.industry ,Computer science ,computer.software_genre ,Web mining ,Order (business) ,Similarity (psychology) ,Algorithm design ,The Internet ,Data mining ,business ,Cluster analysis ,computer ,PATH (variable) - Abstract
This paper use the source of web log data and through AprioriAll algorithm among sequential pattern mining to identify the user pattern in the data pre-processing stage and based on pattern to cluster users’ path pattern and make the similarity users cluster one group in order to reduce pattern. Through testing, the method has been proven to be effective for users in personalized service.
- Published
- 2009
- Full Text
- View/download PDF
27. Application of MPSO-Based Neural Network Model in Chinese Word Segmentation
- Author
-
Kun Xie, Dong Wang, and Xiaorong Cheng
- Subjects
Artificial neural network ,Computer science ,business.industry ,Text segmentation ,Particle swarm optimization ,Segmentation ,Algorithm design ,Artificial intelligence ,Hidden Markov model ,business ,Backpropagation ,Field (computer science) - Abstract
In this article, introduced particle swarm optimization and multiply particle swarm optimization firstly, then modified BP neural network model through using multiply particle swarm optimization. According to above processes, the modified BP arithmetic was used in the Chinese word segmentation field. Applying BP network had achieved the prototype system of Chinese word segmentation. Based on PSO arithmetic, the prototype system made the network study training and used some samples of studying training to do some simulation experiments. The result of experiments expresses that the model of Chinese word segmentation’s ability obviously increased with the increasing training samples. So, the word segmentation that is proposed in this article is effective and has actual application value.
- Published
- 2009
- Full Text
- View/download PDF
28. RESEARCH AND IMPROVEMENT ON COMPUTER INTRUSION DETECTION TECHNOLOGY BASED ON IMMUNE PRINCIPLE
- Author
-
Huilan Zhao, Jitian Kou, and Xiaorong Cheng
- Subjects
Engineering ,business.industry ,Intrusion detection system ,Computer security ,computer.software_genre ,business ,computer - Published
- 2005
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.